Resources

Informing participants about IoT security, the multistakeholder process, and similar projects around the globe

Meeting Agendas and Reports

Agenda - Multistakeholder Event #3 - Sept 5

Download

Agenda - Multistakeholder Event #2 - June 21

Download

Agenda - Multistakeholder Event #1 - April 4

Download

Multistakeholder meeting #2 Report - June 21

This report outlines information about stakeholders in attendance, the agenda, the established working groups, and action items to carry forward. This meeting took place on June 21st in Ottawa. Video archives can be found on our Livestream page.

Download

Multistakeholder meeting #1 Report - April 4

This report outlines information about stakeholders in attendance, the agenda, the established ground rules for the multistakeholder process, and action items to carry forward. This meeting took place on April 4th in Ottawa. Video archives can be found on our Livestream page.

Download

Webinar Reports

Network Resiliency Webinar - June 14

Download

French Roundtable - July 17

Download

Ranking Digital Rights Webinar - July 12

Download

Presentations

Privacy By Design - Dr. Ann Cavoukian - Sept 5. Meeting

Download

Network Resiliency Presentation - Jordan Melzer - Sept 5. Meeting

Download

Jacques Latour presentation - Multistakeholder Event #1 - April 4

Download

Olaf Kolkman presentation - Multistakeholder Event #1 - April 4

Download

Labelling Presentation - Labelling Webinar - August 1

Download

Consumer Education Presentation - Rouba Alfattal - Sept 5. Meeting

Download

Labelling Presentation - Faud Khan - Sept 5. Meeting

Download

Maarten Botterman presentation - Multistakeholder Event #1 - April 4

Download

Faud Kahn presentation - Multistakeholder Event #1 - April 4

Download

Research Documents and Standards

OTA VFTF

The OTA Vision For The Future document briefly outlines the challenges associated with IoT deployment and provides a high-level guideline for developing a sustainable IoT ecosystem.

Download

PIPEDA

The Personal Information Protection and Electronic Documents Act (PIPEDA) is the federal privacy law for private-sector organizations. It sets out the ground rules for how businesses must handle personal information in the course of commercial activity.

Download

IGF Good Practice Paper

This paper represents an overview of the current thinking, with the aim to further develop this position during the IGF meeting in 2017, moving towards a "rough consensus", global, multi stakeholder position on an ethical approach towards loT development and deployment.

Download

ISOC’s Securing the Internet of Things: A Multistakeholder Approach for Canada

This paper contextualizes Canada’s multistakeholder process for the development of a broad-reaching policy to govern the security of the Internet of Things.

Download

NIST Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT)

Download

ISOC's IOT for Policymakers

Policymakers have important choices to make to help shape the future of IoT security. This paper is intended for regulators, policymakers, and anyone interested in the development and implementation of policy tools regarding IoT security.

Download

IoT Security Guidelines ver. 1.0 Formulated

The creation of innovative business models through the utilization of IoT and the realization of a safe and secure society for the public are important goals for Japan.

Learn more

MANRS

This document aims to provide guidance to network operators in addressing issues of security and resilience of the global Internet routing system. Another important goal is to document the commitment of industry leaders to address these issues, which should amplify the impact as more supporters join.

Download

OTA IOT Security and Privacy Trust Framework

The IoT Trust Framework includes a set of strategic principles necessary to help secure IOT devices and their data when shipped and throughout their entire life-cycle.

Download

Gov't of UK- Secure by Design: Improving the cyber security of consumer Internet of Things Report

The report and draft Code of Practice advocates a fundamental shift in approach to moving the burden away from consumers having to secure their devices and instead ensure strong cyber security is built into consumer IoT products by design.

Download

OTA Top Level Vulnerabilities for Consumer Products

This paper outlines the high-level vulnerabilities for IOT devices. It was included in the welcome packet at our first multistakeholder event in Ottawa on April 4th.

Download