SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Trustable Technology Mark
A trustmark for the Internet of Things
10 October 2018
Peter Bihr (@peterbihr)
This work is created as part of a
Mozilla Fellowship. Unless otherwise
noted, Creative Commons BY-SA 4.0.
trustabletech.org is an 

initiative by ThingsCon e.V. 

with support from Mozilla.
The Trustable Technology mark
empowers consumers to make
informed decisions & 

enables companies to prove their
connected products are trustworthy.
Peter Bihr
ThingsCon
Mozilla Fellow
Project lead
thingscon.com

thewavingcat.com

@peterbihr
Jason Schultz
NYU Law
Mozilla Fellow
Legal
theendofownership.com

its.law.nyu.edu

@lawgeek
Peter Thomas
University of Dundee
Logo & Brand
tompigeon.com

dundee.ac.uk/djcad
The Internet of Things increasingly touches
all aspects of our lives, but mostly it consists
of black boxes. We need to make sure that
we can trust them.
Consumers have little insight into how any
one connected product works, what it even
might be capable of, or if the company
employs good, responsible data practices.
This is not an oversight on the consumers'
side: We lack the tools to find out.
Why do we need
a trustmark?
Amazon Echo.
Image: Frmorrison, CC (BY-SA 3.0)
4 questions that we should be able to answer
for every connected device.
But for connected products, these are very
hard questions to answer.
A simple
litmus test
Source: The Waving Cat (CC BY)
Does it do anything I
wouldn’t expect?
Is the organization
trustworthy?
Is it made using
trustworthy processes?
Does it do what I expect
it to do?
The trustmark is aspirational and aims to
raise the bar at the top of the pyramid.
This work is driven by values, not
pragmatism. This needs to exist in order to
get to a better IoT, and a better society.
We believe that good ethics are good for
business.
Our Goal
A trustmark to aim higher. -
find out more on medium.com
Trustable Tech mark
Baseline certification
Great
Good
Bad
Those companies who already build
trustworthy products have already done the
“hard” work. For them, documenting their
work is easy and quick.
However, if a company just isn’t there yet,
they need to go back and put in more effort.
Characteristics
Peter Bihr (CC-BY-SA) Hard to earn
Valuable/Meaningful
Easy to apply
The trustmark
should be
A trustmark
for IoT
Building consumer trust in the
Internet of Things by empowering
users to make smarter choices.
A ThingsCon Report commissioned
by Mozilla’s Open IoT Studio.
Open IoT Studio
Our 2017 trustmark research has received
great feedback and reach.
Among other things it was quoted extensively
in Brazil’s National IoT Plan.
Now we want to put our research into action.
Early feedback
& successes
Find out more
https://www.thingscon.com/report-a-
trustmark-for-iot
Why should a
company sign up?
Fairphone
Image by Fairphone, CC (BY-SA 2.0)
This trustmark communicates a
company’s commitment to a higher
standard, and allows them to prove their
connected products are trustworthy.
The trustmark increases consumer trust
by demonstrating commitment to
exemplary levels of transparency,
openness and responsibility.
The trustmark will attract talent: We
believe that only the best companies
attract the best talent, and strong vision
& values are a key aspect.
We’re proposing a trustmark for IoT that
increases transparency and empowers
consumers to make better decisions.
It takes a holistic approach that goes beyond
just the device and includes procedural and
organizational aspects. The prototype phase
will focus on voice-enabled IoT (smart
speakers, etc.)
How will it work?
Find out more
https://www.thingscon.com/report-a-
trustmark-for-iot
Evaluates 5 key dimensions
Is pledge-based (self-certification)
Verified through publicly accessible
documentation
(Mostly) decentralized
Openly licensed and free to use
The trustmark evaluates compliance with 5
dimensions that we identified in our initial
research* as most crucial for consumers
Dimensions
*See A Trustmark for IoT (2017), p. 56
Privacy & Data Practices

How respectful of privacy? Is it designed using state of the art data
practices?
Transparency

Is it obvious to users what the device does and how data might be used?
Security

Is it designed and built using state of the art security practices and
safeguards?
Stability

How robust? How long a lifecycle to expect?
Openness

How open are device and manufacturer? Is open data used or generated?
What will
we evaluate?
Input
What goes into making a
product?


In the textile world,
Bluesign is a trustmark
that demonstrates that
an apparel manufacturer
uses sustainable, eco-
friendly materials
Process
How is a product made?

Fairtrade with their
strong focus on
sustainable farming
practices and good
labour conditions
Output
What is the product like
when it’s finished?


CE certification confirms
that the final product
fulfills certain EU quality
and safety requirements
Trust
The trustmark documentation shall be
provided in a standardized form to allow for
third parties to offer services on top of this
foundation, like editorials, ratings & reviews.
In year 1 we will learn and prototype, to
develop the concept to a stage of maturity to
be launch-ready.
The foundation of
an ecosystem
Self-assessment
tool
Trustmark
readiness
Trustmark
• Doubles to assess
readiness and to verify
compliance
• Our experts review
applications and follow
up for clarification if
necessary
• 3rd party advisory
services like security
consultancy
• Non-public / between
companies and their
advisors
• Once passed, the
trustmark can be used
and the evaluation is
published
• Underlying
assessment (results of
self-evaluation tool) is
available online
3rd party
services
• Open licensing of the
self-assessments
enable 3rd party
services (analysis,
rankings, etc.)
Out of scope
(3rd parties)
In scope
(project core)
Out of scope
(3rd parties)
Elements of a
trustmark system
How does it
work?
Self-
assessment
Company fills in the self-
assessment tool, an online
application form that
consists of yes/no questions
plus explanations.
Should the company find it
hard to answer questions,
they have identified a
weakness.
Application
review
Trustmark
issued
If the application passes, the
results are fully published
online.
If contested questions
cannot be resolved, the
trustmark is not issued and
the results will not be
published.
The step by step explainer.
The company itself is the
final judge if they fulfill or
do not yet fulfill the
trustmark criteria.
The stick is in the public
accountability once the
company decides to use
the trustmark and the self-
assessment results are
published in full.
1 2 3
There’s always a human in
the loop.
Our experts review the
application. If necessary,
they follow up for
clarification.
Format &
examples
The format for the checklist is standardized
as checkbox [Yes/No/Not Applicable) plus a
text field to elaborate. If the answer is Yes or
Not Applicable then the text field must be
filled in with an explainer. (No always means 0
points.)
The evolving checklist is available for review
and input (via comments) here.
Privacy & Data Practices
Do you employ Privacy-by-Design best practices?
Is your product GDPR compliant?
Do you have an easy-to-understand privacy and
data policy?
Can users easily perform a factory reset?
Can users easily export their data?
Some example questions. This checklist
partially builds on the “Open #iotmark
principles” (iotmark.org, CC BY-SA 4.0).
A the core of the process is a self-
assessment tool: A questionnaire that helps
organizations assess their trustmark
readiness.
This tool is aligned with the product
development process, so it can also double
as a checklist to help along the process of
developing a trustworthy connected product,
and to identify potential weaknesses.
Self-Assessment
Tool
Trustable Tech Self-Assessment Tool
question sample (draft)
Format &
examples
This is what a sample extract of the published
documentation would look like.
Privacy & Data Practices
☑ Do you employ Privacy-by-Design best practices?
We strictly follow privacy-by-design practices. We also prioritize privacy
at every step of the process and in all our decision-making: We strictly
minimize the data we collect from users, and never keep non-essential
data. For example, during the device setup users are by default opted
out of every non-essential data collection option, even if this comes at
the expense of personalization options. We further have offer a privacy-
navigator feature that helps users better understand what happens with
their voice and location data should they decide to opt in. Furthermore,
we have a strict policy that makes sure that in case of bankruptcy or an
acquisition, user data is not part of the companies assets that might be
transferred to new ownership but deleted unless users specifically opt-
in to having their data transferred. This policy is available here:
product.com/datapolicy.
☑ Can users easily export their data?
A full data export of all user data, including all inferred data and
explanations, is available prominently from the user account page
(product.com/useraccount). The data can be exported in JSON or
XML, or a simple HTML dump. Should new industry standards for this
kind of data emerge and gain traction, we guarantee to make them an
export option as well within two months.
What does a
trustmark mean
legally?
THE CERTIFICATION MARK, AS USED BY PERSONS AUTHORIZED BY CERTIFIER,
CERTIFIES THAT, IN THE OPINION OF APPLICANT'S RATING OR APPEALS BOARDS, MOST
AMERICAN PARENTS WILL CONSIDER THE MOTION PICTURE INAPPROPRIATE FOR
VIEWING BY ANYONE UNDER THE AGE OF 18, BY REASON OF ITS DEPICTION OR
TREATMENT OF VIOLENCE OR SEX OR ABERRATIONAL BEHAVIOR OR DRUG ABUSE, OR
A COMBINATION OF THESE OR OTHER ELEMENTS.
The certification mark, as used by persons authorized by the certifier, certifies that the goods and
services provided are in compliance with Kosher dietary food preparation and handling standards.
The Code of Jewish Law, as codified by Rabbi Yosef Karo with the glosses of Moses Isserles
(The Rema) and other authorities, is the standard by which the certifier certifies that the goods and
services are in compliance with Kosher dietary food preparation and handling standards.
This is a project in an early stage. We’re
looking in a number of areas. Particularly
we’re looking for…
Pathways to
partnerships &
participation
Academic partners to accompany the
development of this trustmark

Commercial partners to help us test
our requirements list against their
existing or upcoming products

Non-profit and media partners who
can help us understand what they
need in order to build third-party
offerings on top of a trustmark
Peter Bihr
peter@thewavingcat.com
ThingsCon e.V.
thingscon.com
trustabletech.com
Thank you.
Questions? Please get in touch.

Mais conteúdo relacionado

Mais procurados

March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineHector Hoyos
 
Iapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersIapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersArmstrongsmith
 
IBM Watson in the Cognitive Era
IBM Watson in the Cognitive EraIBM Watson in the Cognitive Era
IBM Watson in the Cognitive EraSteven Miller
 
Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Daniel Chun
 
Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015Huw Hopkin
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
 
The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...Merry D'souza
 
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Kevin Neal
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformationPaula Calvo Lopez
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD InfrastructureMelissa Andrews
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Technology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRMTechnology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRMAshley Leonzio
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014Enterprise Mobile
 
Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...
Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...
Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...Economic Strategy Institute
 
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)Teo Caiying (Kyleigh)
 
Most admired companies to watch 2019
Most admired companies to watch  2019Most admired companies to watch  2019
Most admired companies to watch 2019CIO Look Magazine
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 

Mais procurados (20)

March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Iapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersIapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And Answers
 
IBM Watson in the Cognitive Era
IBM Watson in the Cognitive EraIBM Watson in the Cognitive Era
IBM Watson in the Cognitive Era
 
Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)
 
Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...
 
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformation
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Technology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRMTechnology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRM
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014
 
Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...
Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...
Pervasive, intelligent cloud ecosystems, spectacular firms and frontier firms...
 
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
 
Most admired companies to watch 2019
Most admired companies to watch  2019Most admired companies to watch  2019
Most admired companies to watch 2019
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 

Semelhante a ThingsCon: Trustable Tech Mark (10 Oct 2018)

Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDeepakGupthaS
 
Problem And Purpose Of A Project
Problem And Purpose Of A ProjectProblem And Purpose Of A Project
Problem And Purpose Of A ProjectChristina Valadez
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
CFOshared Media Kit 2016
CFOshared Media Kit 2016CFOshared Media Kit 2016
CFOshared Media Kit 2016Mike Kelly
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Introducing SPCS™ - spocto's Psychography based Credit Scoring
Introducing SPCS™ - spocto's Psychography based Credit ScoringIntroducing SPCS™ - spocto's Psychography based Credit Scoring
Introducing SPCS™ - spocto's Psychography based Credit Scoringspocto
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 

Semelhante a ThingsCon: Trustable Tech Mark (10 Oct 2018) (20)

Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Open #iotmark certification mark
Open #iotmark certification markOpen #iotmark certification mark
Open #iotmark certification mark
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smarties
 
Problem And Purpose Of A Project
Problem And Purpose Of A ProjectProblem And Purpose Of A Project
Problem And Purpose Of A Project
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
CFOshared Media Kit 2016
CFOshared Media Kit 2016CFOshared Media Kit 2016
CFOshared Media Kit 2016
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Introducing SPCS™ - spocto's Psychography based Credit Scoring
Introducing SPCS™ - spocto's Psychography based Credit ScoringIntroducing SPCS™ - spocto's Psychography based Credit Scoring
Introducing SPCS™ - spocto's Psychography based Credit Scoring
 
Project report on cctv
Project report on cctvProject report on cctv
Project report on cctv
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 

Mais de Peter Bihr

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksPeter Bihr
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsPeter Bihr
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Peter Bihr
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderPeter Bihr
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingPeter Bihr
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsPeter Bihr
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of productionPeter Bihr
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsPeter Bihr
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationPeter Bihr
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT MeetupPeter Bihr
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work TalkPeter Bihr
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsPeter Bihr
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITPeter Bihr
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropePeter Bihr
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoPeter Bihr
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...Peter Bihr
 

Mais de Peter Bihr (19)

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarks
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky Things
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - Forecasting
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of Things
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of production
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of Things
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open Innovation
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT Meetup
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work Talk
 
ClueCamp
ClueCamp ClueCamp
ClueCamp
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of Things
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-IT
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
 

Último

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

ThingsCon: Trustable Tech Mark (10 Oct 2018)

  • 1. Trustable Technology Mark A trustmark for the Internet of Things 10 October 2018 Peter Bihr (@peterbihr) This work is created as part of a Mozilla Fellowship. Unless otherwise noted, Creative Commons BY-SA 4.0. trustabletech.org is an 
 initiative by ThingsCon e.V. 
 with support from Mozilla.
  • 2. The Trustable Technology mark empowers consumers to make informed decisions & 
 enables companies to prove their connected products are trustworthy.
  • 3. Peter Bihr ThingsCon Mozilla Fellow Project lead thingscon.com
 thewavingcat.com
 @peterbihr Jason Schultz NYU Law Mozilla Fellow Legal theendofownership.com
 its.law.nyu.edu
 @lawgeek Peter Thomas University of Dundee Logo & Brand tompigeon.com
 dundee.ac.uk/djcad
  • 4. The Internet of Things increasingly touches all aspects of our lives, but mostly it consists of black boxes. We need to make sure that we can trust them. Consumers have little insight into how any one connected product works, what it even might be capable of, or if the company employs good, responsible data practices. This is not an oversight on the consumers' side: We lack the tools to find out. Why do we need a trustmark? Amazon Echo. Image: Frmorrison, CC (BY-SA 3.0)
  • 5. 4 questions that we should be able to answer for every connected device. But for connected products, these are very hard questions to answer. A simple litmus test Source: The Waving Cat (CC BY) Does it do anything I wouldn’t expect? Is the organization trustworthy? Is it made using trustworthy processes? Does it do what I expect it to do?
  • 6. The trustmark is aspirational and aims to raise the bar at the top of the pyramid. This work is driven by values, not pragmatism. This needs to exist in order to get to a better IoT, and a better society. We believe that good ethics are good for business. Our Goal A trustmark to aim higher. - find out more on medium.com Trustable Tech mark Baseline certification Great Good Bad
  • 7. Those companies who already build trustworthy products have already done the “hard” work. For them, documenting their work is easy and quick. However, if a company just isn’t there yet, they need to go back and put in more effort. Characteristics Peter Bihr (CC-BY-SA) Hard to earn Valuable/Meaningful Easy to apply The trustmark should be
  • 8. A trustmark for IoT Building consumer trust in the Internet of Things by empowering users to make smarter choices. A ThingsCon Report commissioned by Mozilla’s Open IoT Studio. Open IoT Studio Our 2017 trustmark research has received great feedback and reach. Among other things it was quoted extensively in Brazil’s National IoT Plan. Now we want to put our research into action. Early feedback & successes Find out more https://www.thingscon.com/report-a- trustmark-for-iot
  • 9. Why should a company sign up? Fairphone Image by Fairphone, CC (BY-SA 2.0) This trustmark communicates a company’s commitment to a higher standard, and allows them to prove their connected products are trustworthy. The trustmark increases consumer trust by demonstrating commitment to exemplary levels of transparency, openness and responsibility. The trustmark will attract talent: We believe that only the best companies attract the best talent, and strong vision & values are a key aspect.
  • 10. We’re proposing a trustmark for IoT that increases transparency and empowers consumers to make better decisions. It takes a holistic approach that goes beyond just the device and includes procedural and organizational aspects. The prototype phase will focus on voice-enabled IoT (smart speakers, etc.) How will it work? Find out more https://www.thingscon.com/report-a- trustmark-for-iot Evaluates 5 key dimensions Is pledge-based (self-certification) Verified through publicly accessible documentation (Mostly) decentralized Openly licensed and free to use
  • 11. The trustmark evaluates compliance with 5 dimensions that we identified in our initial research* as most crucial for consumers Dimensions *See A Trustmark for IoT (2017), p. 56 Privacy & Data Practices
 How respectful of privacy? Is it designed using state of the art data practices? Transparency
 Is it obvious to users what the device does and how data might be used? Security
 Is it designed and built using state of the art security practices and safeguards? Stability
 How robust? How long a lifecycle to expect? Openness
 How open are device and manufacturer? Is open data used or generated?
  • 12. What will we evaluate? Input What goes into making a product? 
 In the textile world, Bluesign is a trustmark that demonstrates that an apparel manufacturer uses sustainable, eco- friendly materials Process How is a product made?
 Fairtrade with their strong focus on sustainable farming practices and good labour conditions Output What is the product like when it’s finished? 
 CE certification confirms that the final product fulfills certain EU quality and safety requirements Trust
  • 13. The trustmark documentation shall be provided in a standardized form to allow for third parties to offer services on top of this foundation, like editorials, ratings & reviews. In year 1 we will learn and prototype, to develop the concept to a stage of maturity to be launch-ready. The foundation of an ecosystem
  • 14. Self-assessment tool Trustmark readiness Trustmark • Doubles to assess readiness and to verify compliance • Our experts review applications and follow up for clarification if necessary • 3rd party advisory services like security consultancy • Non-public / between companies and their advisors • Once passed, the trustmark can be used and the evaluation is published • Underlying assessment (results of self-evaluation tool) is available online 3rd party services • Open licensing of the self-assessments enable 3rd party services (analysis, rankings, etc.) Out of scope (3rd parties) In scope (project core) Out of scope (3rd parties) Elements of a trustmark system
  • 15. How does it work? Self- assessment Company fills in the self- assessment tool, an online application form that consists of yes/no questions plus explanations. Should the company find it hard to answer questions, they have identified a weakness. Application review Trustmark issued If the application passes, the results are fully published online. If contested questions cannot be resolved, the trustmark is not issued and the results will not be published. The step by step explainer. The company itself is the final judge if they fulfill or do not yet fulfill the trustmark criteria. The stick is in the public accountability once the company decides to use the trustmark and the self- assessment results are published in full. 1 2 3 There’s always a human in the loop. Our experts review the application. If necessary, they follow up for clarification.
  • 16. Format & examples The format for the checklist is standardized as checkbox [Yes/No/Not Applicable) plus a text field to elaborate. If the answer is Yes or Not Applicable then the text field must be filled in with an explainer. (No always means 0 points.) The evolving checklist is available for review and input (via comments) here. Privacy & Data Practices Do you employ Privacy-by-Design best practices? Is your product GDPR compliant? Do you have an easy-to-understand privacy and data policy? Can users easily perform a factory reset? Can users easily export their data? Some example questions. This checklist partially builds on the “Open #iotmark principles” (iotmark.org, CC BY-SA 4.0).
  • 17. A the core of the process is a self- assessment tool: A questionnaire that helps organizations assess their trustmark readiness. This tool is aligned with the product development process, so it can also double as a checklist to help along the process of developing a trustworthy connected product, and to identify potential weaknesses. Self-Assessment Tool Trustable Tech Self-Assessment Tool question sample (draft)
  • 18. Format & examples This is what a sample extract of the published documentation would look like. Privacy & Data Practices ☑ Do you employ Privacy-by-Design best practices? We strictly follow privacy-by-design practices. We also prioritize privacy at every step of the process and in all our decision-making: We strictly minimize the data we collect from users, and never keep non-essential data. For example, during the device setup users are by default opted out of every non-essential data collection option, even if this comes at the expense of personalization options. We further have offer a privacy- navigator feature that helps users better understand what happens with their voice and location data should they decide to opt in. Furthermore, we have a strict policy that makes sure that in case of bankruptcy or an acquisition, user data is not part of the companies assets that might be transferred to new ownership but deleted unless users specifically opt- in to having their data transferred. This policy is available here: product.com/datapolicy. ☑ Can users easily export their data? A full data export of all user data, including all inferred data and explanations, is available prominently from the user account page (product.com/useraccount). The data can be exported in JSON or XML, or a simple HTML dump. Should new industry standards for this kind of data emerge and gain traction, we guarantee to make them an export option as well within two months.
  • 19. What does a trustmark mean legally? THE CERTIFICATION MARK, AS USED BY PERSONS AUTHORIZED BY CERTIFIER, CERTIFIES THAT, IN THE OPINION OF APPLICANT'S RATING OR APPEALS BOARDS, MOST AMERICAN PARENTS WILL CONSIDER THE MOTION PICTURE INAPPROPRIATE FOR VIEWING BY ANYONE UNDER THE AGE OF 18, BY REASON OF ITS DEPICTION OR TREATMENT OF VIOLENCE OR SEX OR ABERRATIONAL BEHAVIOR OR DRUG ABUSE, OR A COMBINATION OF THESE OR OTHER ELEMENTS. The certification mark, as used by persons authorized by the certifier, certifies that the goods and services provided are in compliance with Kosher dietary food preparation and handling standards. The Code of Jewish Law, as codified by Rabbi Yosef Karo with the glosses of Moses Isserles (The Rema) and other authorities, is the standard by which the certifier certifies that the goods and services are in compliance with Kosher dietary food preparation and handling standards.
  • 20. This is a project in an early stage. We’re looking in a number of areas. Particularly we’re looking for… Pathways to partnerships & participation Academic partners to accompany the development of this trustmark Commercial partners to help us test our requirements list against their existing or upcoming products Non-profit and media partners who can help us understand what they need in order to build third-party offerings on top of a trustmark