What Are Wearable Devices?

753 Words2 Pages

Wearable devices have skyrocketed through the market in both sales and usage. Consumers are buying into a concept that wearable devices can assist them in losing weight and developing an overall healthier lifestyle. Call it the new health trend. Unfortunately, with the rise in popularity of wearable devices comes an increase in associated security issues. All types of organizations are now required to implement information security policies that cover wearable devices in the workplace. Many security issues are associated with wearable devices. According to Drolet (2016), there are seven potential security concerns for wearable devices. One of the concerns is the physical access to these wearables, and the ease at which access is available. …show more content…

However, an increase in convenience often results in an increase in security vulnerabilities. The consumer market has been flooded with a variety of wearable devices, many of which collect large amount of private personal information. These wearable devices can be exploited for many types of gain, including monetary and political gain. It is our company’s responsibility protect our client’s and employee’s private …show more content…

This security policy establishes rules for the integration of wearables in the workplace to protect the confidentiality of sensitive data, the integrity of business data, and the availability of business services. This policy applies to all vendors, employees, interns, contractors, and third-party employees who may have access to any business premises. All personnel previously mentioned are responsible for protecting business information assets, and must comply with the company security policies. This Information Security Policy consists of guidelines, standards, and procedures to define the implementation of the policy. The policy is housed on the company intranet under the policies page. Any questions or concerns relating to the security of business information assets are welcomed, and should be brought to the attention of the Chief Security

Open Document