Smart cars, smart homes, and smart phones are changing life as we know it. Amazon's Echo personal assistant became pop culture parody on Saturday Night Live. Jokes aside, we’ve seen the frustrating side of this technology.
Imagine the surprise when four pounds of cookies and a $170 doll house showed up at a Texas family’s front door, ordered during that young girl’s conversation with Alexa.
“The first question I think folks need to ask themselves is, ‘Do I want this particular device to be connected,’” said John Verdi, Vice President of Policy at the Future of Privacy Forum.
Verdi says the microphones on our smart devices are listening, so we have to be smart about controlling their access to our lives.
“What data is being transmitted and what data is being used really depends on the device,” Verdi said. “They can offload that information from the device to servers on the internet that are either controlled by the companies or third parties and there’s some processing that can happen there.”
But is that an invasion of privacy?
It’s question recently debated during a murder trial in Arkansas.
James Bates was charged with murder after finding a friend floating in his hot tub after a night of drinking. Police found blood, broken bottles, signs of a struggle, and an Amazon Echo inside his home. The prosecutor in that case tried to force Amazon to hand over any recordings leading up to, during and after the murder.
Attorney Terry Sullivan explained the legal complications.
“I think what’s going to have to happen is practicing lawyers like myself are going to have to be on their feet and be able to try and protect the constitutional rights of somebody who owns these things,” he said.
It’s one reason Verdi believes legislators should act fast.
“I think it’s really time for folks at the federal level to be thinking about comprehensive, baseline, common sense privacy law,” he said.
So how can you control what your devices hear and see? Start by learning about how the data on your device is connected. Look at your app settings. They offer different options as well as privacy controls. The same goes for your operating systems. There are also third-party programs you can use to control your data.