{"id":30461,"date":"2016-10-25T15:37:11","date_gmt":"2016-10-25T13:37:11","guid":{"rendered":"https:\/\/www.hiig.de\/en\/?p=30461"},"modified":"2021-02-15T10:27:32","modified_gmt":"2021-02-15T09:27:32","slug":"legal-hackathon-privacy-and-security-by-design-for-the-iot","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/","title":{"rendered":"Legal Hackathon: Privacy and Security by Design for the IoT"},"content":{"rendered":"<p><em>Germany\u2019s first Legal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d took place in Berlin at the <a href=\"http:\/\/aoir.org\/aoir2016\/\">AoIR 2016: Internet Rules!<\/a>, the annual conference of the worldwide biggest network of internet researchers. The Legal Hackathon elaborated on a data protection standard for personal data that shall be collected via a public wifi system and used for purposes in a Smart City environment.<\/em><\/p>\n<p>On 5 October 2016, the&nbsp;Legal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d took place in Berlin.&nbsp;The format of Legal Hackathons originates from the movement of <a href=\"https:\/\/legalhackers.org\/\">Legal Hackers<\/a>, which was started in New York in late 2011, and is, now in Germany, conducted by the <a href=\"http:\/\/www.startup-clinics.com\/\">Startup Law Clinic<\/a> of the Alexander von Humboldt Institute for Internet and Gesellschaft and the project Innovation and Law. Legal Hackathons focus on the notion of hackathons (so called <a href=\"https:\/\/de.wikipedia.org\/wiki\/Hackathon\">collaborative software- and\/or hardware development events<\/a>) by concentrating on the implementation of legal requirements of particular Internet Technology Law. This format reacts, hence, to the fact that in areas of technological innovation legal problems can be less and less solved by classic means of legislation or legal consultancy but rather, more effectively, in processes in which technology enterprises, policy makers, scientists, and legal service providers interact cooperatively.<\/p>\n<p>The Internet of Things (IoT) is such an innovative area, which is governed by Internet Technology Law that not only provides for a promising economic opportunity but also for technological and legal challenges in relation to innovative data-driven services and products. As a first example, the Legal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d treated, in the first instance, the question of how a public wifi access system may be set up in a way applying the following three requirements: first, the (personal) data collected via this system must be available, in a non-discriminatory way, to all enterprises acting in the field of Smart Cities and thus interested in that data; second, the provision of the data should be as open toward innovation as possible; and third, the end users connecting to this wifi access system must be protected effectively against related risks. In particular, the last requirement poses an essential challenge because a public wifi system makes it possible, in principle, to track every person moving around in Berlin. During the course of time, the tracking mechanism can therefore lead to a comprehensive movement pattern of each individual in Berlin. The technical reason behind this is that the sender of the public wifi access points are able to identify each device on the basis of its unique IMEI and\/or MAC address. This functionality exists irrespective of whether or not the owner and\/or user of that device has switched on the wifi search function of his or her device. If it is combined with further data, such as the name and address of the device owner, the movement patterns can be related to uniquely identifiable individuals. On the one hand, this makes many useful applications possible, such as for smart city traffic management (e.g. a parking spot finder) or personalized advertising. However, on the other hand, access to such data might be the ideal starting point for a society of \u201ctotal surveillance\u201d (Big Brother is watching you). The question therefore is: how should such a public wifi access system be set up, in favor of innovative services, without denying the necessary protection against its data protection risks?<\/p>\n<p>One solution for this challenge is to set up a common standard specifying the conditions for the processing of that specific personal data. Companies must then apply the standard, i.e. apply these conditions, in order to get access to the data. Such a standard ensures that both end-users of the public wifi system, as well as the companies seeking access to the data, can trust that the processing of that data is legal. The European Data Protection Regulation, which comes into force the 25 May 2018 substituting national data protection regulations in the European Member States, provides for rules how such standards can be set up. Article 25 of the regulation establishes the so-called \u201cprivacy-by-design\u201d principle as: \u201cTaking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects.\u201d Article 32 of the regulation provides for a similar provision regarding the so-called \u201csecurity-by-design\u201d principle. Indeed, these provisions do not specify how the data controller has to precisely implement the privacy- and security-by-design principles. In order to tackle this uncertainty, Articles 40 to 43 regulate how data controllers can set up, together with data protection authorities, so-called codes of conduct and\/or certificates. Such codes of conducts and certificates are standards that specify, as described previously, the legal pre-conditions for the processing of personal data with respect to a particular case.<\/p>\n<p>In light of this approach, theLegal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d tackled the question of how such a standard for a public wifi system should look like. In order to answer that question, the organizers of the Legal Hackathon invited several stakeholders illustrating, in first instance, the use case and its implications in terms of urban development and data protection. The participants included: the Smart City Berlin Network; Cisco as possible provider of the wifi infrastructure; the Berlin-based startup predict.io as possible controller of the personal data collected via this wifi system (e.g. providing, as mentioned previously, the parking spot assistant); the Berlin Data Protection Authority; and the Berlin-based innovation lab WattX, which focused on the question of how the privacy- and security-by-design principles should be implemented in order to meet the end users\u2019 demand in terms of user experience design. In second instance, the actual \u201chack\u201d began: 18 data protection experts from all over the world and different research disciplines had 60 minutes in order to develop possible solutions for the privacy- and security-by-design standard. Finally, the Berlin Data Protection Authority, and the user experience researcher, evaluated the solutions from a legal data protection and a user experience perspective. The results will be illustrated in more detail in an autonomous research paper and will provide the basis for an ongoing standardization process.<\/p>\n<p>The organizers of the Legal Hackathon believe that the results were so promising that the format will be extended to further methods such as Gamathons, as well as further areas, such as Smart Homes, Wearables, and FinTechs. Interested parties are invited to participate and\/or to propose further areas under:<\/p>\n<p>Maximilian von Grafenstein LL.M.<br \/>\n<a href=\"mailto:maxgrafenstein@hiig.de\">maxgrafenstein@hiig.de<\/a><\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Flegal-hackathon-privacy-and-security-by-design-for-the-iot%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Legal%20Hackathon%3A%20Privacy%20and%20Security%20by%20Design%20for%20the%20IoT https%3A%2F%2Fwww.hiig.de%2Fen%2Flegal-hackathon-privacy-and-security-by-design-for-the-iot%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Flegal-hackathon-privacy-and-security-by-design-for-the-iot%2F&subject=Legal%20Hackathon%3A%20Privacy%20and%20Security%20by%20Design%20for%20the%20IoT\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Germany\u2019s first Legal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d took place in Berlin at the AoIR 2016: Internet Rules!, the annual conference of the worldwide biggest network of internet researchers. The Legal Hackathon elaborated on a data protection standard for personal data that shall be collected via a public wifi system&hellip;<\/p>\n","protected":false},"author":39,"featured_media":30459,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-30461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Legal Hackathon: Privacy and Security by Design for the IoT &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legal Hackathon: Privacy and Security by Design for the IoT &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Germany\u2019s first Legal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d took place in Berlin at the AoIR 2016: Internet Rules!, the annual conference of the worldwide biggest network of internet researchers. The Legal Hackathon elaborated on a data protection standard for personal data that shall be collected via a public wifi system&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-25T13:37:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-15T09:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/10\/hackathon2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Max von Grafenstein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Max von Grafenstein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Legal Hackathon: Privacy and Security by Design for the IoT &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/","og_locale":"en_US","og_type":"article","og_title":"Legal Hackathon: Privacy and Security by Design for the IoT &#8211; Digital Society Blog","og_description":"Germany\u2019s first Legal Hackathon \u201cBuilding Standards of Privacy- and Security-by-Design for the IoT\u201d took place in Berlin at the AoIR 2016: Internet Rules!, the annual conference of the worldwide biggest network of internet researchers. The Legal Hackathon elaborated on a data protection standard for personal data that shall be collected via a public wifi system&hellip;","og_url":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/","og_site_name":"HIIG","article_published_time":"2016-10-25T13:37:11+00:00","article_modified_time":"2021-02-15T09:27:32+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/10\/hackathon2.png","type":"image\/png"}],"author":"Max von Grafenstein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Max von Grafenstein","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/"},"author":{"name":"Max von Grafenstein","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/149b9fb7ac77e370bbac8689b7110527"},"headline":"Legal Hackathon: Privacy and Security by Design for the IoT","datePublished":"2016-10-25T13:37:11+00:00","dateModified":"2021-02-15T09:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/"},"wordCount":1185,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/","url":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/","name":"Legal Hackathon: Privacy and Security by Design for the IoT &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2016-10-25T13:37:11+00:00","dateModified":"2021-02-15T09:27:32+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/legal-hackathon-privacy-and-security-by-design-for-the-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Legal Hackathon: Privacy and Security by Design for the IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/149b9fb7ac77e370bbac8689b7110527","name":"Max von Grafenstein"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/30461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=30461"}],"version-history":[{"count":3,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/30461\/revisions"}],"predecessor-version":[{"id":74472,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/30461\/revisions\/74472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/30459"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=30461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=30461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=30461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}