Donate
Uruguay Joins Others Taking Action to Strengthen IoT Security Thumbnail
‹ Back
Building Trust 17 June 2019

Uruguay Joins Others Taking Action to Strengthen IoT Security

Sebastian Bellagamba
By Sebastian BellagambaRegional Bureau Director, Latin America and The Caribbean

The use of Internet of Things devices has substantially increased in recent years and the trends indicate that the number will continue to grow significantly. In this environment of rapid technological adoption, the inclusive and collaborative approach is essential to face the challenges and take advantage of the opportunities that arise.

Specifically, to overcome the privacy and security challenges associated with the growing number of Internet of Things (IoT) devices and systems, the Internet Society signed an agreement with the Agency of Electronic Government and the Information and Knowledge Society of Uruguay (Agesic). The agreement will encourage us to strengthen our collaborative ties to develop a multistakeholder process that will seek to issue recommendations on IoT security in the country.

The recommendations issued will be useful to guide the processes of development of national and regulatory policies in Uruguay. In addition, the agreement focuses on two broad areas: the exchange of information and the development of training materials on consumer protection and network resilience.

This is undoubtedly great news for the region, since Uruguay joins a group of countries that have opted for the multistakeholder processes to strengthen the security of IoT devices. The most recent example is Canada, whose process published its final recommendations a few weeks ago. In addition, there are similar efforts in France and Senegal.

The process, which will end later this year, will adhere to the principles of the multistakeholder model, such as the inclusion of diverse actors, with their participation on an equal footing, and transparency.

No one can build a secure Internet alone. Solutions need all of us. Read the Canadian Multistakeholder Process: Final Outcomes and Recommendations Report.

‹ Back

Disclaimer: Viewpoints expressed in this post are those of the author and may or may not reflect official Internet Society positions.

Related articles

There is No Perimeter in IoT Security
There is No Perimeter in IoT Security
Improving Technical Security2 June 2017

There is No Perimeter in IoT Security

The Internet of Things (IoT) is not just a device connected to the Internet - it is a complex, rapidly...

Wouldn’t it be nice…if you could trust your device?
Wouldn’t it be nice…if you could trust your device?
Internet of Things (IoT)19 April 2018

Wouldn’t it be nice…if you could trust your device?

Wouldn’t it be nice if you could trust that your device is secure, so that it isn’t leaking your private...

Consumers International Summit: Making IoT Privacy and Security a Priority
Consumers International Summit: Making IoT Privacy and Security a Priority
Internet of Things (IoT)26 April 2019

Consumers International Summit: Making IoT Privacy and Security a Priority

Each day, more and more of us buy products that connect to the Internet, such as personal assistants, fitness monitors,...

Join the conversation with Internet Society members around the world