Large growth possibilities exist for IoT, connecting devices to the internet in areas like home automation, smart energy, and transportation. While sales in IoT have started, navigating issues of cost, ease-of-use, and adoption of IoT applications requires careful consideration of appropriate technologies and the evolving M2M /IoT infrastructure.
Currently, many of the applications with Internet connected devices are vertical, insular information silos. The potential of IoT is contained in the sharing of data from these closed information silos. Realizing the potential of IoT is made possible by the accessibility of all data from devices combined with the new knowledge emerging in the area of “big data” to create the framework for many new types of applications.
Enabling “smart” products for IoT involves more than just the applications that manage a device’s data. It requires applications that track activation, perform licensing, manage billing and subscriptions, and protect the data. Data centres preparing for the data explosion from IoT are establishing support services that will be required to transform and take advantage of the new applications. To keep up with this constant climate of change, emerging technologies are focusing heavily on programmability and standardization while not forgetting the security concerns that are ever present.
With data availability and new applications driving the growth of IoT, choosing the appropriate technologies from the many different options becomes critical. Many technologies compete in this space including international standards, domain-specific standards and proprietary technologies.
An architecture with a gateway that serves as an interface between the wide-area network (Internet) and the short-range network is also typically required for IoT.
When choosing short-range technology for IoT, an often-required feature is support for mobile use cases where a smartphone or other mobile device can be used as a temporary gateway. The energy-saving attributes of Bluetooth Low Energy (BLE), also known as Bluetooth Smart make it a likely major player in data-intensive enterprise and IoT applications. Android’s support of Bluetooth Smart in late 2013 will ensure that Bluetooth Low Energy technology will be a major feature in the IoT context with 2014 to 2015 shaping up to be big as more Bluetooth Smart-enabled Android devices reach the market. Today all major mobile operating systems, including iOS, Android, Windows Phone, and BlackBerry, support BLE, a factor that will help speed the technology’s adoption.
Dedicated M2M networks may also contribute to the envisioned IoT of the future. Offering cheaper prices on dedicated data networks, new M2M-only networks operating on different business models to the traditional networks have the potential to revolutionize revenue models. For example a new startup firm, M2M Spectrum Networks (U.S), proposes charging a percentage of revenue or a percentage of the value of the application instead of charging per device per month. The actual or planned shutting down of carriers’ 2G networks has been of benefit to such companies sales pitches, with these new network proponents catering to security, tracking and vending companies interested in long-term M2M solutions that do not require migration to new mainstream networks such as LTE.
Partnerships and alliances feature in the new IoT landscape as evident at the IoT Asia event in Singapore last month. As examples Cisco Systems and Texas Instruments have announced separate efforts to expand partnerships serving the emerging Internet of Things. Texas Instruments named eight IoT cloud service partners and Cisco launched a challenge for IoT startups and promised to work with the winners.
The current IoT landscape highlights the emerging new providers of cloud services for IoT with various skill sets and offerings. Another rapidly expanding area in IoT is in design services handling technical needs of the broad variety of market sectors looking to adopt wireless sensor networks of various kinds. Helping drive the development of new designs in the emerging IoT market, component manufacturers are collaborating in ecosystems that in some cases include cloud service providers to bring IoT devices and applications to market faster.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
1. Privacy Policy Statement
M2M Connectivity is committed to protecting your privacy, keeping your information safe and ensuring the security of your data. This policy outlines our ongoing obligations to you in respect of how we manage your Personal Information. This extends to both our control and processing of personal information.
We have adopted the Australian Privacy Principles (APPs) contained in the Privacy Act 1988 (Cth) (the Privacy Act). The National Privacy Principles (NPPs) govern the way in which we collect, use, disclose, store, secure and dispose your Personal Information.
The current policy will be in effect from 1 July 2020. We may need to update it over time but if we do, the updated version will be published.
2. What information we collect and control
The types of information we collect depends on how you use our products and services as well as the relationship we have with you as a customer. It may include information like your name, date of birth, contact details (including address, email address, phone number or mobile telephone number), bank account and credit card details, information to prove your identity (driver’s license or another approved ID), account username or password and your use of our products and services.
We may also collect more in-depth information including:
- Financial and Credit information related to your financial relationship with us, such as your financial details, payment history, credit history, and your service history.
- Information about your products and services including device-specific information such as your hardware model, operating system version, unique device and service identifiers, device status, serial numbers, settings, configuration and software and mobile network information.
- Information about how you use your products and services such as:
- Your network usage including time and duration of your communications as well as information about the operation of the equipment, services and applications you use on our networks .
- How you use our services to access the internet, such as the location of your devices when you are using our products and services.
- Information that allows us to identify you for verification purposes.
- Technical Information about your products and services including details about our network performance including information about how you use our networks.
Some of the information collected may be sensitive information. If we need this type of information, we’ll ask you for information in accordance with applicable law.
You might also need to provide personal information about other individuals to us (e.g. about your authorised representative). If so, we rely on you to have informed those individuals that you are giving their personal information to us and to have advised them about this statement. It is important to be aware that if you access another party’s website or application using one of our products, that other party will deal with your personal information in accordance with its own privacy policy.
3. How do we collect your information
We collect personal information in the following ways:
We collect information directly from you when you:
- Or your representative interacts with either us or one of our trusted partners. This might happen when you are setting up an account with us or using one of our products or services;
- Order and/or register for a product or a service;
- Interact with technical support and sales teams;
- Use our website or social media sites;
- Share information with us via forms, for example when you register for our trainings, events and newsletters.
- Apply for a job with us.
We may also collect information about you:
- From external sources like credit reports and marketing mailing lists;
- Commercially available information. This can also include information gained from our partners, these partners include our business and commercial partners, and other affiliates;
4. How do we store your information
We take all reasonable steps to securely store your information using a combination of technical solutions, security controls and internal processes to protect information and our network from unauthorised use, modification, access and disclosure.
We may store your information in hard copy or electronic format and keep it in storage facilities that we own and operate ourselves.
We endeavour to ensure that information is kept as current as possible and that irrelevant data is deleted or made anonymous as soon as reasonably practicable. However, some information may be retained for varying time periods in order to comply with legal and regulatory obligations and for other legitimate business reasons.
5. How do we use your information
We may use your personal information in the ways as outlined below:
- To help us properly manage the products and services we provide to you. We also use your information for charging and billing and to identify potential breaches of our terms and conditions of service.
- Communicate with you in order to provide you with our products, upgrades and services via email, SMS and social media.
- Processing orders and applications and to enroll you as our customer.
- Verifying identity, carrying out credit checks and reporting.
- Generating bills, managing account, and carrying out debt-recovery.
- Development of our products and services.
- Communicate to you about all our products, services and offers that are relevant and are of interest to you. We may use the information we hold to market and promote them directly to you.
- Identifying your location so we can send you emergency alerts.
- Protecting our network and managing the data use and other uses of our network.
- Training our staff.
6. When do we share your information
We do not sell any information. We may share your information with other parties who provide services to us, including partners and contractors that assist us with providing our business processes and products and services. These services include:
- Providing, managing or administering your product or service including customer enquiries and support services.
- Installation, maintenance and repair services.
- Mailing operations, billing and debt-recovery functions.
- Information technology and network services.
- Development, analysis and business intelligence functions.
- Your authorised representatives or legal advisers
- Third parties when you ask us to do so or when you consent to that disclosure for the purposes of preventing or investigation fraud, crime or misconduct relating to your account or services.
- Credit providers or credit-reporting agencies for identity checking and credit related purposes such as credit-worthiness, credit rating, default listing, credit provision and financing under privacy act and credit reporting legislation.
- Our dealers, business or commercial partners, legal advisers and other businesses we work with
- The manager of the Integrated Public Number Database (IPND), and other organisations as required or authorised by law (please see www.acma.gov.au for more information)
- Law enforcement and national security agencies, and other government and regulatory authorities as required or authorised by law
- For the purposes of facilitating or implementing a transfer/ sale of all or part of our assets or business.
7. How can you access or correct your information
To ensure that we are able to provide you with the best products and services possible, it’s important that you make sure the information we hold about you is accurate, up-to-date and complete. If any of your details change you may contact us using the contact details below. You also have the right to request a copy of your information that we hold about you. There is no charge to submit a request or to correct information, however we may apply an administrative charge for providing access to your information on request. To make this request email us at privacy@m2mconnectivity.com.au
8. How can you make a privacy complaint
You can also use our contact details to notify us of any privacy complaint you have against us. If you believe your privacy has been compromised, please contact us. We are committed to acknowledging your complaint in a prompt manner and will give you an estimated timeframe on the response to the complaint.
While we hope that we will be able to resolve any complaints you may have without needing to involve third parties, you may also be able to lodge a complaint with a relevant regulator such as the Australian Information Commissioner or the Telecommunications Industry Ombudsman.
9. How can you contact us
If you have any questions in relation to this Privacy Statement, our management of your information or you would like a copy of this statement sent to you, please call us on (03) 9696 3011 or email us at privacy@m2mconnectivity.com.au. The office hours are Monday-Friday 8 am-5 pm EST. You can also download a pdf copy of this statement on our website, at www.m2mconnectivity.com.au/privacy-statement
Contact Details:
EMAIL: privacy@m2mconnectivity.com.au
PHONE: +61 3 8378 2650