<section title="11.5. Personal Wearable Devices"><subsection title="Objective"><paragraph
    title="11.5.1."


><![CDATA[<p>Wearable devices are prevented from unauthorised communication or from compromising secure areas.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.5.2."


><![CDATA[<p>This section covers information relating to the use of personal wearable devices, fitness devices, smart watches, devices embedding in clothing and similar wearable devices.</p>]]></paragraph>
<paragraph
    title="11.5.3."


><![CDATA[<p>These devices can use RF in various parts of the spectrum to communicate including Wi-Fi, cellular, satellite, RFID, NFC and Bluetooth frequencies as well as providing data storage capability, audio and video recording and USB connectivity. All such wearable or mobile devices are considered to be transmitters.</p>]]></paragraph>
<paragraph
    title="11.5.4."


><![CDATA[<p>Personal wearable devices can be equipped with a variety of capabilities including smart phone pairing, internet connectivity, cameras, speakerphones, audio and video recording and remote control. Some devices (for example Narrative and Autographer) will automatically take snapshots at intervals during the day. In some cases the snapshots are geotagged.</p>]]></paragraph>
<paragraph
    title="11.5.5."


><![CDATA[<p>Such devices are also susceptible to Internet malware and exploits. All risks related to the use of the Internet will apply to these devices.</p>]]></paragraph>
<paragraph
    title="11.5.6."


><![CDATA[<p>Merely disabling the capabilities described above is not a sufficient mitigation and is not acceptable, posing a high risk of compromise, whether intentional or accidental. The device MUST NOT have such capabilities installed if the device is to enter a secure area.</p>]]></paragraph>
<paragraph
    title="11.5.7."


><![CDATA[<p>There is a wide variety of devices now available with upgrades and new models appearing frequently. There are many hundreds of models with a variety of custom operating systems and programmes and other applications. Some industry surveys and predications are forecasting explosive growth in the use of wearable devices, reaching over 100 million devices by 2020. Checking the capabilities and vulnerabilities of each device and subsequent security testing or validation will be an onerous task for agencies and may be infeasible.</p>]]></paragraph>
</block>
<block title="Key Risk Areas"><paragraph
    title="11.5.8."


><![CDATA[<p>Personal wearable devices are not only about the technological aspects, the human factor is equally important. Users often forget about personal information security and their own safety, which enables social engineering attacks on the devices. The main protective measure for users is awareness, but even the <em>trust-but-verify</em> rule is not completely reliable in this situation. Accordingly, the information gathered by wearable devices should be appropriately secured to maintain privacy and personal security.</p>]]></paragraph>
<paragraph
    title="11.5.9."


><![CDATA[<p>There are four important risk groups to be considered when managing personal wearable devices:</p>
<ol>
<li>Data leaks and breaches;</li>
<li>Network security compromises;</li>
<li>Personal information leaks; and</li>
<li>Privacy violations.</li>
</ol>]]></paragraph>
</block>
<block title="Personal Information"><paragraph
    title="11.5.10."


><![CDATA[<p>In most cases, the protection of personal information will be the responsibility of the individual. In cases where the use of devices is permitted under a medical exemption, agencies MAY be required to ensure that devices that collect and store data comply with relevant regulation and guidance, such as the Privacy Act.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="11.5.11."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References"><paragraph
    title="11.5.12."


><![CDATA[<p class="NormS10C2">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>ITL bulletin for April 2010</strong></p>
</td>
<td>
<p><strong>Guide to protecting personally identifiable information</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td><a title="ITL Bulletin" rel="noopener noreferrer" href="https://csrc.nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2010-04.pdf" target="_blank">https://csrc.nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2010-04.pdf [PDF, 50 KB]</a></td>
</tr>
<tr>
<td>
<p><strong>SP&nbsp;800-122</strong></p>
</td>
<td>
<p><strong>Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) - Recommendations of the National Institute of Standards and Technology</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td><a title="SP 800-122" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf [PDF, 800 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Privacy Act 2020&nbsp;</strong></td>
<td style="text-align: center;"><span>Office of The Privacy Commissioner</span>&nbsp;</td>
<td>
<p><a title="Privacy commission" rel="noopener noreferrer" href="https://privacy.org.nz/" target="_blank">https://privacy.org.nz/</a></p>
<p><a title="Legislation NZ" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>The Health Insurance Portability and Accountability Act of 1996 (USA)</strong></td>
<td style="text-align: center;">
<p>US Congress</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm" target="_blank">https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm</a></p>
<p><a rel="noopener noreferrer" href="https://www.hhs.gov/hipaa/index.html" target="_blank">https://www.hhs.gov/hipaa/index.html</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Health Information Technology for Economic and Clinical Health Act (HITECH Act) (USA)</strong></td>
<td style="text-align: center;">
<p>US Congress</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf" target="_blank">https://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf [PDF, 881 KB]</a></p>
<p><a rel="noopener noreferrer" href="http://www.hhs.gov/hipaa/for-professionals/special-topics/HITECH-act-enforcement-interim-final-rule/index.html%20" target="_blank">http://www.hhs.gov/hipaa/for-professionals/special-topics/HITECH-act-enforcement-interim-final-rule/index.html&nbsp;</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Technology, Media and Telecommunications Predictions, 2014</strong></td>
<td style="text-align: center;">Deloitte</td>
<td><a rel="noopener noreferrer" href="https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-tmt-predictions-2014-interactive.pdf" target="_blank">https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-tmt-predictions-2014-interactive.pdf [PDF, 1.05 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Technology, Media and Telecommunications Predictions, 2015</strong></td>
<td style="text-align: center;">Deloitte</td>
<td><a rel="noopener noreferrer" href="https://www2.deloitte.com/au/en/pages/technology-media-and-telecommunications/articles/tmt-predictions.html" target="_blank">https://www2.deloitte.com/au/en/pages/technology-media-and-telecommunications/articles/tmt-predictions.html</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Study: Wearable Technology &amp; Preventative Healthcare</strong></td>
<td style="text-align: center;">
<p>Technology Advice Research</p>
</td>
<td><a rel="noopener noreferrer" href="http://technologyadvice.com/" target="_blank">http://technologyadvice.com/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Security Analysis of Wearable Fitness Devices (Fitbit)</strong></td>
<td style="text-align: center;">
<p>Massachusetts Institute of Technology</p>
</td>
<td><a rel="noopener noreferrer" href="https://courses.csail.mit.edu/6.857/2014/files/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf" target="_blank">https://courses.csail.mit.edu/6.857/2014/files/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf [PDF, 630 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device</strong></td>
<td style="text-align: center;">
<p>School of Computing and Information Sciences, Florida International University</p>
</td>
<td><a rel="noopener noreferrer" href="https://arxiv.org/pdf/1304.5672.pdf" target="_blank">https://arxiv.org/pdf/1304.5672.pdf [PDF, 541 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Survey of Security and Privacy Issues of Internet of Things</strong></p>
</td>
<td style="text-align: center;">&nbsp;</td>
<td>&nbsp;<a rel="noopener noreferrer" href="http://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf" target="_blank">http://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf [PDF, 548 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Personal Wearable Device usage policy"><paragraph
    title="11.5.13.R.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


><![CDATA[<p>Any device that uses part of the RF spectrum to communicate is subject to interception. The required level of expertise to conduct intercepts needed varies greatly. Other capabilities of Personal Wearable Devices can be used for malicious purposes, including the theft of classified information and revealing the identities of personnel. Accidentally or maliciously revealing classified information through Personal Wearable Devices can lead to a security breach.</p>]]></paragraph>
<paragraph
    title="11.5.13.C.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


    classification="All Classifications"
    compliance="Must"
    cid="2736"
><![CDATA[<p>Agencies MUST develop a policy governing the use of personal wearable devices, including fitness devices.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="11.5.14.R.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


><![CDATA[<p>There is a high risk of unintended disclosure of classified information when using personal wearable devices. It is important that personnel are aware of the level of classified information they discuss, the environment in which they are operating as well as the wide range of security risks associated with the use of mobile and personal wearable devices.</p>]]></paragraph>
<paragraph
    title="11.5.14.C.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


    classification="All Classifications"
    compliance="Must"
    cid="2750"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classification for conversations where any personal wearable or mobile device may be present.</p>]]></paragraph>
<paragraph
    title="11.5.14.C.02."

    tags="Communications systems,Governance,Personal Wearable Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2752"
><![CDATA[<p>Agencies SHOULD advise personnel of all known security risks posed by using personal wearable devices in secure areas or other areas where classified conversations can occur.</p>]]></paragraph>
</block>
<block title="Mobile Device Physical Security"><paragraph
    title="11.5.15.R.01."

    tags="Communications systems,Technical,Mobile Devices,Personal Wearable Devices,Physical Security,Secure Area"


><![CDATA[<p>Personal wearable devices are invariably software controlled and can be infected with malware or other means of compromise. No “off-hook” or “power off” security can be effectively provided, creating vulnerabilities for secure areas. Secure areas are defined in <a title="Secure areas" href="http://nzism.gcsb.govt.nz/ism-document#Block-12020">Chapter 1 at 1.1.36</a>.</p>]]></paragraph>
<paragraph
    title="11.5.15.C.01."

    tags="Communications systems,Technical,Mobile Devices,Personal Wearable Devices,Physical Security,Secure Area"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="2758"
><![CDATA[<p>Personal wearable devices MUST NOT be allowed to enter secure areas.</p>]]></paragraph>
<paragraph
    title="11.5.15.C.02."

    tags="Communications systems,Technical,Mobile Devices,Personal Wearable Devices,Physical Security,Secure Area"


    classification="All Classifications"
    compliance="Should"
    cid="2759"
><![CDATA[<p>Agencies SHOULD provide a storage area or lockers where personal wearable devices can be stored before personnel enter secure or protected areas.</p>]]></paragraph>
</block>
<block title="Medical Exemptions"><paragraph
    title="11.5.16.R.01."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


><![CDATA[<p>In some isolated cases personal wearable devices are necessary for the medical well-being of the individual. In such cases personal wearable devices MAY be permitted with the written authority of the Agency’s Accreditation Authority. Such devices MUST NOT have any of the following capabilities:</p><ul>
<li>Camera;</li>
<li>Microphone;</li>
<li>Voice/video/still photograph recording; </li>
<li>Cellular, Wi-Fi or other RF.</li>
</ul><p>Merely disabling such capabilities is not acceptable. The device MUST NOT have such capabilities installed. Permitted device capabilities are:</p><ul>
<li>Accelerometer;</li>
<li>Altimeter;</li>
<li>Gyroscope; </li>
<li>Heart Activity monitor;</li>
<li>Vibration feature for the personal notification purposes.</li>
</ul>]]></paragraph>
<paragraph
    title="11.5.16.R.02."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


><![CDATA[<p>Personal wearable devices may contain personal information of the individual using the device.&nbsp; This may be on the device itself in printed or electronic form, and also in the registers of tested, permitted or rejected devices in use within the agency.&nbsp; It is important that relevant legislation and regulation pertaining to the protection of personal information is followed.</p>]]></paragraph>
<paragraph
    title="11.5.16.C.01."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="2763"
><![CDATA[<p>Any personal wearable devices approved on medical grounds MUST NOT have any of the following capabilities:<br>Camera;<br>Microphone;<br>Voice/video/still photograph recording; <br>Cellular, Wi-Fi or other RF means of transmission.</p>]]></paragraph>
<paragraph
    title="11.5.16.C.02."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2765"
><![CDATA[<p>Where personal wearable devices are exempted on medical grounds and used in secure areas agencies MUST ensure that:</p><ul>
<li>the agency networks in secure areas have been certified and accredited for the purpose; and</li>
<li>users are aware of the area, surroundings, potential for overhearing and potential for oversight.</li>
</ul>]]></paragraph>
<paragraph
    title="11.5.16.C.03."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


    classification="All Classifications"
    compliance="Must"
    cid="2767"
><![CDATA[<p>Where the use of personal wearable devices is permitted on medical grounds and used within a corporate or agency environment, agencies MUST ensure any relevant legislation and regulation pertaining to the protection of personal information is followed.</p>]]></paragraph>
</block>
</subsection>
</section>
