SlideShare a Scribd company logo
1 of 23
Download to read offline
Trustable Technology Mark
A Trustmark for the Internet of Things
6 December 2018
ThingsCon Rotterdam

Soft Launch Day
Peter Bihr (@peterbihr)
This work is created as part of a
Mozilla Fellowship. Unless otherwise
noted, Creative Commons BY-SA 4.0.
trustabletech.org is an 

initiative by ThingsCon e.V. 

with support from Mozilla.
ThingsCon explores and promotes the
development of fair, responsible, and human-
centric technologies for IoT and beyond.
We create events, resources, and tools for a
diverse community of practitioners to
promote ethical, responsible and human-
centric practices.
A Trustmark for
IoT: A ThingsCon
Initiative
With support from Mozilla through
a Mozilla Fellowship for project
lead Peter Bihr
The Internet of Things increasingly touches
all aspects of our lives, but mostly it consists
of black boxes. We need to make sure that
we can trust them.
Consumers have little insight into how any
one connected product works, what it even
might be capable of, or if the company
employs good, responsible data practices.
This is not an oversight on the consumers'
side: We lack the tools to find out.
Why do we need
a trustmark?
Image: Pixabay CC0
4 questions that we should be able to answer
for every connected device.
But for connected products, these are very
hard questions to answer.
A simple
litmus test
Source: The Waving Cat (CC BY)
Does it do anything I
wouldn’t expect?
Is the organization
trustworthy?
Is it made using
trustworthy processes?
Does it do what I expect
it to do?
The Trustable Technology Mark
empowers consumers to make
informed decisions & 

enables companies to prove their
connected products are trustworthy.
Applications are open to the public:
trustabletech.org/apply
Applications are open to the public:
trustabletech.org/apply
Peter Bihr
ThingsCon
Mozilla Fellow
Project lead
thingscon.com

thewavingcat.com

@peterbihr
Jason Schultz
NYU Law
Mozilla Fellow
Legal
theendofownership.com

its.law.nyu.edu

@lawgeek
Peter Thomas
University of Dundee
Logo & Brand
tompigeon.com

dundee.ac.uk/djcad
ThingsCon Community
ThingsCon is a global initiative to
explore and promote the
development of fair, responsible,
and human-centric technologies for
IoT and beyond.
thingscon.org

@thingscon
The trustmark is aspirational and aims to
raise the bar at the top of the pyramid.
This work is driven by values. This needs to
exist in order to get to a better IoT, and a
better society.
We believe that good ethics are good for
business.
Our Goal
A trustmark to aim higher. -
find out more on medium.com
Trustable Tech Mark
Baseline certification
Great
Good
Bad
Those companies who already build
trustworthy products have already done the
“hard” work. For them, documenting their
work is easy and quick.
However, if a company just isn’t there yet,
they need to go back and put in more effort.
Characteristics
Peter Bihr (CC-BY-SA) Hard to earn
Valuable/Meaningful
Easy to apply
The trustmark
should be
How does it
work?
Self-
assessment
Company fills in the self-
assessment tool, an online
application form that
consists of yes/no questions
plus explanations.
Should the company find it
hard to answer questions,
they have identified a
weakness.
Application
review
Trustmark
issued
If the application passes, the
results are fully published
online.
If contested questions
cannot be resolved, the
trustmark is not issued and
the results will not be
published.
1 2 3
There’s always a human in
the loop.
Our experts review the
application. If necessary,
they follow up for
clarification.
The carrot is public proof
that a product is best-in-
class: a market incentive.
The stick is in the public
accountability once the
company decides to use
the trustmark and the
self-assessment results
are published in full.
The trustmark evaluates products for 5
dimensions that we identified as most crucial
for consumers
Dimensions
*See A Trustmark for IoT (2017), p. 56
Privacy & Data Practices

How respectful of privacy? Is it designed using state of the art data
practices?
Transparency

Is it obvious to users what the device does and how data might be used?
Security

Is it designed and built using state of the art security practices and
safeguards?
Stability

How robust? How long a lifecycle to expect?
Openness

How open are device and manufacturer? Is open data used or generated?
Security, Transparency, Privacy & Data
Practices, Stability are required conditions of
trustworthiness. We treat Openness as a
strong indicator of trustworthiness.
Building blocks of
trust
See Trustable Tech Mark “Theory of
Trust” https://www.thingscon.com/
blog/2018/9/4/trustable-tech-mark-
our-theory-of-trust
Self-assessment
tool
Trustmark
readiness
Trustmark
• Doubles to assess
readiness and to verify
compliance
• Our experts review
applications and follow
up for clarification if
necessary
• 3rd party advisory
services like security
consultancy
• Non-public / between
companies and their
advisors
• Once passed, the
trustmark can be used
and the evaluation is
published
• Underlying
assessment (results of
self-evaluation tool) is
available online
3rd party
services
• Open licensing of the
self-assessments
enable 3rd party
services (analysis,
rankings, etc.)
Out of scope
(3rd parties)
In scope
(project core)
Out of scope
(3rd parties)
Elements of a
trustmark system
The trustmark documentation is provided in a
standardized form to allow for third parties to
offer services on top of this foundation, like
editorials, ratings or reviews.
We also work with our academic partners to
inspire further research into trust, technology,
and policy.
The foundation of
an ecosystem
We’re proud that a wide range of academic,
policy and design practice partners support
the Trustable Technology Mark and use it as
part of their research and practice.
Launch partners
Find out more
trustabletech.org/partners
Find out more
opendott.org
OpenDoTT: In collaboration with University of Dundee,
Mozilla, and a host of other partners we are part of an EU-
funded PhD program - including a PhD specifically around the
Trustmark.
Why should a
company sign up?
Fairphone
Image by Fairphone, CC (BY-SA 2.0)
This trustmark communicates a
company’s commitment to a higher
standard, and allows them to prove their
connected products are trustworthy.
The trustmark increases consumer trust
by demonstrating commitment to
exemplary levels of transparency,
openness and responsibility.
The trustmark will attract talent: We
believe that only the best companies
attract the best talent, and strong vision
& values are a key aspect.
In short: It provides a USP to demonstrate
that your product is best-in-class.
Until today, we invited these companies as
a proof of concept for the Trustmark as
they represent particularly interesting and
challenging categories of products.
As of 6 Dec 2018, applications are open to
the public at trustabletech.org/apply
Who uses the
Trustmark today?
Find out more
trustabletech.org/products
Snips AI is a 100% on-device
and private-by-design Voice
AI platform which can be
embedded in any device.
Animated VaiKai dolls are
inspired by the natural way
children use their toys.
Please welcome Eric Bezzam!
This is a project in an early stage. We’re
looking for partners in a number of areas.
Particularly we’re looking for…
Pathways to
partnerships &
participation
Academic partners to accompany the
development of this Trustmark

Commercial partners to apply with
their products to earn the Trustmark

Design studio partners to use the
Trustmark to guide their work

Non-profit and media partners who
can help us understand what they
need in order to build third-party
offerings on top of a trustmark
Applications are open to the public:
trustabletech.org/apply
Peter Bihr
peter@thewavingcat.com
ThingsCon e.V.
thingscon.com
trustabletech@thingscon.com
trustabletech.org
Thank you.
Questions? Please get in touch.

More Related Content

What's hot

Webinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal CollaborationWebinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal CollaborationCentral Desktop
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Living The Brand
Living The BrandLiving The Brand
Living The Brandcolortray
 
The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021CIO Look Magazine
 
15 jobs in demand in 2021 2022
15 jobs in demand in 2021 202215 jobs in demand in 2021 2022
15 jobs in demand in 2021 2022mayur6560
 
Homeschool Catalyst Business Plan
Homeschool Catalyst Business PlanHomeschool Catalyst Business Plan
Homeschool Catalyst Business PlanJonell Alvi
 
AI and Big Data in KM
AI and Big Data in KMAI and Big Data in KM
AI and Big Data in KMSIKM
 
Top 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerTop 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerSoftweb Solutions
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038suvadeep Kundu
 
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012Jeff Shuey
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46Ivy Rueb
 

What's hot (20)

Webinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal CollaborationWebinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal Collaboration
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Technology Trends
Technology TrendsTechnology Trends
Technology Trends
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
Pcs security waves
Pcs security wavesPcs security waves
Pcs security waves
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Living The Brand
Living The BrandLiving The Brand
Living The Brand
 
The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021
 
15 jobs in demand in 2021 2022
15 jobs in demand in 2021 202215 jobs in demand in 2021 2022
15 jobs in demand in 2021 2022
 
Homeschool Catalyst Business Plan
Homeschool Catalyst Business PlanHomeschool Catalyst Business Plan
Homeschool Catalyst Business Plan
 
AI and Big Data in KM
AI and Big Data in KMAI and Big Data in KM
AI and Big Data in KM
 
Top 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerTop 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform provider
 
Enigma's Architecture
Enigma's ArchitectureEnigma's Architecture
Enigma's Architecture
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
 
Artificial Intelligence in the startup world
Artificial Intelligence in the startup worldArtificial Intelligence in the startup world
Artificial Intelligence in the startup world
 
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
 

Similar to A Trustmark for IoT: Empowering Consumers and Enabling Trust

The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology MarkPeter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2Fernanda Torós
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018Fernanda Torós
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2Fernanda Torós
 
We spline invdeck_apr2018
We spline invdeck_apr2018We spline invdeck_apr2018
We spline invdeck_apr2018Fernanda Torós
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018Fernanda Torós
 
BridgeCommunity Overview 2018
BridgeCommunity Overview 2018 BridgeCommunity Overview 2018
BridgeCommunity Overview 2018 Tricia Whitlock
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018Fernanda Torós
 
WeSpline invdeck_oct2018
WeSpline invdeck_oct2018WeSpline invdeck_oct2018
WeSpline invdeck_oct2018Fernanda Torós
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018Fernanda Torós
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDeepakGupthaS
 
IBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageIBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageMark Terry
 

Similar to A Trustmark for IoT: Empowering Consumers and Enabling Trust (20)

The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
We spline invdeck_apr2018
We spline invdeck_apr2018We spline invdeck_apr2018
We spline invdeck_apr2018
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
BridgeCommunity Overview 2018
BridgeCommunity Overview 2018 BridgeCommunity Overview 2018
BridgeCommunity Overview 2018
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018
 
WeSpline invdeck_oct2018
WeSpline invdeck_oct2018WeSpline invdeck_oct2018
WeSpline invdeck_oct2018
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smarties
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
IBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageIBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust Advantage
 

More from Peter Bihr

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksPeter Bihr
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsPeter Bihr
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Peter Bihr
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderPeter Bihr
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingPeter Bihr
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsPeter Bihr
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of productionPeter Bihr
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsPeter Bihr
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationPeter Bihr
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT MeetupPeter Bihr
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work TalkPeter Bihr
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsPeter Bihr
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITPeter Bihr
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropePeter Bihr
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoPeter Bihr
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...Peter Bihr
 

More from Peter Bihr (19)

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarks
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky Things
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - Forecasting
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of Things
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of production
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of Things
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open Innovation
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT Meetup
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work Talk
 
ClueCamp
ClueCamp ClueCamp
ClueCamp
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of Things
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-IT
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

A Trustmark for IoT: Empowering Consumers and Enabling Trust

  • 1. Trustable Technology Mark A Trustmark for the Internet of Things 6 December 2018 ThingsCon Rotterdam
 Soft Launch Day Peter Bihr (@peterbihr) This work is created as part of a Mozilla Fellowship. Unless otherwise noted, Creative Commons BY-SA 4.0. trustabletech.org is an 
 initiative by ThingsCon e.V. 
 with support from Mozilla.
  • 2. ThingsCon explores and promotes the development of fair, responsible, and human- centric technologies for IoT and beyond. We create events, resources, and tools for a diverse community of practitioners to promote ethical, responsible and human- centric practices. A Trustmark for IoT: A ThingsCon Initiative With support from Mozilla through a Mozilla Fellowship for project lead Peter Bihr
  • 3. The Internet of Things increasingly touches all aspects of our lives, but mostly it consists of black boxes. We need to make sure that we can trust them. Consumers have little insight into how any one connected product works, what it even might be capable of, or if the company employs good, responsible data practices. This is not an oversight on the consumers' side: We lack the tools to find out. Why do we need a trustmark? Image: Pixabay CC0
  • 4. 4 questions that we should be able to answer for every connected device. But for connected products, these are very hard questions to answer. A simple litmus test Source: The Waving Cat (CC BY) Does it do anything I wouldn’t expect? Is the organization trustworthy? Is it made using trustworthy processes? Does it do what I expect it to do?
  • 5. The Trustable Technology Mark empowers consumers to make informed decisions & 
 enables companies to prove their connected products are trustworthy.
  • 6. Applications are open to the public: trustabletech.org/apply
  • 7. Applications are open to the public: trustabletech.org/apply
  • 8. Peter Bihr ThingsCon Mozilla Fellow Project lead thingscon.com
 thewavingcat.com
 @peterbihr Jason Schultz NYU Law Mozilla Fellow Legal theendofownership.com
 its.law.nyu.edu
 @lawgeek Peter Thomas University of Dundee Logo & Brand tompigeon.com
 dundee.ac.uk/djcad ThingsCon Community ThingsCon is a global initiative to explore and promote the development of fair, responsible, and human-centric technologies for IoT and beyond. thingscon.org
 @thingscon
  • 9. The trustmark is aspirational and aims to raise the bar at the top of the pyramid. This work is driven by values. This needs to exist in order to get to a better IoT, and a better society. We believe that good ethics are good for business. Our Goal A trustmark to aim higher. - find out more on medium.com Trustable Tech Mark Baseline certification Great Good Bad
  • 10. Those companies who already build trustworthy products have already done the “hard” work. For them, documenting their work is easy and quick. However, if a company just isn’t there yet, they need to go back and put in more effort. Characteristics Peter Bihr (CC-BY-SA) Hard to earn Valuable/Meaningful Easy to apply The trustmark should be
  • 11. How does it work? Self- assessment Company fills in the self- assessment tool, an online application form that consists of yes/no questions plus explanations. Should the company find it hard to answer questions, they have identified a weakness. Application review Trustmark issued If the application passes, the results are fully published online. If contested questions cannot be resolved, the trustmark is not issued and the results will not be published. 1 2 3 There’s always a human in the loop. Our experts review the application. If necessary, they follow up for clarification. The carrot is public proof that a product is best-in- class: a market incentive. The stick is in the public accountability once the company decides to use the trustmark and the self-assessment results are published in full.
  • 12. The trustmark evaluates products for 5 dimensions that we identified as most crucial for consumers Dimensions *See A Trustmark for IoT (2017), p. 56 Privacy & Data Practices
 How respectful of privacy? Is it designed using state of the art data practices? Transparency
 Is it obvious to users what the device does and how data might be used? Security
 Is it designed and built using state of the art security practices and safeguards? Stability
 How robust? How long a lifecycle to expect? Openness
 How open are device and manufacturer? Is open data used or generated?
  • 13. Security, Transparency, Privacy & Data Practices, Stability are required conditions of trustworthiness. We treat Openness as a strong indicator of trustworthiness. Building blocks of trust See Trustable Tech Mark “Theory of Trust” https://www.thingscon.com/ blog/2018/9/4/trustable-tech-mark- our-theory-of-trust
  • 14. Self-assessment tool Trustmark readiness Trustmark • Doubles to assess readiness and to verify compliance • Our experts review applications and follow up for clarification if necessary • 3rd party advisory services like security consultancy • Non-public / between companies and their advisors • Once passed, the trustmark can be used and the evaluation is published • Underlying assessment (results of self-evaluation tool) is available online 3rd party services • Open licensing of the self-assessments enable 3rd party services (analysis, rankings, etc.) Out of scope (3rd parties) In scope (project core) Out of scope (3rd parties) Elements of a trustmark system
  • 15. The trustmark documentation is provided in a standardized form to allow for third parties to offer services on top of this foundation, like editorials, ratings or reviews. We also work with our academic partners to inspire further research into trust, technology, and policy. The foundation of an ecosystem
  • 16. We’re proud that a wide range of academic, policy and design practice partners support the Trustable Technology Mark and use it as part of their research and practice. Launch partners Find out more trustabletech.org/partners
  • 17. Find out more opendott.org OpenDoTT: In collaboration with University of Dundee, Mozilla, and a host of other partners we are part of an EU- funded PhD program - including a PhD specifically around the Trustmark.
  • 18. Why should a company sign up? Fairphone Image by Fairphone, CC (BY-SA 2.0) This trustmark communicates a company’s commitment to a higher standard, and allows them to prove their connected products are trustworthy. The trustmark increases consumer trust by demonstrating commitment to exemplary levels of transparency, openness and responsibility. The trustmark will attract talent: We believe that only the best companies attract the best talent, and strong vision & values are a key aspect. In short: It provides a USP to demonstrate that your product is best-in-class.
  • 19. Until today, we invited these companies as a proof of concept for the Trustmark as they represent particularly interesting and challenging categories of products. As of 6 Dec 2018, applications are open to the public at trustabletech.org/apply Who uses the Trustmark today? Find out more trustabletech.org/products Snips AI is a 100% on-device and private-by-design Voice AI platform which can be embedded in any device. Animated VaiKai dolls are inspired by the natural way children use their toys.
  • 21. This is a project in an early stage. We’re looking for partners in a number of areas. Particularly we’re looking for… Pathways to partnerships & participation Academic partners to accompany the development of this Trustmark Commercial partners to apply with their products to earn the Trustmark Design studio partners to use the Trustmark to guide their work Non-profit and media partners who can help us understand what they need in order to build third-party offerings on top of a trustmark
  • 22. Applications are open to the public: trustabletech.org/apply