SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
ThingsCon. For a human-centric & responsible Internet of Things.
The State of ThingsCon 2018
Magic Monday Torino
Torino 24 Sep 2018
Peter Bihr
@peterbihr
ThingsCon
thingscon.com
@thingscon
ThingsCon fosters the creation of a
human-centric & responsible IoT
Our mission, responsible tech, has
entered the mainstream debate.
Events
Publications
Research
Advocacy
ACTIVITIES
5 years of ThingsCon
bit.ly/riot-report
trustabletech.org
thingscon.com/eventsEVENTS
EVENTS
thingscon.com/events
EVENTS
What’s planned?
thingscon.com/events
bit.ly/riot-report
Christian Villum
David Li
Dries de Roeck
Eduardo Magrani
Elisa Giaccardi
Ester Fritsch
Gaia Scagnetti
Holly Robbins
Iohanna Nicenboim
Irina Shklovski
Iskander Smit
James Pierce
Laura James
Luca van der Heide
Maya Indira Ganesh
Peter Bihr
Rachel Douglas-Jones
Ronaldo Lemos
Seyram Avle
Silvia Lindtner
Simon Höher
State of Responsible IoT
bit.ly/riot-report
trustabletech.org
We asked ourselves: What potential is
there for a trustmark for IoT?
Early wins:

- Referenced in Brazil’s national IoT strategy
- Mozilla support: Fellowship, logistics, media
The Trustable Technology mark
empowers consumers to make
informed decisions & 

enables companies to prove their
connected products are trustworthy.
Peter Bihr
ThingsCon
Mozilla Fellow
Project lead
thingscon.com

thewavingcat.com

@peterbihr
Jason Schultz
NYU Law
Mozilla Fellow
Legal
theendofownership.com

its.law.nyu.edu

@lawgeek
Peter Thomas
University of Dundee
Design
tompigeon.com

dundee.ac.uk/djcad
4 questions that we should be able to answer
for every connected device.
But for connected products, these are very
hard questions to answer.
A simple
litmus test
Source: The Waving Cat (CC BY)
Does it do anything I
wouldn’t expect?
Is the organization
trustworthy?
Is it made using
trustworthy processes?
Does it do what I expect
it to do?
The trustmark is aspirational and aims to
raise the bar at the top of the pyramid.
This work is driven by values, not
pragmatism. This needs to exist in order to
get to a better IoT, and a better society.
We believe that good ethics are good for
business.
Our Goal
A trustmark to aim higher. -
find out more on medium.com
Trustmark
Baseline certification
Great
Good
Bad
Those companies who already build
trustworthy products have already done the
“hard” work. For them, documenting their
work is easy and quick.
However, if a company just isn’t there yet,
they need to go back and put in more effort.
Characteristics
Peter Bihr (CC-BY-SA) Hard to earn
Valuable/Meaningful
Easy to apply
The trustmark
should be
The trustmark evaluates compliance with 5
dimensions that we identified in our initial
research* as most crucial for consumers
Dimensions
*See A Trustmark for IoT (2017), p. 56
Privacy & Data Practices

How respectful of privacy? Is it designed using best data practices?
Transparency

Is it obvious to users what the device does and how data might be used?
Security

Is it designed and built using best security practices and safeguards?
Stability

How robust? How long a lifecycle to expect?
Openness

How open are device and manufacturer? Is open data used or generated?
Self-assessment
tool
Trustmark
readiness
Trustmark
• Doubles to assess
readiness and to verify
compliance
• Our experts review
applications and follow
up for clarification if
necessary
• 3rd party advisory
services like security
consultancy
• Non-public / between
companies and their
advisors
• Once passed, the
trustmark can be used
and the evaluation is
published
• Underlying
assessment (results of
self-evaluation tool) is
available online
3rd party
services
• Open licensing of the
self-assessments
enable 3rd party
services (analysis,
rankings, etc.)
Out of scope
(3rd parties)
In scope
(project core)
Out of scope
(3rd parties)
Elements of a
trustmark system
How does it
work?
Self-
assessment
Company fills in the self-
assessment tool, an online
application form that
consists mostly of yes/no
questions plus explanations.
Should the company find it
hard to answer questions,
they have identified a
weakness.
Application
review
Trustmark
issued
If the application passes, the
results are fully published
online.
If contested questions
cannot be resolved, the
trustmark is not issued and
the results will not be
published.
The step by step explainer.
The company itself is the
final judge if they fulfill or
do not yet fulfill the
trustmark criteria.
The stick is in the public
accountability once the
company decides to use
the trustmark and the self-
assessment results are
published in full.
1 2 3
There’s always a human in
the loop.
Our experts review the
application. If necessary,
they follow up for
clarification.
Format &
examples
This is what a sample extract of the published
documentation would look like.
Privacy & Data Practices
☑ Do you employ Privacy-by-Design best practices?
We strictly follow privacy-by-design practices. We also prioritize privacy
at every step of the process and in all our decision-making: We strictly
minimize the data we collect from users, and never keep non-essential
data. For example, during the device setup users are by default opted
out of every non-essential data collection option, even if this comes at
the expense of personalization options. We further have offer a privacy-
navigator feature that helps users better understand what happens with
their voice and location data should they decide to opt in. Furthermore,
we have a strict policy that makes sure that in case of bankruptcy or an
acquisition, user data is not part of the companies assets that might be
transferred to new ownership but deleted unless users specifically opt-
in to having their data transferred. This policy is available here:
product.com/datapolicy.
☑ Can users easily export their data?
A full data export of all user data, including all inferred data and
explanations, is available prominently from the user account page
(product.com/useraccount). The data can be exported in JSON or
XML, or a simple HTML dump. Should new industry standards for this
kind of data emerge and gain traction, we guarantee to make them an
export option as well within two months.
Next steps:
- Test & finalize assessment (ongoing)
- Gather launch partners (ongoing)
- Launch at ThingsCon Rotterdam
- Model for sustainable structure
bit.ly/riot-report
trustabletech.org
thingscon.com/eventsEVENTS
How can we help as a community?
Do you work on a connected device that you’d like to certify with
the Trustable Tech mark? Get in touch.
Thank you.
ThingsCon
@thingscon
thingscon.com
Peter Bihr
@peterbihr
peter@thewavingcat.com

Mais conteúdo relacionado

Mais procurados

Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...FinTech Belgium
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...Priyanka Aash
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
Legal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsLegal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsGuido Noto La Diega
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Intralinks
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!cisoplatform
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Digia Plc
 

Mais procurados (20)

Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Adopting Emerging Technologies
Adopting Emerging TechnologiesAdopting Emerging Technologies
Adopting Emerging Technologies
 
Legal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsLegal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of things
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 

Semelhante a Trustable Tech Mark / Magic Monday at Casa Jasmina Torino

ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)Peter Bihr
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 
Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Peter Bihr
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchPeter Bihr
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology MarkPeter Bihr
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 

Semelhante a Trustable Tech Mark / Magic Monday at Casa Jasmina Torino (20)

ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public Launch
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 

Mais de Peter Bihr

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksPeter Bihr
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsPeter Bihr
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Peter Bihr
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderPeter Bihr
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingPeter Bihr
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsPeter Bihr
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of productionPeter Bihr
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsPeter Bihr
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationPeter Bihr
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT MeetupPeter Bihr
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work TalkPeter Bihr
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsPeter Bihr
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITPeter Bihr
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropePeter Bihr
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoPeter Bihr
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...Peter Bihr
 

Mais de Peter Bihr (20)

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarks
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky Things
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - Forecasting
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of Things
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of production
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of Things
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open Innovation
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT Meetup
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work Talk
 
ClueCamp
ClueCamp ClueCamp
ClueCamp
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of Things
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-IT
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Trustable Tech Mark / Magic Monday at Casa Jasmina Torino

  • 1. ThingsCon. For a human-centric & responsible Internet of Things. The State of ThingsCon 2018 Magic Monday Torino Torino 24 Sep 2018 Peter Bihr @peterbihr ThingsCon thingscon.com @thingscon
  • 2. ThingsCon fosters the creation of a human-centric & responsible IoT
  • 3. Our mission, responsible tech, has entered the mainstream debate.
  • 5. 5 years of ThingsCon
  • 10. Christian Villum David Li Dries de Roeck Eduardo Magrani Elisa Giaccardi Ester Fritsch Gaia Scagnetti Holly Robbins Iohanna Nicenboim Irina Shklovski Iskander Smit James Pierce Laura James Luca van der Heide Maya Indira Ganesh Peter Bihr Rachel Douglas-Jones Ronaldo Lemos Seyram Avle Silvia Lindtner Simon Höher State of Responsible IoT bit.ly/riot-report
  • 12. We asked ourselves: What potential is there for a trustmark for IoT? Early wins:
 - Referenced in Brazil’s national IoT strategy - Mozilla support: Fellowship, logistics, media
  • 13. The Trustable Technology mark empowers consumers to make informed decisions & 
 enables companies to prove their connected products are trustworthy.
  • 14. Peter Bihr ThingsCon Mozilla Fellow Project lead thingscon.com
 thewavingcat.com
 @peterbihr Jason Schultz NYU Law Mozilla Fellow Legal theendofownership.com
 its.law.nyu.edu
 @lawgeek Peter Thomas University of Dundee Design tompigeon.com
 dundee.ac.uk/djcad
  • 15. 4 questions that we should be able to answer for every connected device. But for connected products, these are very hard questions to answer. A simple litmus test Source: The Waving Cat (CC BY) Does it do anything I wouldn’t expect? Is the organization trustworthy? Is it made using trustworthy processes? Does it do what I expect it to do?
  • 16. The trustmark is aspirational and aims to raise the bar at the top of the pyramid. This work is driven by values, not pragmatism. This needs to exist in order to get to a better IoT, and a better society. We believe that good ethics are good for business. Our Goal A trustmark to aim higher. - find out more on medium.com Trustmark Baseline certification Great Good Bad
  • 17. Those companies who already build trustworthy products have already done the “hard” work. For them, documenting their work is easy and quick. However, if a company just isn’t there yet, they need to go back and put in more effort. Characteristics Peter Bihr (CC-BY-SA) Hard to earn Valuable/Meaningful Easy to apply The trustmark should be
  • 18. The trustmark evaluates compliance with 5 dimensions that we identified in our initial research* as most crucial for consumers Dimensions *See A Trustmark for IoT (2017), p. 56 Privacy & Data Practices
 How respectful of privacy? Is it designed using best data practices? Transparency
 Is it obvious to users what the device does and how data might be used? Security
 Is it designed and built using best security practices and safeguards? Stability
 How robust? How long a lifecycle to expect? Openness
 How open are device and manufacturer? Is open data used or generated?
  • 19. Self-assessment tool Trustmark readiness Trustmark • Doubles to assess readiness and to verify compliance • Our experts review applications and follow up for clarification if necessary • 3rd party advisory services like security consultancy • Non-public / between companies and their advisors • Once passed, the trustmark can be used and the evaluation is published • Underlying assessment (results of self-evaluation tool) is available online 3rd party services • Open licensing of the self-assessments enable 3rd party services (analysis, rankings, etc.) Out of scope (3rd parties) In scope (project core) Out of scope (3rd parties) Elements of a trustmark system
  • 20. How does it work? Self- assessment Company fills in the self- assessment tool, an online application form that consists mostly of yes/no questions plus explanations. Should the company find it hard to answer questions, they have identified a weakness. Application review Trustmark issued If the application passes, the results are fully published online. If contested questions cannot be resolved, the trustmark is not issued and the results will not be published. The step by step explainer. The company itself is the final judge if they fulfill or do not yet fulfill the trustmark criteria. The stick is in the public accountability once the company decides to use the trustmark and the self- assessment results are published in full. 1 2 3 There’s always a human in the loop. Our experts review the application. If necessary, they follow up for clarification.
  • 21. Format & examples This is what a sample extract of the published documentation would look like. Privacy & Data Practices ☑ Do you employ Privacy-by-Design best practices? We strictly follow privacy-by-design practices. We also prioritize privacy at every step of the process and in all our decision-making: We strictly minimize the data we collect from users, and never keep non-essential data. For example, during the device setup users are by default opted out of every non-essential data collection option, even if this comes at the expense of personalization options. We further have offer a privacy- navigator feature that helps users better understand what happens with their voice and location data should they decide to opt in. Furthermore, we have a strict policy that makes sure that in case of bankruptcy or an acquisition, user data is not part of the companies assets that might be transferred to new ownership but deleted unless users specifically opt- in to having their data transferred. This policy is available here: product.com/datapolicy. ☑ Can users easily export their data? A full data export of all user data, including all inferred data and explanations, is available prominently from the user account page (product.com/useraccount). The data can be exported in JSON or XML, or a simple HTML dump. Should new industry standards for this kind of data emerge and gain traction, we guarantee to make them an export option as well within two months.
  • 22. Next steps: - Test & finalize assessment (ongoing) - Gather launch partners (ongoing) - Launch at ThingsCon Rotterdam - Model for sustainable structure
  • 24. How can we help as a community? Do you work on a connected device that you’d like to certify with the Trustable Tech mark? Get in touch. Thank you. ThingsCon @thingscon thingscon.com Peter Bihr @peterbihr peter@thewavingcat.com