SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Trustable Technology Mark
A trustmark for the Internet of Things
27 October 2018
Mozfest London
Peter Bihr (@peterbihr)
This work is created as part of a
Mozilla Fellowship. Unless otherwise
noted, Creative Commons BY-SA 4.0.
trustabletech.org is an 

initiative by ThingsCon e.V. 

with support from Mozilla.
The Trustable Technology mark
empowers consumers to make
informed decisions & 

enables companies to prove their
connected products are trustworthy.
Peter Bihr
ThingsCon
Mozilla Fellow
Project lead
thingscon.com

thewavingcat.com

@peterbihr
Jason Schultz
NYU Law
Mozilla Fellow
Legal
theendofownership.com

its.law.nyu.edu

@lawgeek
Peter Thomas
University of Dundee
Logo & Brand
tompigeon.com

dundee.ac.uk/djcad
The Internet of Things increasingly touches
all aspects of our lives, but mostly it consists
of black boxes. We need to make sure that
we can trust them.
Consumers have little insight into how any
one connected product works, what it even
might be capable of, or if the company
employs good, responsible data practices.
This is not an oversight on the consumers'
side: We lack the tools to find out.
Why do we need
a trustmark?
Amazon Echo.
Image: Frmorrison, CC (BY-SA 3.0)
4 questions that we should be able to answer
for every connected device.
But for connected products, these are very
hard questions to answer.
A simple
litmus test
Source: The Waving Cat (CC BY)
Does it do anything I
wouldn’t expect?
Is the organization
trustworthy?
Is it made using
trustworthy processes?
Does it do what I expect
it to do?
The trustmark is aspirational and aims to
raise the bar at the top of the pyramid.
This work is driven by values, not
pragmatism. This needs to exist in order to
get to a better IoT, and a better society.
We believe that good ethics are good for
business.
Our Goal
A trustmark to aim higher. -
find out more on medium.com
Trustable Tech mark
Baseline certification
Great
Good
Bad
Those companies who already build
trustworthy products have already done the
“hard” work. For them, documenting their
work is easy and quick.
However, if a company just isn’t there yet,
they need to go back and put in more effort.
Characteristics
Peter Bihr (CC-BY-SA) Hard to earn
Valuable/Meaningful
Easy to apply
The trustmark
should be
A trustmark
for IoT
Building consumer trust in the
Internet of Things by empowering
users to make smarter choices.
A ThingsCon Report commissioned
by Mozilla’s Open IoT Studio.
Open IoT Studio
Our 2017 trustmark research has received
great feedback and reach.
Among other things it was quoted extensively
in Brazil’s National IoT Plan.
Now we want to put our research into action.
Early feedback
& successes
Find out more
https://www.thingscon.com/report-a-
trustmark-for-iot
Why should a
company sign up?
Fairphone
Image by Fairphone, CC (BY-SA 2.0)
This trustmark communicates a
company’s commitment to a higher
standard, and allows them to prove their
connected products are trustworthy.
The trustmark increases consumer trust
by demonstrating commitment to
exemplary levels of transparency,
openness and responsibility.
The trustmark will attract talent: We
believe that only the best companies
attract the best talent, and strong vision
& values are a key aspect.
We’re proposing a trustmark for IoT that
increases transparency and empowers
consumers to make better decisions.
It takes a holistic approach that goes beyond
just the device and includes procedural and
organizational aspects. The prototype phase
will focus on voice-enabled IoT (smart
speakers, etc.)
How will it work?
Find out more
https://www.thingscon.com/report-a-
trustmark-for-iot
Evaluates 5 key dimensions
Is pledge-based (self-certification)
Verified through publicly accessible
documentation
(Mostly) decentralized
Openly licensed and free to use
The trustmark evaluates compliance with 5
dimensions that we identified in our initial
research* as most crucial for consumers
Dimensions
*See A Trustmark for IoT (2017), p. 56
Privacy & Data Practices

How respectful of privacy? Is it designed using state of the art data
practices?
Transparency

Is it obvious to users what the device does and how data might be used?
Security

Is it designed and built using state of the art security practices and
safeguards?
Stability

How robust? How long a lifecycle to expect?
Openness

How open are device and manufacturer? Is open data used or generated?
Security, Transparency, Privacy & Data
Practices, Stability are required conditions of
trustworthiness. We treat Openness as a
strong indicator of trustworthiness.
Building blocks of
trust
See Trustable Tech Mark “Theory of
Trust” https://www.thingscon.com/
blog/2018/9/4/trustable-tech-mark-
our-theory-of-trust
What will
we evaluate?
Input
What goes into making a
product?


In the textile world,
Bluesign is a trustmark
that demonstrates that
an apparel manufacturer
uses sustainable, eco-
friendly materials
Process
How is a product made?

Fairtrade with their
strong focus on
sustainable farming
practices and good
labour conditions
Output
What is the product like
when it’s finished?


CE certification confirms
that the final product
fulfills certain EU quality
and safety requirements
Trust
The trustmark documentation shall be
provided in a standardized form to allow for
third parties to offer services on top of this
foundation, like editorials, ratings & reviews.
In year 1 we will learn and prototype, to
develop the concept to a stage of maturity to
be launch-ready.
The foundation of
an ecosystem
Self-assessment
tool
Trustmark
readiness
Trustmark
• Doubles to assess
readiness and to verify
compliance
• Our experts review
applications and follow
up for clarification if
necessary
• 3rd party advisory
services like security
consultancy
• Non-public / between
companies and their
advisors
• Once passed, the
trustmark can be used
and the evaluation is
published
• Underlying
assessment (results of
self-evaluation tool) is
available online
3rd party
services
• Open licensing of the
self-assessments
enable 3rd party
services (analysis,
rankings, etc.)
Out of scope
(3rd parties)
In scope
(project core)
Out of scope
(3rd parties)
Elements of a
trustmark system
How does it
work?
Self-
assessment
Company fills in the self-
assessment tool, an online
application form that
consists of yes/no questions
plus explanations.
Should the company find it
hard to answer questions,
they have identified a
weakness.
Application
review
Trustmark
issued
If the application passes, the
results are fully published
online.
If contested questions
cannot be resolved, the
trustmark is not issued and
the results will not be
published.
The step by step explainer.
The company itself is the
final judge if they fulfill or
do not yet fulfill the
trustmark criteria.
The stick is in the public
accountability once the
company decides to use
the trustmark and the self-
assessment results are
published in full.
1 2 3
There’s always a human in
the loop.
Our experts review the
application. If necessary,
they follow up for
clarification.
Format &
examples
The format for the checklist is standardized
as checkbox [Yes/No/Not Applicable) plus a
text field to elaborate. If the answer is Yes or
Not Applicable then the text field must be
filled in with an explainer. (No always means 0
points.)
The evolving checklist is available for review
and input (via comments) here.
Privacy & Data Practices
Do you employ Privacy-by-Design best practices?
Is your product GDPR compliant?
Do you have an easy-to-understand privacy and
data policy?
Can users easily perform a factory reset?
Can users easily export their data?
Some example questions. This checklist
partially builds on the “Open #iotmark
principles” (iotmark.org, CC BY-SA 4.0).
A the core of the process is a self-
assessment tool: A questionnaire that helps
organizations assess their trustmark
readiness.
This tool is aligned with the product
development process, so it can also double
as a checklist to help along the process of
developing a trustworthy connected product,
and to identify potential weaknesses.
Self-Assessment
Tool
Trustable Tech Self-Assessment Tool
question sample (draft)
Format &
examples
This is what a sample extract of the published
documentation would look like.
Privacy & Data Practices
☑ Do you employ Privacy-by-Design best practices?
We strictly follow privacy-by-design practices. We also prioritize privacy
at every step of the process and in all our decision-making: We strictly
minimize the data we collect from users, and never keep non-essential
data. For example, during the device setup users are by default opted
out of every non-essential data collection option, even if this comes at
the expense of personalization options. We further have offer a privacy-
navigator feature that helps users better understand what happens with
their voice and location data should they decide to opt in. Furthermore,
we have a strict policy that makes sure that in case of bankruptcy or an
acquisition, user data is not part of the companies assets that might be
transferred to new ownership but deleted unless users specifically opt-
in to having their data transferred. This policy is available here:
product.com/datapolicy.
☑ Can users easily export their data?
A full data export of all user data, including all inferred data and
explanations, is available prominently from the user account page
(product.com/useraccount). The data can be exported in JSON or
XML, or a simple HTML dump. Should new industry standards for this
kind of data emerge and gain traction, we guarantee to make them an
export option as well within two months.
This is a project in an early stage. We’re
looking in a number of areas. Particularly
we’re looking for…
Pathways to
partnerships &
participation
Academic partners to accompany the
development of this trustmark

Commercial partners to help us test
our requirements list against their
existing or upcoming products

Non-profit and media partners who
can help us understand what they
need in order to build third-party
offerings on top of a trustmark
Peter Bihr
peter@thewavingcat.com
ThingsCon e.V.
thingscon.com
trustabletech.com
Thank you.
Questions? Please get in touch.

Más contenido relacionado

La actualidad más candente

Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Daniel Chun
 
Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Ray Bugg
 
Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Dr. Mazlan Abbas
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015Huw Hopkin
 
💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation template💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation templatePresentationLoad
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
Navigating the new world ushered in overnight by COVID-19
Navigating the new world ushered in overnight by COVID-19Navigating the new world ushered in overnight by COVID-19
Navigating the new world ushered in overnight by COVID-19Belatrix Software
 
Value from resilience xebia webinar
Value from resilience   xebia webinarValue from resilience   xebia webinar
Value from resilience xebia webinarEdzo Botjes
 
Inv310 agility-through-standards-socialbiz -2012016a
Inv310  agility-through-standards-socialbiz -2012016aInv310  agility-through-standards-socialbiz -2012016a
Inv310 agility-through-standards-socialbiz -2012016aAngel Diaz
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperRebecca Ricks
 
Internet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyInternet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyJohn Clark
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformationPaula Calvo Lopez
 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Ersin KARA
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role LogMeIn
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Dana Gardner
 
Brace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingBrace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingCherwell Software
 
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Kevin Neal
 

La actualidad más candente (20)

Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)
 
Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015
 
Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015Cisco Internet of Everything - Adtech Asia 2015
Cisco Internet of Everything - Adtech Asia 2015
 
💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation template💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation template
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
Navigating the new world ushered in overnight by COVID-19
Navigating the new world ushered in overnight by COVID-19Navigating the new world ushered in overnight by COVID-19
Navigating the new world ushered in overnight by COVID-19
 
Value from resilience xebia webinar
Value from resilience   xebia webinarValue from resilience   xebia webinar
Value from resilience xebia webinar
 
Inv310 agility-through-standards-socialbiz -2012016a
Inv310  agility-through-standards-socialbiz -2012016aInv310  agility-through-standards-socialbiz -2012016a
Inv310 agility-through-standards-socialbiz -2012016a
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White Paper
 
Internet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyInternet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook Survey
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformation
 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
 
Brace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingBrace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is Coming
 
Pcs security waves
Pcs security wavesPcs security waves
Pcs security waves
 
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
 

Similar a ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)

Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of ThingsAltimeter, a Prophet Company
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDeepakGupthaS
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038suvadeep Kundu
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of ThingsThe Marketing Distillery
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?Aggregage
 

Similar a ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition) (20)

Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
Open #iotmark certification mark
Open #iotmark certification markOpen #iotmark certification mark
Open #iotmark certification mark
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Digital disruption – dive in to thrive
Digital disruption – dive in to thriveDigital disruption – dive in to thrive
Digital disruption – dive in to thrive
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smarties
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?
 

Más de Peter Bihr

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksPeter Bihr
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsPeter Bihr
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Peter Bihr
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderPeter Bihr
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingPeter Bihr
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsPeter Bihr
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of productionPeter Bihr
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsPeter Bihr
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationPeter Bihr
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT MeetupPeter Bihr
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work TalkPeter Bihr
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsPeter Bihr
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITPeter Bihr
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropePeter Bihr
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoPeter Bihr
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...Peter Bihr
 

Más de Peter Bihr (19)

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarks
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky Things
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - Forecasting
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of Things
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of production
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of Things
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open Innovation
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT Meetup
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work Talk
 
ClueCamp
ClueCamp ClueCamp
ClueCamp
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of Things
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-IT
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)

  • 1. Trustable Technology Mark A trustmark for the Internet of Things 27 October 2018 Mozfest London Peter Bihr (@peterbihr) This work is created as part of a Mozilla Fellowship. Unless otherwise noted, Creative Commons BY-SA 4.0. trustabletech.org is an 
 initiative by ThingsCon e.V. 
 with support from Mozilla.
  • 2. The Trustable Technology mark empowers consumers to make informed decisions & 
 enables companies to prove their connected products are trustworthy.
  • 3. Peter Bihr ThingsCon Mozilla Fellow Project lead thingscon.com
 thewavingcat.com
 @peterbihr Jason Schultz NYU Law Mozilla Fellow Legal theendofownership.com
 its.law.nyu.edu
 @lawgeek Peter Thomas University of Dundee Logo & Brand tompigeon.com
 dundee.ac.uk/djcad
  • 4. The Internet of Things increasingly touches all aspects of our lives, but mostly it consists of black boxes. We need to make sure that we can trust them. Consumers have little insight into how any one connected product works, what it even might be capable of, or if the company employs good, responsible data practices. This is not an oversight on the consumers' side: We lack the tools to find out. Why do we need a trustmark? Amazon Echo. Image: Frmorrison, CC (BY-SA 3.0)
  • 5. 4 questions that we should be able to answer for every connected device. But for connected products, these are very hard questions to answer. A simple litmus test Source: The Waving Cat (CC BY) Does it do anything I wouldn’t expect? Is the organization trustworthy? Is it made using trustworthy processes? Does it do what I expect it to do?
  • 6. The trustmark is aspirational and aims to raise the bar at the top of the pyramid. This work is driven by values, not pragmatism. This needs to exist in order to get to a better IoT, and a better society. We believe that good ethics are good for business. Our Goal A trustmark to aim higher. - find out more on medium.com Trustable Tech mark Baseline certification Great Good Bad
  • 7. Those companies who already build trustworthy products have already done the “hard” work. For them, documenting their work is easy and quick. However, if a company just isn’t there yet, they need to go back and put in more effort. Characteristics Peter Bihr (CC-BY-SA) Hard to earn Valuable/Meaningful Easy to apply The trustmark should be
  • 8. A trustmark for IoT Building consumer trust in the Internet of Things by empowering users to make smarter choices. A ThingsCon Report commissioned by Mozilla’s Open IoT Studio. Open IoT Studio Our 2017 trustmark research has received great feedback and reach. Among other things it was quoted extensively in Brazil’s National IoT Plan. Now we want to put our research into action. Early feedback & successes Find out more https://www.thingscon.com/report-a- trustmark-for-iot
  • 9. Why should a company sign up? Fairphone Image by Fairphone, CC (BY-SA 2.0) This trustmark communicates a company’s commitment to a higher standard, and allows them to prove their connected products are trustworthy. The trustmark increases consumer trust by demonstrating commitment to exemplary levels of transparency, openness and responsibility. The trustmark will attract talent: We believe that only the best companies attract the best talent, and strong vision & values are a key aspect.
  • 10. We’re proposing a trustmark for IoT that increases transparency and empowers consumers to make better decisions. It takes a holistic approach that goes beyond just the device and includes procedural and organizational aspects. The prototype phase will focus on voice-enabled IoT (smart speakers, etc.) How will it work? Find out more https://www.thingscon.com/report-a- trustmark-for-iot Evaluates 5 key dimensions Is pledge-based (self-certification) Verified through publicly accessible documentation (Mostly) decentralized Openly licensed and free to use
  • 11. The trustmark evaluates compliance with 5 dimensions that we identified in our initial research* as most crucial for consumers Dimensions *See A Trustmark for IoT (2017), p. 56 Privacy & Data Practices
 How respectful of privacy? Is it designed using state of the art data practices? Transparency
 Is it obvious to users what the device does and how data might be used? Security
 Is it designed and built using state of the art security practices and safeguards? Stability
 How robust? How long a lifecycle to expect? Openness
 How open are device and manufacturer? Is open data used or generated?
  • 12. Security, Transparency, Privacy & Data Practices, Stability are required conditions of trustworthiness. We treat Openness as a strong indicator of trustworthiness. Building blocks of trust See Trustable Tech Mark “Theory of Trust” https://www.thingscon.com/ blog/2018/9/4/trustable-tech-mark- our-theory-of-trust
  • 13. What will we evaluate? Input What goes into making a product? 
 In the textile world, Bluesign is a trustmark that demonstrates that an apparel manufacturer uses sustainable, eco- friendly materials Process How is a product made?
 Fairtrade with their strong focus on sustainable farming practices and good labour conditions Output What is the product like when it’s finished? 
 CE certification confirms that the final product fulfills certain EU quality and safety requirements Trust
  • 14. The trustmark documentation shall be provided in a standardized form to allow for third parties to offer services on top of this foundation, like editorials, ratings & reviews. In year 1 we will learn and prototype, to develop the concept to a stage of maturity to be launch-ready. The foundation of an ecosystem
  • 15. Self-assessment tool Trustmark readiness Trustmark • Doubles to assess readiness and to verify compliance • Our experts review applications and follow up for clarification if necessary • 3rd party advisory services like security consultancy • Non-public / between companies and their advisors • Once passed, the trustmark can be used and the evaluation is published • Underlying assessment (results of self-evaluation tool) is available online 3rd party services • Open licensing of the self-assessments enable 3rd party services (analysis, rankings, etc.) Out of scope (3rd parties) In scope (project core) Out of scope (3rd parties) Elements of a trustmark system
  • 16. How does it work? Self- assessment Company fills in the self- assessment tool, an online application form that consists of yes/no questions plus explanations. Should the company find it hard to answer questions, they have identified a weakness. Application review Trustmark issued If the application passes, the results are fully published online. If contested questions cannot be resolved, the trustmark is not issued and the results will not be published. The step by step explainer. The company itself is the final judge if they fulfill or do not yet fulfill the trustmark criteria. The stick is in the public accountability once the company decides to use the trustmark and the self- assessment results are published in full. 1 2 3 There’s always a human in the loop. Our experts review the application. If necessary, they follow up for clarification.
  • 17. Format & examples The format for the checklist is standardized as checkbox [Yes/No/Not Applicable) plus a text field to elaborate. If the answer is Yes or Not Applicable then the text field must be filled in with an explainer. (No always means 0 points.) The evolving checklist is available for review and input (via comments) here. Privacy & Data Practices Do you employ Privacy-by-Design best practices? Is your product GDPR compliant? Do you have an easy-to-understand privacy and data policy? Can users easily perform a factory reset? Can users easily export their data? Some example questions. This checklist partially builds on the “Open #iotmark principles” (iotmark.org, CC BY-SA 4.0).
  • 18. A the core of the process is a self- assessment tool: A questionnaire that helps organizations assess their trustmark readiness. This tool is aligned with the product development process, so it can also double as a checklist to help along the process of developing a trustworthy connected product, and to identify potential weaknesses. Self-Assessment Tool Trustable Tech Self-Assessment Tool question sample (draft)
  • 19. Format & examples This is what a sample extract of the published documentation would look like. Privacy & Data Practices ☑ Do you employ Privacy-by-Design best practices? We strictly follow privacy-by-design practices. We also prioritize privacy at every step of the process and in all our decision-making: We strictly minimize the data we collect from users, and never keep non-essential data. For example, during the device setup users are by default opted out of every non-essential data collection option, even if this comes at the expense of personalization options. We further have offer a privacy- navigator feature that helps users better understand what happens with their voice and location data should they decide to opt in. Furthermore, we have a strict policy that makes sure that in case of bankruptcy or an acquisition, user data is not part of the companies assets that might be transferred to new ownership but deleted unless users specifically opt- in to having their data transferred. This policy is available here: product.com/datapolicy. ☑ Can users easily export their data? A full data export of all user data, including all inferred data and explanations, is available prominently from the user account page (product.com/useraccount). The data can be exported in JSON or XML, or a simple HTML dump. Should new industry standards for this kind of data emerge and gain traction, we guarantee to make them an export option as well within two months.
  • 20. This is a project in an early stage. We’re looking in a number of areas. Particularly we’re looking for… Pathways to partnerships & participation Academic partners to accompany the development of this trustmark Commercial partners to help us test our requirements list against their existing or upcoming products Non-profit and media partners who can help us understand what they need in order to build third-party offerings on top of a trustmark