The Trustable Technology Mark aims to highlight the work of those companies that put in the extra effort of building truly trustworthy devices.
How does the Trustable Technology Mark work?
The Trustable Technology Mark evaluates the trustworthiness of a connected device, based on information provided by the device maker and reviewed by experts from the ThingsCon network.
5 Dimensions of Trust
The Trustable Technology Mark evaluates 5 dimensions that are essential to establish the trustworthiness of a connected device.
Privacy & Data Practices
Is it designed using state of the art data practices, and respectful of user rights?
Transparency
Is it made clear to users what the device does and how data might be used?
Security
Is it made clear to users what the device does and how data might be used?
Stability
How robust is the device and how long of a life cycle can a consumer reasonably expect?
Openness
How open are both the device and the manufacturer‘s processes? Is open data used or generated?
The first four of these dimensions are the foundational building blocks of trustworthiness
Without a strong commitment to security, transparency, data protection and stability (in the sense of designing for robustness and longevity), a connected device cannot be trusted.
The fifth dimension, openness, plays a special role: In our view, openness is not a required condition, but it is a strong indicator for trustworthiness. Concretely, when evaluating incoming applications we look for openness, and if the device is largely open we look at the rest of the application with a stronger assumption of trustworthiness.
See our Theory of Trust on thingscon.com.
A pool of experts from the ThingsCon network reviews all applications based on the information provided by the device maker as part of a self-assessment for completeness and consistency, and follows up for clarification if necessary. The results of the self-assessment are published in full under an open license as part of the certification requirements.