A trustmark for the Internet of Things (IoT):
The Trustable Technology Mark empowers consumers to make informed decisions & enables companies to prove their connected products are trustworthy.
For those companies who already have done the hard work, documenting their work is easy and quick. The certification process is free.
How does the Trustmark work?
The Trustable Technology Mark evaluates 5 dimensions that are essential to establish the trustworthiness of a connected device. The application consists of a self-assessment questionnaire followed by a review by experts from the ThingsCon network.
Privacy & Data Practices
Is it designed using state of the art data practices, and respectful of user rights?
Is it made clear to users what the device does and how data might be used?
Is it designed and built using state of the art security practices and safeguards?
How robust is the device and how long of a life cycle can a consumer reasonably expect?
How open are both the device and the manufacturer‘s processes? Is open data used or generated?
- Within the ThingsCon network, and with the generous support of the Mozilla Foundation, we developed and launched the Trustable Technology Mark, a trustmark for connected products. Why do we need a trustmark for the Internet of Things (IoT)? Most connected products (IoT for short) are essentially black boxes: As consumers we don’t really know what’s […]
- Just a quick note: We’ll be temporarily pausing reviews while setting up more robust review structures and processes, as well as improved governance structures. This is a good sign: It’s time to ramp up our review capacity, and to iteratively improve our workflows based on a few months of learning. In the meantime, the application […]
- Please note that this is cross-posted from Medium. Six years ago, the ThingsCon community set out on a mission: to help create a human-centric & responsible IoT. An important part of this mission was to create a reliable, simple way for consumers to determine whether a connected device meets their privacy and security needs. Why? […]