SlideShare a Scribd company logo
1 of 23
Download to read offline
Trustable Technology Mark
A Trustmark for the Internet of Things
6 December 2018
ThingsCon Rotterdam

Soft Launch Day
Peter Bihr (@peterbihr)
This work is created as part of a
Mozilla Fellowship. Unless otherwise
noted, Creative Commons BY-SA 4.0.
trustabletech.org is an 

initiative by ThingsCon e.V. 

with support from Mozilla.
ThingsCon explores and promotes the
development of fair, responsible, and human-
centric technologies for IoT and beyond.
We create events, resources, and tools for a
diverse community of practitioners to
promote ethical, responsible and human-
centric practices.
A Trustmark for
IoT: A ThingsCon
Initiative
With support from Mozilla through
a Mozilla Fellowship for project
lead Peter Bihr
The Internet of Things increasingly touches
all aspects of our lives, but mostly it consists
of black boxes. We need to make sure that
we can trust them.
Consumers have little insight into how any
one connected product works, what it even
might be capable of, or if the company
employs good, responsible data practices.
This is not an oversight on the consumers'
side: We lack the tools to find out.
Why do we need
a trustmark?
Image: Pixabay CC0
4 questions that we should be able to answer
for every connected device.
But for connected products, these are very
hard questions to answer.
A simple
litmus test
Source: The Waving Cat (CC BY)
Does it do anything I
wouldn’t expect?
Is the organization
trustworthy?
Is it made using
trustworthy processes?
Does it do what I expect
it to do?
The Trustable Technology Mark
empowers consumers to make
informed decisions & 

enables companies to prove their
connected products are trustworthy.
Applications are open to the public:
trustabletech.org/apply
Applications are open to the public:
trustabletech.org/apply
Peter Bihr
ThingsCon
Mozilla Fellow
Project lead
thingscon.com

thewavingcat.com

@peterbihr
Jason Schultz
NYU Law
Mozilla Fellow
Legal
theendofownership.com

its.law.nyu.edu

@lawgeek
Peter Thomas
University of Dundee
Logo & Brand
tompigeon.com

dundee.ac.uk/djcad
ThingsCon Community
ThingsCon is a global initiative to
explore and promote the
development of fair, responsible,
and human-centric technologies for
IoT and beyond.
thingscon.org

@thingscon
The trustmark is aspirational and aims to
raise the bar at the top of the pyramid.
This work is driven by values. This needs to
exist in order to get to a better IoT, and a
better society.
We believe that good ethics are good for
business.
Our Goal
A trustmark to aim higher. -
find out more on medium.com
Trustable Tech Mark
Baseline certification
Great
Good
Bad
Those companies who already build
trustworthy products have already done the
“hard” work. For them, documenting their
work is easy and quick.
However, if a company just isn’t there yet,
they need to go back and put in more effort.
Characteristics
Peter Bihr (CC-BY-SA) Hard to earn
Valuable/Meaningful
Easy to apply
The trustmark
should be
How does it
work?
Self-
assessment
Company fills in the self-
assessment tool, an online
application form that
consists of yes/no questions
plus explanations.
Should the company find it
hard to answer questions,
they have identified a
weakness.
Application
review
Trustmark
issued
If the application passes, the
results are fully published
online.
If contested questions
cannot be resolved, the
trustmark is not issued and
the results will not be
published.
1 2 3
There’s always a human in
the loop.
Our experts review the
application. If necessary,
they follow up for
clarification.
The carrot is public proof
that a product is best-in-
class: a market incentive.
The stick is in the public
accountability once the
company decides to use
the trustmark and the
self-assessment results
are published in full.
The trustmark evaluates products for 5
dimensions that we identified as most crucial
for consumers
Dimensions
*See A Trustmark for IoT (2017), p. 56
Privacy & Data Practices

How respectful of privacy? Is it designed using state of the art data
practices?
Transparency

Is it obvious to users what the device does and how data might be used?
Security

Is it designed and built using state of the art security practices and
safeguards?
Stability

How robust? How long a lifecycle to expect?
Openness

How open are device and manufacturer? Is open data used or generated?
Security, Transparency, Privacy & Data
Practices, Stability are required conditions of
trustworthiness. We treat Openness as a
strong indicator of trustworthiness.
Building blocks of
trust
See Trustable Tech Mark “Theory of
Trust” https://www.thingscon.com/
blog/2018/9/4/trustable-tech-mark-
our-theory-of-trust
Self-assessment
tool
Trustmark
readiness
Trustmark
• Doubles to assess
readiness and to verify
compliance
• Our experts review
applications and follow
up for clarification if
necessary
• 3rd party advisory
services like security
consultancy
• Non-public / between
companies and their
advisors
• Once passed, the
trustmark can be used
and the evaluation is
published
• Underlying
assessment (results of
self-evaluation tool) is
available online
3rd party
services
• Open licensing of the
self-assessments
enable 3rd party
services (analysis,
rankings, etc.)
Out of scope
(3rd parties)
In scope
(project core)
Out of scope
(3rd parties)
Elements of a
trustmark system
The trustmark documentation is provided in a
standardized form to allow for third parties to
offer services on top of this foundation, like
editorials, ratings or reviews.
We also work with our academic partners to
inspire further research into trust, technology,
and policy.
The foundation of
an ecosystem
We’re proud that a wide range of academic,
policy and design practice partners support
the Trustable Technology Mark and use it as
part of their research and practice.
Launch partners
Find out more
trustabletech.org/partners
Find out more
opendott.org
OpenDoTT: In collaboration with University of Dundee,
Mozilla, and a host of other partners we are part of an EU-
funded PhD program - including a PhD specifically around the
Trustmark.
Why should a
company sign up?
Fairphone
Image by Fairphone, CC (BY-SA 2.0)
This trustmark communicates a
company’s commitment to a higher
standard, and allows them to prove their
connected products are trustworthy.
The trustmark increases consumer trust
by demonstrating commitment to
exemplary levels of transparency,
openness and responsibility.
The trustmark will attract talent: We
believe that only the best companies
attract the best talent, and strong vision
& values are a key aspect.
In short: It provides a USP to demonstrate
that your product is best-in-class.
Until today, we invited these companies as
a proof of concept for the Trustmark as
they represent particularly interesting and
challenging categories of products.
As of 6 Dec 2018, applications are open to
the public at trustabletech.org/apply
Who uses the
Trustmark today?
Find out more
trustabletech.org/products
Snips AI is a 100% on-device
and private-by-design Voice
AI platform which can be
embedded in any device.
Animated VaiKai dolls are
inspired by the natural way
children use their toys.
Please welcome Eric Bezzam!
This is a project in an early stage. We’re
looking for partners in a number of areas.
Particularly we’re looking for…
Pathways to
partnerships &
participation
Academic partners to accompany the
development of this Trustmark

Commercial partners to apply with
their products to earn the Trustmark

Design studio partners to use the
Trustmark to guide their work

Non-profit and media partners who
can help us understand what they
need in order to build third-party
offerings on top of a trustmark
Applications are open to the public:
trustabletech.org/apply
Peter Bihr
peter@thewavingcat.com
ThingsCon e.V.
thingscon.com
trustabletech@thingscon.com
trustabletech.org
Thank you.
Questions? Please get in touch.

More Related Content

What's hot

Webinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal CollaborationWebinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal CollaborationCentral Desktop
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Living The Brand
Living The BrandLiving The Brand
Living The Brandcolortray
 
The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021CIO Look Magazine
 
15 jobs in demand in 2021 2022
15 jobs in demand in 2021 202215 jobs in demand in 2021 2022
15 jobs in demand in 2021 2022mayur6560
 
Homeschool Catalyst Business Plan
Homeschool Catalyst Business PlanHomeschool Catalyst Business Plan
Homeschool Catalyst Business PlanJonell Alvi
 
AI and Big Data in KM
AI and Big Data in KMAI and Big Data in KM
AI and Big Data in KMSIKM
 
Top 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerTop 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerSoftweb Solutions
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038suvadeep Kundu
 
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012Jeff Shuey
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46Ivy Rueb
 

What's hot (20)

Webinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal CollaborationWebinar Deck - Successful Strategies for Internal Collaboration
Webinar Deck - Successful Strategies for Internal Collaboration
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Technology Trends
Technology TrendsTechnology Trends
Technology Trends
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
Pcs security waves
Pcs security wavesPcs security waves
Pcs security waves
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Living The Brand
Living The BrandLiving The Brand
Living The Brand
 
The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021The 10 businesswomen overcoming the pandemic 2021
The 10 businesswomen overcoming the pandemic 2021
 
15 jobs in demand in 2021 2022
15 jobs in demand in 2021 202215 jobs in demand in 2021 2022
15 jobs in demand in 2021 2022
 
Homeschool Catalyst Business Plan
Homeschool Catalyst Business PlanHomeschool Catalyst Business Plan
Homeschool Catalyst Business Plan
 
AI and Big Data in KM
AI and Big Data in KMAI and Big Data in KM
AI and Big Data in KM
 
Top 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerTop 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform provider
 
Enigma's Architecture
Enigma's ArchitectureEnigma's Architecture
Enigma's Architecture
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
 
Artificial Intelligence in the startup world
Artificial Intelligence in the startup worldArtificial Intelligence in the startup world
Artificial Intelligence in the startup world
 
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
The Future of SharePoint (FOSP) - SharePoint Saturday Redmond - Sept 22 2012
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
Deck 893ff61f-1fb8-4e15-a379-775dfdbcee77-7-14-25-46
 

Similar to A Trustmark for IoT: Empowering Consumers and Enabling Trust

The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology MarkPeter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2Fernanda Torós
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018Fernanda Torós
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2Fernanda Torós
 
We spline invdeck_apr2018
We spline invdeck_apr2018We spline invdeck_apr2018
We spline invdeck_apr2018Fernanda Torós
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018Fernanda Torós
 
BridgeCommunity Overview 2018
BridgeCommunity Overview 2018 BridgeCommunity Overview 2018
BridgeCommunity Overview 2018 Tricia Whitlock
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018Fernanda Torós
 
WeSpline invdeck_oct2018
WeSpline invdeck_oct2018WeSpline invdeck_oct2018
WeSpline invdeck_oct2018Fernanda Torós
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018Fernanda Torós
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDeepakGupthaS
 
IBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageIBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageMark Terry
 

Similar to A Trustmark for IoT: Empowering Consumers and Enabling Trust (20)

The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
We spline invdeck_apr2018
We spline invdeck_apr2018We spline invdeck_apr2018
We spline invdeck_apr2018
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
BridgeCommunity Overview 2018
BridgeCommunity Overview 2018 BridgeCommunity Overview 2018
BridgeCommunity Overview 2018
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018
 
WeSpline invdeck_oct2018
WeSpline invdeck_oct2018WeSpline invdeck_oct2018
WeSpline invdeck_oct2018
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018
 
Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smarties
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
IBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageIBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust Advantage
 

More from Peter Bihr

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksPeter Bihr
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsPeter Bihr
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Peter Bihr
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderPeter Bihr
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingPeter Bihr
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsPeter Bihr
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of productionPeter Bihr
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsPeter Bihr
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationPeter Bihr
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT MeetupPeter Bihr
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work TalkPeter Bihr
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsPeter Bihr
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITPeter Bihr
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropePeter Bihr
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoPeter Bihr
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...Peter Bihr
 

More from Peter Bihr (19)

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarks
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky Things
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - Forecasting
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of Things
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of production
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of Things
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open Innovation
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT Meetup
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work Talk
 
ClueCamp
ClueCamp ClueCamp
ClueCamp
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of Things
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-IT
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

A Trustmark for IoT: Empowering Consumers and Enabling Trust

  • 1. Trustable Technology Mark A Trustmark for the Internet of Things 6 December 2018 ThingsCon Rotterdam
 Soft Launch Day Peter Bihr (@peterbihr) This work is created as part of a Mozilla Fellowship. Unless otherwise noted, Creative Commons BY-SA 4.0. trustabletech.org is an 
 initiative by ThingsCon e.V. 
 with support from Mozilla.
  • 2. ThingsCon explores and promotes the development of fair, responsible, and human- centric technologies for IoT and beyond. We create events, resources, and tools for a diverse community of practitioners to promote ethical, responsible and human- centric practices. A Trustmark for IoT: A ThingsCon Initiative With support from Mozilla through a Mozilla Fellowship for project lead Peter Bihr
  • 3. The Internet of Things increasingly touches all aspects of our lives, but mostly it consists of black boxes. We need to make sure that we can trust them. Consumers have little insight into how any one connected product works, what it even might be capable of, or if the company employs good, responsible data practices. This is not an oversight on the consumers' side: We lack the tools to find out. Why do we need a trustmark? Image: Pixabay CC0
  • 4. 4 questions that we should be able to answer for every connected device. But for connected products, these are very hard questions to answer. A simple litmus test Source: The Waving Cat (CC BY) Does it do anything I wouldn’t expect? Is the organization trustworthy? Is it made using trustworthy processes? Does it do what I expect it to do?
  • 5. The Trustable Technology Mark empowers consumers to make informed decisions & 
 enables companies to prove their connected products are trustworthy.
  • 6. Applications are open to the public: trustabletech.org/apply
  • 7. Applications are open to the public: trustabletech.org/apply
  • 8. Peter Bihr ThingsCon Mozilla Fellow Project lead thingscon.com
 thewavingcat.com
 @peterbihr Jason Schultz NYU Law Mozilla Fellow Legal theendofownership.com
 its.law.nyu.edu
 @lawgeek Peter Thomas University of Dundee Logo & Brand tompigeon.com
 dundee.ac.uk/djcad ThingsCon Community ThingsCon is a global initiative to explore and promote the development of fair, responsible, and human-centric technologies for IoT and beyond. thingscon.org
 @thingscon
  • 9. The trustmark is aspirational and aims to raise the bar at the top of the pyramid. This work is driven by values. This needs to exist in order to get to a better IoT, and a better society. We believe that good ethics are good for business. Our Goal A trustmark to aim higher. - find out more on medium.com Trustable Tech Mark Baseline certification Great Good Bad
  • 10. Those companies who already build trustworthy products have already done the “hard” work. For them, documenting their work is easy and quick. However, if a company just isn’t there yet, they need to go back and put in more effort. Characteristics Peter Bihr (CC-BY-SA) Hard to earn Valuable/Meaningful Easy to apply The trustmark should be
  • 11. How does it work? Self- assessment Company fills in the self- assessment tool, an online application form that consists of yes/no questions plus explanations. Should the company find it hard to answer questions, they have identified a weakness. Application review Trustmark issued If the application passes, the results are fully published online. If contested questions cannot be resolved, the trustmark is not issued and the results will not be published. 1 2 3 There’s always a human in the loop. Our experts review the application. If necessary, they follow up for clarification. The carrot is public proof that a product is best-in- class: a market incentive. The stick is in the public accountability once the company decides to use the trustmark and the self-assessment results are published in full.
  • 12. The trustmark evaluates products for 5 dimensions that we identified as most crucial for consumers Dimensions *See A Trustmark for IoT (2017), p. 56 Privacy & Data Practices
 How respectful of privacy? Is it designed using state of the art data practices? Transparency
 Is it obvious to users what the device does and how data might be used? Security
 Is it designed and built using state of the art security practices and safeguards? Stability
 How robust? How long a lifecycle to expect? Openness
 How open are device and manufacturer? Is open data used or generated?
  • 13. Security, Transparency, Privacy & Data Practices, Stability are required conditions of trustworthiness. We treat Openness as a strong indicator of trustworthiness. Building blocks of trust See Trustable Tech Mark “Theory of Trust” https://www.thingscon.com/ blog/2018/9/4/trustable-tech-mark- our-theory-of-trust
  • 14. Self-assessment tool Trustmark readiness Trustmark • Doubles to assess readiness and to verify compliance • Our experts review applications and follow up for clarification if necessary • 3rd party advisory services like security consultancy • Non-public / between companies and their advisors • Once passed, the trustmark can be used and the evaluation is published • Underlying assessment (results of self-evaluation tool) is available online 3rd party services • Open licensing of the self-assessments enable 3rd party services (analysis, rankings, etc.) Out of scope (3rd parties) In scope (project core) Out of scope (3rd parties) Elements of a trustmark system
  • 15. The trustmark documentation is provided in a standardized form to allow for third parties to offer services on top of this foundation, like editorials, ratings or reviews. We also work with our academic partners to inspire further research into trust, technology, and policy. The foundation of an ecosystem
  • 16. We’re proud that a wide range of academic, policy and design practice partners support the Trustable Technology Mark and use it as part of their research and practice. Launch partners Find out more trustabletech.org/partners
  • 17. Find out more opendott.org OpenDoTT: In collaboration with University of Dundee, Mozilla, and a host of other partners we are part of an EU- funded PhD program - including a PhD specifically around the Trustmark.
  • 18. Why should a company sign up? Fairphone Image by Fairphone, CC (BY-SA 2.0) This trustmark communicates a company’s commitment to a higher standard, and allows them to prove their connected products are trustworthy. The trustmark increases consumer trust by demonstrating commitment to exemplary levels of transparency, openness and responsibility. The trustmark will attract talent: We believe that only the best companies attract the best talent, and strong vision & values are a key aspect. In short: It provides a USP to demonstrate that your product is best-in-class.
  • 19. Until today, we invited these companies as a proof of concept for the Trustmark as they represent particularly interesting and challenging categories of products. As of 6 Dec 2018, applications are open to the public at trustabletech.org/apply Who uses the Trustmark today? Find out more trustabletech.org/products Snips AI is a 100% on-device and private-by-design Voice AI platform which can be embedded in any device. Animated VaiKai dolls are inspired by the natural way children use their toys.
  • 21. This is a project in an early stage. We’re looking for partners in a number of areas. Particularly we’re looking for… Pathways to partnerships & participation Academic partners to accompany the development of this Trustmark Commercial partners to apply with their products to earn the Trustmark Design studio partners to use the Trustmark to guide their work Non-profit and media partners who can help us understand what they need in order to build third-party offerings on top of a trustmark
  • 22. Applications are open to the public: trustabletech.org/apply