Internet of Things (IoT) Privacy and Data Governance
Learn about IoT privacy and governance, including security and privacy challenges and issues, privacy standards, and data governance frameworks and goals.
Top Stories
-
Tip
22 Feb 2022
Top 4 IoT data privacy issues developers must address
Regulatory changes mean changes for IoT device creation. Design considerations around API permissions, AI data set bias and physical access can improve product security. Continue Reading
-
Opinion
06 Jan 2022
IoT ethics must factor into privacy and security discussions
With the adoption of IoT devices, consumers voluntarily trade privacy for the convenience of instant connectivity. Organizations must consider the ethics of their data collection. Continue Reading
-
Feature
12 Nov 2021
Facebook facial recognition technology ban: Will it hold?
The social media network's use of the technology led to criticism. Some think the technology may soon be rebranded or used on Facebook parent company Meta's other platforms. Continue Reading
-
Guest Post
19 Oct 2021
Building IoT strategies around trust
IoT technology can improve operational performance, safety and security, but organizations must take steps to ensure the trust of employees and customers. Continue Reading
-
Guest Post
06 Oct 2021
Why IoT should become the 'internet of transparency'
IoT devices run on opaque, proprietary algorithms that erode the public's trust in smart technology and hamper its adoption. The industry must bring IoT algorithms into the light. Continue Reading
-
Guest Post
11 Aug 2021
IoT legislation device manufacturers need to know about
To avoid penalties and meet government agency requirements, IoT device manufacturers must adhere to new standards and regulations. Learn the latest here. Continue Reading
-
Blog Post
16 Apr 2021
New IoT Cybersecurity Improvement Law is a start, not a final solution
Even though the new IoT Cybersecurity Improvement Law takes a step towards better connected device protections, organizations still have many cybersecurity challenges to tackle. Continue Reading
-
Blog Post
14 Jan 2021
Flying IoT introduces new opportunities, security vulnerabilities
IoT is now taking to the sky in the form of drones. While these devices offer insurmountable business opportunities, the inherent security vulnerabilities leave some businesses unsure. Continue Reading
-
Feature
11 Dec 2020
Understand the IoT Cybersecurity Improvement Act, now law
Federal action through the IoT Cybersecurity Improvement law aims to create more security in the U.S. government's IoT infrastructure, but it could boost security across all sectors. Continue Reading
-
Blog Post
11 Dec 2020
Defeating pandemic attack trends on IoT and consumer devices
Training, threat intelligence and a comprehensive security strategy will ensure organization can fight threats that arise from the ever-increasing contingent of IoT devices. Continue Reading
-
Blog Post
27 Oct 2020
How to deal with IoT device proliferation
Malicious attackers have begun to strategically target IoT devices to gain access to corporate networks. Security teams must employ new tactics, such as deceptive techniques, to draw out attackers. Continue Reading
-
Blog Post
22 Oct 2020
Addressing the increase in IoT-based attacks driven by remote work
Following work-from-home ordinances due to COVID-19, business leaders must accept that employees’ IoT devices present a much greater risk now that they are used outside the company’s security fence. Continue Reading
-
Blog Post
16 Oct 2020
The key to contact tracing lies within IoT security
As people continue to adjust to COVID-19 prevention measures, including contact tracing, monitoring and IoT-enabled devices, the data collection process must be transparent, secure and reliable. Continue Reading
-
Blog Post
06 Aug 2020
Endpoint protection requires a real-time solution
As cyberattacks become significantly more sophisticated, organizations must invest in endpoint protection and response solutions to detect and prevent real-time cyberthreats. Continue Reading
-
Blog Post
21 Jul 2020
Reasons why healthcare must invest in medical equipment safeguards
The COVID-19 pandemic has introduced several ways for cybercriminals to attack the healthcare sector. As a result, hospitals and healthcare providers must seriously consider investing in security ... Continue Reading
-
Blog Post
14 Jul 2020
Just-in-time anomaly detection for IoT security in the age of 5G
Anomaly detection is changing standards for security across industries. Organizations that rely on 5G will benefit from anomaly detection’s ability to improve productivity and operational efficiencies. Continue Reading
-
Blog Post
25 Jun 2020
Threats posed by IoT insecurity in a new WFH era
Following the COVID-19 pandemic, CIOs must start taking cybersecurity seriously by removing simple IoT vulnerabilities to better protect enterprise and home networks. Continue Reading
-
Blog Post
01 Jun 2020
Class suits may present the quickest way to a safer connected world
IoT products remain insecure by design. Dalin Robinson suggests bringing class action lawsuits to vendors of insecure connected products, which forces vendors to take security design into account. Continue Reading
-
Blog Post
26 May 2020
What work from home means for IoT Security
With remote work likely to remain in place for the foreseeable future, organizations must decide what an acceptable tolerance level is between keeping the business running and making security a ... Continue Reading
-
Tip
13 Apr 2020
Building security, privacy and trust in IoT deployments
The T in IoT doesn't stand for trust, but it's a critical component of any IoT deployment. Follow the AEIOU vowel framework for an actionable blueprint of building trust in IoT. Continue Reading
-
Blog Post
25 Mar 2020
In data privacy we trust: Solving the connected cities conundrum
Data providers need to be smart about data governance when it comes to creating smart cities that ensure security and privacy are not sacrificed for the sake of convenience and opportunistic ... Continue Reading
-
Blog Post
02 Mar 2020
Securing the IoT and cloud connection
Many IoT devices have processing capabilities but lack sufficient security, which makes them a preferred target for cybercriminals. As a result, users must protect their connections between IoT ... Continue Reading
-
Blog Post
21 Feb 2020
How do you know you can trust your IoT device?
Manufacturers can ensure their IoT devices are secure and build trust with their consumers by participating in cyber certification programs. Continue Reading
-
Feature
19 Feb 2020
Standards for data sharing should guide AI government regulation
The White House has taken a deregulatory approach to AI and aims to inspire innovation. An expert weighs in on the role of government in AI and where the industry stands. Continue Reading
-
Blog Post
19 Feb 2020
Navigating the uncharted territory of IoT standards
Addressing the security of IoT devices early on in the development process enables organizations to better manage, control and integrate these devices into their infrastructures. Continue Reading
-
Opinion
17 Feb 2020
IoT data monetization contributes to surveillance capitalism
In a world of unfettered digital data sharing, IoT providers must understand how connected devices and data collection without regulation influences the economy and society. Continue Reading
-
Blog Post
11 Feb 2020
Ring device hacks highlight need for stronger IoT security
Hackers are always devising new methods of attack. Staying abreast of new attack vectors, ensuring compliance and building security into IoT devices will provide defense against future cyberattacks. Continue Reading
-
Feature
31 Jan 2020
How and why are our devices listening to us?
Consumers are utilizing digital voice assistants and smartphones but may not realize how frequently companies listen in and sift through all the data these devices create. Continue Reading
-
Tip
20 Nov 2019
IoT security regulations refocus data privacy best practices
New and old IoT regulations create a maze of rules and best practices that organizations must navigate to become more transparent about their IoT security practices. Continue Reading
-
Blog Post
13 Nov 2019
Can trusted data exchanges help grow ethical AI?
Organizations are developing AI technology rapidly, which makes it even more vital for IT pros to understand the ethics around AI and data security. Continue Reading
-
Blog Post
06 Nov 2019
The breach with the longest shelf-life: Healthcare
IoT in healthcare provides great benefits for patients and healthcare providers, but providers must also secure IoMT devices and protect patient health data. Continue Reading
-
Tip
29 Oct 2019
IoT and AI push tech ethics to the forefront of development
AI and IoT sensors have tied humans and machines closer than ever without much hesitation, but organizations must learn to apply ethics in technology development. Continue Reading
-
Blog Post
18 Oct 2019
Why connected devices aren’t always as smart as you think
IoT device security is integral to keeping consumer data safe. Everyone must educate themselves on how to protect their valuable data, and manufacturers are obligated to do the same. Continue Reading
-
Blog Post
17 Oct 2019
How do you know your AI is making the right choices?
When human beings are removed from decision making processes, it can raise questions about how artificial intelligent reached its conclusions. Access to raw data, transparency and knowledge graphs ... Continue Reading
-
Blog Post
10 Oct 2019
How to protect data privacy in connected cars
Modern cars contain advanced technologies and personal data susceptible to security breaches. To protect customer data, car manufacturers must implement built-in security measures beforehand. Continue Reading
-
Tip
24 Sep 2019
IoT data privacy forces organizations to rethink data ownership
Now more than ever, providers of IoT devices and experiences play an integral role in addressing IoT data privacy issues and influencing outcomes, market forces and societal health. Continue Reading
-
Blog Post
06 Sep 2019
Software insecurity in IoT: A problem of our own design
The power to improve IoT security caused by negligent developing practices is in the users hands. Institute for Critical Infrastructure Technology's Parham Eftekhari suggests ways that anyone can ... Continue Reading
-
Tip
03 Sep 2019
IoT product design requires keeping people in mind
Software and AI have changed consumers' expectations of IoT products. IoT designers must incorporate new practices in order to enhance customer experience, instead of erode it. Continue Reading
-
Blog Post
22 Aug 2019
How distributed ledger technology can serve megacities of the future
Atlas City's Christopher Justice, explores the challenges of smart city IoT infrastructures, and how new technologies can enable smart cities to dramatically improve life for megacity inhabitants. Continue Reading
-
Blog Post
21 Aug 2019
IoT brings the physical and digital worlds together
In order to accurately represent business values and show how IoT solves issues, organizations must understand how to bridge the gap between the physical and digital landscape. Continue Reading
-
Tip
14 Aug 2019
Advantages of edge computing reduce data center costs
Moving compute to the edge may seem like a big jump, but the costs associated with centralized data processing drive many organizations to edge computing. Continue Reading
-
Blog Post
13 Aug 2019
Disentangle IoT's legal and ethical considerations
Even expert IT pros can find it challenging to navigate compliance and regulation issues for IoT. When you add in international policies, such as GDPR, there are even more laws and best practices ... Continue Reading
-
Blog Post
12 Aug 2019
As IoT focuses on ease of access, vulnerability management suffers
Although today's devices are better protected than ever, vulnerabilities will always exist. Users who quickly recognize these weaknesses and address them can ensure that their IoT devices stay secure. Continue Reading
-
Blog Post
09 Aug 2019
Automating IoT security requires 20/20 vision
Even though IoT security does not have the same standards as other IT technology, organizations need to prioritize bringing all IoT endpoints under a corporate security policy, Lumeta's Reggie Best ... Continue Reading
-
Blog Post
05 Aug 2019
Autonomous drones come with challenges and great potential
Drones have untapped potential in industrial IoT, but organizations must work through the challenges to successfully implement autonomous drones, Persistent Systems' Continue Reading
-
Tip
30 Jul 2019
Demystify IoT compliance with 3 considerations
IoT has introduced aspects of device management and regulations that organizations must understand to secure an IoT deployment and stay in compliance. Continue Reading
-
Blog Post
29 Jul 2019
U.S. government imposes stricter IoT security measures on D-Link
Historically, IoT security has not been regulated to the extent that other areas of tech have. Northern.tech's Thomas Ryd breaks down recent government actions that are beginning to change that. Continue Reading
-
Feature
25 Jul 2019
IoT Cybersecurity Improvement Act calls for deployment standards
The IoT Cybersecurity Improvement Act would require development of security standards and guidelines for federal IoT devices, but CISOs in the private sector could also benefit. Continue Reading
-
Blog Post
08 Jul 2019
Security controls must keep pace with internet-connected devices
The exponential growth of interconnected devices makes balancing safety and innovation challenging, but deception technology and patch management, advises Attivo Networks' Carolyn Crandall, can ... Continue Reading
-
Blog Post
02 Jul 2019
A sense of place: How IoT sensor data powers smart cities
A smart city is smart because of its data. IoT sensors are key to the smart city data puzzle, explains Geotab's Mike Branch, enabling cities to be more proactive and provide better quality of life ... Continue Reading
-
Blog Post
27 Jun 2019
When your digital transformation isn't transformative enough
A successful digital transformation project requires active work from everyone in an organization, from IT pros to employees. Pivot3's Bruce Milne discusses strategies to keep momentum. Continue Reading
-
Blog Post
19 Jun 2019
Capitalizing on the world's most valuable intangible asset: Data
Intangible assets are increasingly filling corporate balance sheets, up to 80% by some accounts. Vertica's Joy King outlines why data is a key differentiator, as well as why businesses must create ... Continue Reading
-
Blog Post
18 Jun 2019
True IoT security in the energy industry requires continuous compliance
As electric grids and utility plants become increasingly connected, it's critical to assess IoT security measures and cyber-situational awareness. Lumeta Solutions at Firemon's Reggie Best ... Continue Reading
-
Blog Post
07 Jun 2019
How to have a safe connected cyber summer
Fortinet's Anthony Giandomenico offers seven tips to staying safe and connected while in the office or on vacation. From safe Wi-Fi to updating devices, follow these to prevent attacks on connected ... Continue Reading
-
Blog Post
05 Jun 2019
IoT device manufacturers: It's time to secure our children's smartwatches
The very IoT devices people turn to for security and safety are inherently insecure, though they shouldn't be. VGS' Peter Berg outlines three solutions to the very real IoT security problem. Continue Reading
-
Guide
30 May 2019
Mitigate IoT security risks with a strong defense strategy
Whether you've deployed them or not, IoT devices are on your network, potentially creating vulnerabilities. Learn how to avoid IoT security issues before they hit. Continue Reading
-
Feature
29 May 2019
Human rights advocate talks GDPR, AI and data privacy laws
Human rights advocate Bjørn Stormorken talks about the importance of data privacy laws, and why stronger laws and more data literacy are necessary today. Continue Reading
-
Blog Post
23 May 2019
Should connected devices carry an IoT security-star rating?
IoT security is a consumer, manufacturer and government concern. To combat the issue, recommends Nordic Semiconductor's Svein-Egil Nielsen, it's time to put an IoT security-star rating in place. ... Continue Reading
-
Blog Post
17 May 2019
Mastering IoT compliance in a GDPR world
A year after the General Data Protection Regulation went into effect, Lumeta's Reggie Best takes a look at how it has prompted organizations to take IoT security more seriously. Continue Reading
-
Blog Post
16 May 2019
It's time to get serious about securing the internet of things
IoT devices require a mature, proven security mechanism such as public key infrastructure. DigiCert's Dan Timpson discusses the benefits of PKI for IoT and offers the four C's to finding the best ... Continue Reading
-
Blog Post
14 May 2019
Voice assistants, AI and the cloud: An illusion of performance and privacy
Voice assistants often rely on the cloud for AI, which opens a number of security and privacy holes. Snips' Joseph Dureau outlines why voice assistants don't need the cloud, and discusses the ... Continue Reading
-
Blog Post
06 May 2019
Due diligence and compliance in IoT with digital twins and mirrors
As digital twins and mirrored worlds become more commonplace, security managers must consider the risks associated with these virtualized clones. EmeSec's Maria Horton offers best practices for ... Continue Reading
-
Blog Post
01 May 2019
Beyond SB-327: Moving toward true IoT security
While California's CCPA and SB-327 are making strides toward a safer IoT ecosystem, StrongKey's Arshad Noor explains why it's also important to adopt a passwordless method of securing IoT. Continue Reading
-
Blog Post
08 Apr 2019
Protecting the exploding attack surface: A blueprint for government agencies
To protect the ever-expanding attack surface caused by IoT and cloud, Lumeta at Firemon's Reggie Best suggests government agencies adopt cyber-situational awareness in tandem with intent-based ... Continue Reading
-
Blog Post
04 Apr 2019
Securing the 'M' in IoMT to ensure patient safety
Connected medical devices cannot be secured properly by traditional IT security systems or even generic IoT cybersecurity approaches. Cynerio's Leon Lerman discusses why an extra level of ... Continue Reading
-
Blog Post
28 Mar 2019
The new standard for IoT security
When adopting a wireless sensor network to accommodate IoT, it is critical to also adopt a proper IoT data security strategy. Very Good Security's Mahmoud Abdelkader explains what to look for. Continue Reading
-
Tip
22 Mar 2019
Best practices to overcome an IoT security challenge
The internet of things poses numerous security challenges, but with the proper preparation and tools, your enterprise can mitigate the threats. Continue Reading
-
Blog Post
19 Mar 2019
The case for an internet code of conduct
As consumers and enterprises adopt more IoT devices and sensors, should they have to waive expectations of privacy? Qorvo's Cees Links explains why a code of conduct for the internet is so important. Continue Reading
-
Blog Post
12 Mar 2019
Can we ensure consumer IoT privacy while enabling the data marketplace?
IoT data marketplaces could unlock trillions of dollars in value for companies, but doing so while keeping data privacy in mind is critical. ForgeRock's Ashley Stevenson discusses how to build IoT ... Continue Reading
-
Blog Post
05 Feb 2019
Smart biometric template storage often requires a hybrid approach
The use of biometrics for authentication and identification will only grow, but keeping that personally identifiable data safe is another challenge. SensibleVision's George Brostoff explains how a ... Continue Reading
-
Feature
28 Jan 2019
IoT identity management eyes PKI as de facto credential
Public key infrastructure is emerging as the essential technology for identity management in IoT, as customers seek out a trifecta of data integrity, authentication and encryption. Continue Reading
-
Blog Post
23 Jan 2019
Is IoT getting more secure?
New survey data is showing some promising signs when it comes to IoT security, but there's still a long way to go. Gemalto's Gorav Arora outlines how IoT security is improving, where the government ... Continue Reading
-
Blog Post
20 Dec 2018
How today's cars are gathering data to help build autonomous vehicles
For autonomous vehicles to drive themselves in the future, it is critical to collected connected car data. Esurance's Arun Ganesan outlines what data is collected and why, and how it will help get ... Continue Reading
-
Blog Post
11 Dec 2018
IoT cybersecurity: A major concern for agriculture
While IoT offers incredible opportunities for the agricultural industry, IoT cybersecurity in agriculture is seriously neglected. Karina Popova discusses the risk and why action needs to be taken now. Continue Reading
-
Blog Post
15 Nov 2018
I lost my identity at Money20/20 so you don't have to
Living in Digital Times' Robin Raskin subjected herself to numerous identity verification systems at Money20/20. Get her take on biometrics, big data and AI for identity management, from iris scans ... Continue Reading
-
Blog Post
13 Nov 2018
The role of IoT in mobility, smart cities and urban technology
In this Q&A, ITA's Julia Kanouse speaks with Cisco's Chuck Byers about the challenges and next frontiers of IoT in mobility, smart cities and urban technology. Continue Reading
-
Blog Post
12 Nov 2018
Steps carmakers need to make to secure connected car data
High Mobility's Kevin Valdek discusses what carmakers need to do in order to handle the ever-increasing number of consumer concerns about data privacy in connected vehicles. Continue Reading
-
Blog Post
05 Nov 2018
Challenges of data management in the internet of things
Yesterday's approaches to data management are no match for the volume, diversity and interconnectivity that characterize IoT. Equinix's Chiaren Cushing discusses what needs to change -- and how. Continue Reading
-
Blog Post
15 Oct 2018
4 spooky internet of things goblins and how to outsmart them
By delaying IoT adoption, says Cisco's Maciej Kranz, enterprises risk losing out on the transformation potential of the internet of things. Here, he outlines four of the scariest IoT goblins, as ... Continue Reading
-
Blog Post
05 Oct 2018
5 lessons IoHT can learn from the tech world
Healthcare is seeing some of the greatest impact from IoT, creating a new category of connected health devices. VivaLNK's Jiang Li outlines five lessons IoT in healthcare can learn from the broader ... Continue Reading
-
Blog Post
03 Oct 2018
Protecting the internet of things
Cyberattacks targeting IoT devices are on the rise. To combat the threat, says Equinix's Chiaren Cushing, it is an interconnection-oriented architecture and centralized data encryption strategy is ... Continue Reading
-
Blog Post
28 Sep 2018
Getting to advanced-class IoT
To graduate from the 'AOL stage' of IoT to advanced-class IoT, we have to do work in three key areas, as well as ensure inherent trust. Dell Technologies' Jason Shepherd discusses how. Continue Reading
-
Blog Post
04 Sep 2018
How loT is influencing a new cybersecurity era
The rise in IoT cybersecurity must match the explosive growth rates for IoT devices. And as Secure Channel's Richard Blech explains, manufacturers have a key role to play in ensuring IoT security. Continue Reading
-
Blog Post
30 Aug 2018
What is a distributed database system?
The term 'distributed database' is severely overloaded. McObject's Steven Graves cuts through the confusion and explains the various distributed database systems and how they fit into an IoT ... Continue Reading
-
Blog Post
29 Aug 2018
Is facial recognition the killer app for AI?
Facial recognition from security camera images and videos is used to identify people, but it can be biased and cause privacy concerns. IoTDisruptions.com's Sudha Jamthe discusses. Continue Reading
-
Blog Post
02 Aug 2018
Can security keep pace with the rise of the machines?
If we want security measures to keep pace as more and more machines come into existence, we need to be able to reliably determine which machines should be trusted. Gemalto's Gorav Arora discusses. Continue Reading
-
Blog Post
06 Jul 2018
Net neutrality reversal drives privacy concerns for connected car data
Without net neutrality, ISPs and telecom companies can prioritize services according to customer needs. One industry likely to feel the effect of this, explains NCP engineering's Julian Weinberger, ... Continue Reading
-
Blog Post
02 Jul 2018
Developing an IoT policy
While the specifics of an IoT policy will vary between industries and organizations, this framework from the Midwest IoT Council should provide a solid starting point. ITA's Julia Kanouse discusses. Continue Reading
-
Blog Post
29 Jun 2018
IIoT data protection demands new ways of thinking
Just as industrial IoT has changed how industrial organizations operate, says Stratus' Jason Andersen, so too must it change how those organizations protect the data IIoT generates. Continue Reading
-
Blog Post
27 Jun 2018
New mobility and digital identity: The vehicle for success
Digital identity is the ultimate "vehicle for success" that must underpin the new mobility. ForgeRock's Ashley Stevenson reviews the fundamentals of digital identity and explores its value and use ... Continue Reading
-
Blog Post
14 Jun 2018
3D and IoT: Reducing identification friction
Connecting this deluge known as IoT big data to 3D face authentication could deliver a new level of frictionless interaction for all of us. SensibleVision's George Brostoff explains. Continue Reading
-
Blog Post
07 Jun 2018
Data: Its value and its consequences
Data sharing is generally a touted benefit of IoT, but when you pull privacy regulations, anonymization and the utility of the IoT data into the mix, says Red Hat's Gordon Haff, we're facing ... Continue Reading
-
Blog Post
06 Jun 2018
Echoes of Facebook: Edge computing to protect privacy
Edge processing is here to turn the cloud model on its head, says Clearblade's Aaron Allsbrook. Learn how edge computing can help keep data local -- and safe. Continue Reading
-
Blog Post
21 May 2018
What does the GDPR mean for IoT?
The GDPR presents serious challenges for IoT, but they are not insurmountable. Openwave Mobility's Aman Brar explains how the GDPR will affect IoT. Continue Reading
-
Blog Post
18 May 2018
Paranoia and personas: The secure foundation for IoT
Security in IoT cannot be an afterthought. Gemalto's Gorav Arora explains why a healthy level of paranoia and using a persona-based approach are key to securing IoT. Continue Reading
-
Blog Post
16 May 2018
Beyond updates: The need for platform security in IoT
As more and more devices become interconnected, platform security becomes crucial. Factom's Matt Whittington explains how blockchain plays into the equation. Continue Reading
-
Blog Post
16 May 2018
The importance of trust in the machine economy
The progression to a smart, IoT-enabled machine economy can and should be great, says Don DeLoach, but it won't be unless we have trust in the ecosystem. Continue Reading
-
Blog Post
14 May 2018
If everything is connected how will anyone have any privacy?
Deloitte Digital's Robert Schmid explores how privacy affects the three basic segments of IoT and explains security measures to put in place to maintain data privacy in your IoT program. Continue Reading
-
Blog Post
26 Apr 2018
IoT security: Trust is a must
IoT vulnerabilities are being constantly discovered an exposed across all industries. Thales eSecurity's John Grimm discusses why trust in IoT is critical, and offers steps to enabling trust. Continue Reading
-
Feature
23 Apr 2018
The great IoT data ownership debate
IoT is all about the data, but who owns that data? A panel at MIT Connected Things took a look at this question and found it was a tricky one to answer. Continue Reading
-
News
18 Apr 2018
Microsoft takes holistic approach to IoT security concerns
Azure Sphere extends security from the cloud to the device. It's the most holistic approach on the market and provides another example of Microsoft abandoning its insular past. Continue Reading
-
Blog Post
16 Apr 2018
The IoT evolution versus IoT revolution debate in the Cognitive Age
Is IoT an evolution or revolution? OIES Consulting's Francisco Maroto explains why it's critical to look at the Age we are living in to take part in the debate. Continue Reading