{"guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","title":"IT-Sicherheit für Verbraucher stärken","subtitle":"Entwicklung eines IT-Sicherheitsbewertungssystems für \"intelligente\" Produkte: Auf dem Weg zu einem sicheren Internet der Dinge für Verbraucher","slug":"ds19-10437-it-sicherheit_fur_verbraucher_starken","link":"https://datenspuren.de/2019/fahrplan/events/10437.html","description":"Wie ist der Stand der IT-Sicherheit bei Verbraucherprodukten? Wie könnten europaweit verbindliche Vorgaben zur IT-Sicherheit gemacht werden? Wie lässt sich die IT-Sicherheit eines Produkts transparenter machen? Informatikerin Anja Hirschel und der Europaabgeordnete Patrick Breyer schlagen ein Bewertungssystem zur IT-Sicherheit von Produkten vor und haben einen entsprechenden Antrag eingereicht.\nWie nützlich wäre eine „IT-Sicherheitsampel“ (ähnlich Ernährungsampel) oder bestimmte Icons, die klar zeigen, ob ein Produkt aktualisierbar ist, verschlüsseln kann usw.?\n\nEinreichungstext des Forschungsprojektes:\n\nWhen buying goods with embedded digital technology, like smart products\n(e.g. connected cars, mobile phones, 'Smart TVs' or any other ‘smart’\nproducts that make up the Internet of Things), which IT security\nfeatures are to be subject to the contract? The answer should be clear for the consumer.\n\nWith the Internet of things, 'smart' devices start affecting the world\nin a direct and physical manner (e.g. car technology). IT devices that\nare insecure and vulnerable to integrity and availability threats\nincreasingly risk our lives and property.\n\nConsumers will get more and more familiar with the digital world, and in particular with 'smart' goods. Such growing digital literacy will favour\nthe demand for easy access to more detailed information about smart\ngoods and about how to facilitate their use.\n\nThe Pilot Project will aim to make the new 'Digital Contract' rules\neasily readable for consumers thanks to the development of an IT\nsecurity rating system for smart goods. This IT rating system could for instance consist in 'traffic lights' or icons that would show whether a device will be automatically updated, whether encryption will be applied\nto stored data, or other security features. This information will\ntrigger the consumer's rights and the manufacturer's liability.\n\nAccording to the Digital Content Directive, suppliers of digital goods\nand services will have to provide updates to smart goods, which is not\njust important to make them function longer, but also to increase\ncybersecurity. The Directive provides for objective requirements for the\nconformity of the goods and services, including performance features\nsuch as those related to security, which the consumer may reasonably\nexpect. Thanks to the rating system in 'smart' goods, consumers will for\ninstance know whether such updates happen automatically.\n\nIn order to foster EU innovation in the highly competitive field of the\nInternet of Things (IoT), the European industry needs to attract EU\nconsumers with consumer friendly features in the development of their\nproducts. The legal protection of consumers, and the legal certainty\nabout such protection, are key in developing future markets and make the\nEU compete worldwide, while keeping high level EU standards of consumer\nprotection. Defining a common set of standard rules to rate smart goods\nand their contractual mechanisms could be an asset for European SMEs\nwishing to make their products consumer friendly. This can also support\nthe EU-level development of 'legal design' tools on contract rules to be\nfurther developed by industry players in the field of IoT products, in\npartnership with lawyers and data protection experts.\n\nJUSTIFICATION:\n\nThe European legislator has endeavoured to bring clear legal solutions\nfor consumers, especially when buying 'smart goods', with a Directive on\nContracts for the Supply of Digital Content and Digital Services, and\nwith a Directive on the Sale of Goods, both adopted in 2019. However,\npractical solutions are needed to make sure that consumers can identify\nand compare the IT security features of 'smart goods' and exercise their\ncontractual rights in this respect.","original_language":"deu","persons":["Anja Hirschel","Patrick Breyer"],"tags":["DS2019","10437","2019","Datenspuren"],"view_count":120,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2025-12-17T13:15:08.548+01:00","length":2289,"duration":2289,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10437-it-sicherheit_fur_verbraucher_starken","url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":6},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":7},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":8},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":13},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":8},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":14}],"recordings":[{"size":461,"length":2289,"mime_type":"video/mp4","language":"deu","filename":"DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-09-22T15:54:47.360+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2019/h264-hd/DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_hd.mp4","url":"https://api.media.ccc.de/public/recordings/40814","event_url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_url":"https://api.media.ccc.de/public/conferences/DS2019"},{"size":34,"length":2289,"mime_type":"audio/mpeg","language":"deu","filename":"DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2019-09-22T15:59:57.352+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2019/mp3/DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/40817","event_url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_url":"https://api.media.ccc.de/public/conferences/DS2019"},{"size":23,"length":2289,"mime_type":"audio/opus","language":"deu","filename":"DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2019-09-22T16:00:36.523+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2019/opus/DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_opus.opus","url":"https://api.media.ccc.de/public/recordings/40818","event_url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_url":"https://api.media.ccc.de/public/conferences/DS2019"},{"size":109,"length":2289,"mime_type":"video/mp4","language":"deu","filename":"DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-09-22T16:00:59.132+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2019/h264-sd/DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_sd.mp4","url":"https://api.media.ccc.de/public/recordings/40819","event_url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_url":"https://api.media.ccc.de/public/conferences/DS2019"},{"size":622,"length":2289,"mime_type":"video/webm","language":"deu","filename":"DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-09-22T16:35:33.432+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2019/webm-hd/DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/40827","event_url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_url":"https://api.media.ccc.de/public/conferences/DS2019"},{"size":184,"length":2289,"mime_type":"video/webm","language":"deu","filename":"DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-09-22T16:35:48.162+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2019/webm-sd/DS2019-10437-deu-IT-Sicherheit_fuer_Verbraucher_staerken_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/40828","event_url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_url":"https://api.media.ccc.de/public/conferences/DS2019"}]}