Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • Data Protection Services
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Managed Recovery
      • Cloud Recovery
      • Cyber Incident Recovery
      • Business Continuity Consulting and Services
      • Physical Infrastructure Recovery Services
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed Detection and Response
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Managed Recovery
    • Cloud Recovery
    • Cyber Incident Recovery
    • Business Continuity Consulting and Services
    • Physical Infrastructure Recovery Services
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Author: Milou Lammers
Date: October 30, 2019

Does Your Alexa Turn into Chucky When Brought to Work?

As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

 
Here’s a spooky breakdown as to why you might want to leave her home

A lot of us love welcoming our personal home assistants like Alexa and Google into our homes. They’re great at giving us weather reports or checking on the status of our orders. But what happens when your fellow employees bring them to work?

For IT pros, employees taking an actual personal assistant device like Alexa to the office can set off alarms when seeking permission to join the company network. But now with Amazon’s move into wearable devices such as earbuds, eyeglasses, and rings that are Alexa-enabled, it may be much easier for employees to sneak the devices into the office.

Our team of certified IT compliance experts here at 11:11 Systems want you to know that these fun little devices are far from harmless when brought to work. They have the potential to go from cute to frightening in almost no time. It’s best to be aware of the potential risks of allowing these devices into your workplace, and their potential data privacy risks.

If you’re managing IT and you’re in charge of your company’s IT compliance, here’s something that could keep you up at night. As we all know, Alexa is always listening. And while you can adjust your Amazon’s privacy settings to delete your own voice recordings, Amazon still has the ability to retain transcripts of your data forever.

Amazon is quick to defend Alexa and her penchant for eavesdropping on conversations, stressing that you have the ability to change privacy settings. However, Amazon is currently defending Alexa’s data privacy and data retention policies against 20 consumer advocacy groups that have lodged a complaint with the Federal Trade Commission in regards to Alexa’s potential infringements of the Children’s Online Privacy Protection Act (COPPA). This movement may be the first of many legal proceedings against Alexa and her alarming policies.

This complaint was lodged after Amazon responded to a U.S. Senator’s concerns and Amazon admitted publicly that while individuals can delete voice recordings, Alexa’s text logs of transcribed audio can travel to the company’s cloud servers with no means to delete them. The data is recorded, transcribed, and cannot be deleted.

Still think it’s cool to bring Alexa to work? Then think about this too.

According to the EU’s GDPR, Article 7, individuals must consent to the kind of data processing that smart speakers like Alexa and Google Home use when actively listening to surrounding conversations for the words “Hey Google” or “Alexa.”

To process personal data, Amazon and Google must obtain opt-in consent from users. And while one employee might personally opt-in when they purchase their Alexa, their co-workers haven’t. And neither have your customers.

Remember, if Alexa is ever-present and always listening, where is that data going? And how will it be stored, managed, and potentially accessed by others?

In light of Amazon’s view on data privacy and the organization’s new release of wearable devices, such as earbuds and rings, we all need to be mindful of when and where we welcome smart speakers and smart devices into our lives – whether at work or in our home offices. If you’re prioritizing compliance and trying to avoid potential data security risks, it may be safer to tell employees to leave Alexa devices at home.

Categories: Compliance, SecurityBy Milou LammersOctober 30, 2019

Author: Milou Lammers

Milou Lammers worked in legal and compliance at 11:11 Systems.

Post navigation

PreviousPrevious post:Geneseo Builds its City Cloud from Scratch with 11:11 SystemsNextNext post:Disaster Recovery Doesn’t Have to Spook You

Related Posts

cyber threats, cyber attacks, cyberthreats, cyberattacks, cyber incidents, ransomware
As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound
September 18, 2023
layered security strategy
Why a Layered Security Strategy Matters
September 11, 2023
protect your brand reputation from cyber-attacks, stay under the radar
“Flying Under the Radar:” How to Protect Your Organization’s Reputation
August 31, 2023
Managed NGFW
“Don’t be a “Holdover”: Is it time for a Next Generation Firewall?
August 22, 2023
Cloud Challenges
Spending, Security, and Expertise Are the Top 3 Cloud Challenges — But They Don’t Have to Be Yours
August 21, 2023
The Definitive Case for a Managed Firewall: Preserving Your Business in the Information Age
August 16, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice |

Go to Top

https://1111systems.com/wp-content/uploads/2023/04/HPE-video-for-1111-SKO.mp4

https://1111systems.com/wp-content/uploads/2023/04/Dell-Global-Alliance-video-for-1111-SKO.mp4