Terms Of Usage

TERMS OF USAGE – Telemetry

Welcome to our Website.

Your access to and use of this Website is subject to these Website Terms of Use. Please read them carefully before accessing or using this Website.

1. DEFINITIONS

TELEMETRY (Trustworthy mEthodologies, open knowLedgE & autoMated tools for sEcurity Testing of IoT software, haRdware & ecosYstems) is a Horizon Europe project , funded by the European Union under grant agreement ID 101119747.. 

Within its 3-year duration (2024 – 2027) the project will provide new avenues for IoT ecosystems, interconnected with hardware/software, governed by trustworthy tools and methodologies for cybersecurity testing.

“Materials” refer to all information, content, data, documents (e.g. white papers, brochures, datasheets, FAQs, templates, press releases, etc.), downloads, files, text, images, photographs, graphics, videos, webcasts, publications, tools, resources, software, code, programs, applications and products made available or enabled via the Website.

“Consortium” or “Project Team” refer to all  partnering institutions.

The term “Communication Leader”, otherwise stated as ‘us’ or ‘we’, refers to the owner and creator of the Website http://www.telemetry-project.eu (collectively referred to herein below as this “Website”), in order to provide information to its users. The Communication Leader acts on behalf of the Project Team.

Athens Technology Center S.A. (ATC) is the assigned Communication Leader of the Project, based on the No 101119747 – HORIZON-CL3-2022-CS-01 Grant Agreement. Based on this Grant Agreement, the Communication Leader is responsible for coordinating the communication activities related to the Project’s expected results, including the creation and management of the Website or any other Materials included in it.

The term ‘you’ refers to the visitor of our Website.

2. SCOPE

These Website Terms and Conditions (these “Terms” or these “Website Terms and Conditions”) contained herein, shall govern your use of this Website, including all pages within this Website. These Terms apply in full force and effect to your use of this Website and, by using this Website, you expressly accept all terms and conditions contained herein in full. You must not use this Website, if you have any objection to any of these Website Terms and Conditions.

3. YOUR USE OF THE WEBSITE

You agree to use the Website and its contents only for purposes that are permitted by the Terms of Use and any applicable law, regulation or generally accepted practices or guidelines in the relevant jurisdictions.

You specifically agree not to access (or attempt to access) any of the Materials, through any automated means (including use of scripts or web crawlers), or by hacking, password mining or other means. You agree that you will not engage in any activity that interferes with or disrupts the Website (or the servers and networks, which are connected to or accessible through the Website).

You also agree to use the functionalities available in the Website only to access, download, utilize, post, send or receive Materials in an appropriate manner, if permitted in the Website.

You may view, download for caching purposes only, and print Material from the Website for your own personal use, subject to the restrictions set out below and elsewhere in these Terms and Conditions.

You must not use this Website to copy, store, host, transmit, send, use, publish or distribute any Material, which consists of (or is linked to) any spyware, computer virus, Trojan horse, worm, keystroke logger, rootkit or other malicious computer software. You must not conduct any systematic or automated data collection activities (including without limitation scraping, data mining, data extraction and data harvesting) on or in relation to this Website without the Communication Leader’s express written consent. You also agree not to use any Materials in a manner that infringes any Intellectual Property Rights or rights of any party, not to reproduce or utilize in other electronic or printed publications. The graphic as well as technical design and all contact as well as pictures used in this online presentation are protected by copyright.

You also agree not to use Website’s domain name as a pseudonymous return e-mail address; not to disrupt, interfere or inhibit any other user from using and enjoying the Website or other affiliated or linked sites, or the Materials; and not to use any Materials in a manner that infringes any Intellectual Property Rights or rights of any party.

4. COPYRIGHT AND INTELLECTUAL PROPERTY RIGHTS

Other than content you own, which you may have opted to include on this Website, under these Terms, the Consortium own all rights to the intellectual property Material contained in this Website, and all such rights are reserved. The Communication Leader authorizes users to copy and print extracts or documents from this Website solely for personal, non-commercial use, on the understanding that that any copy or extract of said documents or pages obtained, maintain all intellectual property rights or other property notices including all disclaimers contained therein. The

Except as permitted by the copyright law applicable, you may not reproduce or communicate any of the content on this Site, including files downloadable from this website, without the written permission of the copyright owner.

5. TRADEMARKS, TRADE NAMES AND LOGOS

All trademarks, trade names and logos appearing in the Website are the property of their respective owners and are protected by the international copyright and trademark laws. You agree not to defame or disparage the Project and all trademarks, trade names or logos included in the Website or in the Materials. Any use of any of the trademarks, trade names and logos appearing throughout the Website without the express written consent of the Project’s Communication Leader or the owner of the trademark or name or logo, as applicable, is strictly prohibited.

6. LICENSE TO YOU

The Consortium grants you a personal, worldwide, non-assignable, royalty free and non-exclusive license to use the Website solely for the purpose of enabling you to use and enjoy the benefit of the Website and the Materials, in the manner permitted by these Terms of Use. You may not (and you may not permit anyone else to) copy, reverse engineer, create a derivative work of, or decompile or otherwise attempt to extract the source code of the Website or any part thereof, unless this is expressly permitted or required by law, or unless you have been specifically permitted to do so by the Communication Leader. Unless the Communication Leader has given you written permission to do so, you may not assign (or grant a sub-license of) your rights to use the Website or the Materials, grant a security interest in or over your rights to use the Website or the Materials, or otherwise transfer any of your rights to use them.

7. LINKS TO OTHER INTERNET SITES

The Website may contain links to other internet sites and services that are operated and maintained by third parties or its affiliates. You acknowledge, understand and agree that the Communication Leader will not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any such content, products or services available on such other sites.

8. DATA PROTECTION & PRIVACY

Please check our Privacy Policy.

9. CHANGES

The Communication Leader reserves the right to modify, suspend, or discontinue any portion of the Website and Materials at any time, with or without notice. The Communication Leader reserves the right to modify any part of these Terms of Use at any time. Any modifications shall be effective upon posting to the Website. You agree to review these Terms of Use periodically so that you are aware of any such modifications. Your continued use of the Website after any such modifications have been posted shall be deemed your acceptance of any modifications to the Terms of Use. If, at any time, the Terms of Use are not acceptable to you, you should immediately cease use of the Website. You agree that the above-stated standard for notice of modifications is reasonable.

10. LIMITATION OF LIABILITY

The Communication Leader shall bear no liability for any direct, indirect, incidental or consequential damages that may be due to the incorrect use of the Website by Users or to any errors, failures, defects or delays in the operation of the Website or in the transmission of information on the Internet through this Website.

11. JURISDICTION

By accessing this Website, and the Materials, you agree that all matters relating to your access to, or use of them, shall be governed by the statutes and laws of Greece (country where the Communication leader is based) and European Union, without respect to conflicts of laws principles thereof. Any disputes arising out of the use of this Website will be subject to the exclusive jurisdiction of the Courts of Athens, Greece.

12. GENERAL

The Communication Leader’s performance of these Terms of Use is subject to existing laws and legal process, and nothing contained in these Terms of Use shall derogate the Communication Leader’s right to comply with law enforcement requests or requirements relating to your use of the Website or information provided to or gathered by the Communication Leader with respect to such use. If any provision of these Terms of Use shall be unlawful, void, or for any reason unenforceable, then that provision shall be deemed severable from these Terms of Use and shall not affect the validity and enforceability of any remaining provisions. These Terms of Use constitute the entire agreement between the parties relating to the subject matter herein, and replace all prior or contemporaneous communications, oral or written.

 

European Cyber Security Community Initiative (ECSCI)

The European Cyber Security Community Initiative (ECSCI) brings together EU-funded cybersecurity research and innovation projects to foster cross-sector collaboration and knowledge exchange. Its aim is to align technical and policy efforts across key areas such as AI, IoT, 5G, and cloud security. ECSCI organizes joint dissemination activities, public workshops, and strategic dialogue to amplify the impact of individual projects and build a more integrated European cybersecurity landscape.

Supported by the European Commission, ECSCI contributes to shaping a shared vision for cybersecurity in Europe by reinforcing connections between research, industry, and public stakeholders.

European Cluster for Cybersecurity Certification

The European Cluster for Cybersecurity Certification is a collaborative initiative aimed at supporting the development and adoption of a unified cybersecurity certification framework across the European Union. Bringing together key stakeholders from industry, research, and national authorities, the cluster facilitates coordination, knowledge exchange, and alignment with the EU Cybersecurity Act.

Its mission is to contribute to a harmonized approach to certification that fosters trust, transparency, and cross-border acceptance of cybersecurity solutions. The cluster also works to build a strong stakeholder community that can inform and support the work of the European Union Agency for Cybersecurity (ENISA) and the future European cybersecurity certification schemes.

CertifAI

CertifAI is an EU-funded project aimed at enabling organizations to achieve and maintain compliance with key cybersecurity standards and regulations, such as IEC 62443 and the EU Cyber Resilience Act (CRA), across the entire product development lifecycle. Rather than treating compliance as a one-time activity or post-development task, CertifAI integrates compliance checks and evidence collection as continuous, embedded practices within daily development and operational workflows.

The CertifAI framework provides structured, practical guidance for planning, executing, and monitoring compliance assessments. It supports organizations in conducting gap analyses, building compliance roadmaps, collecting evidence, and preparing for formal certification. The methodology leverages best practices from established cybersecurity frameworks and aligns with Agile and DevSecOps principles, enabling continuous and iterative compliance checks as products evolve.

A central feature of CertifAI is the use of automation and AI-driven tools—such as Retrieval-Augmented Generation (RAG) systems and Explainable AI—to support the interpretation of complex requirements, detect non-conformities, and generate Security Assurance Cases (SAC) with traceable evidence. The approach is organized into five main phases: preparation and planning, evidence collection and mapping, assessment execution, reporting, and ongoing compliance monitoring.

CertifAI’s methodology is designed to be rigorous yet adaptable, offering organizations a repeatable process to proactively identify, address, and document compliance gaps. This supports organizations not only in meeting certification requirements, but also in embedding a culture of security and compliance into daily practice.

Ultimately, CertifAI’s goal is to make compliance and security assurance continuous, transparent, and integrated, helping organizations efficiently prepare for certification while strengthening their overall cybersecurity posture.

DOSS

The Horizon Europe DOSS – Design and Operation of Secure Supply Chain – project aims to improve the security and reliability of IoT operations by introducing an integrated monitoring and validation framework to IoT Supply Chains.

DOSS elaborates a “Supply Trust Chain” by integrating key stages of the IoT supply chain into a digital communication loop to facilitate security-related information exchange. The technology includes security verification of all hardware and software components of the modelled architecture. A new “Device Security Passport” contains security-relevant information for hardware devices and their components. 3rd party software, open-source applications, as well as in-house developments are tested and assessed. The centrepiece of the proposed solution is a flexibly configurable Digital Cybersecurity Twin, able to simulate diverse IoT architectures. It employs AI for modelling complex attack scenarios, discovering attack surfaces, and elaborating the necessary protective measures. The digital twin provides input for a configurable, automated Architecture Security Validator module which assesses and provides pre-certification for the modelled IoT architecture with respect of relevant, selectable security standards and KPIs. To also ensure adequate coverage for the back end of the supply chain the operation of the architecture is also be protected by secure device onboarding, diverse security and monitoring technologies and a feedback loop to the digital twin and actors of the supply chain, sharing security-relevant information.

The procedures and technology will be validated in three IoT domains: automotive, energy and smart home.

The 12-member strong DOSS consortium comprises all stakeholders of the IoT ecosystem: service operators, OEMs, technology providers, developers, security experts, as well as research and academic partners.

EMERALD: Evidence Management for Continuous Compliance as a Service in the Cloud

The EMERALD project aims to revolutionize the certification of cloud-based services in Europe by addressing key challenges such as market fragmentation, lack of cloud-specific certifications, and the increasing complexity introduced by AI technologies. At the heart of EMERALD lies the concept of Compliance-as-a-Service (CaaS) — an agile and scalable approach aimed at enabling continuous certification processes in alignment with harmonized European cybersecurity schemes, such as the EU Cybersecurity Certification Scheme for Cloud Services (EUCS).

By focusing on evidence management and leveraging results from the H2020 MEDINA project, EMERALD will build on existing technological readiness (starting at TRL 5) and push forward to TRL 7. The project’s core innovation is the development of tools that enable lean re-certification, helping service providers, customers, and auditors to maintain compliance across dynamic and heterogeneous environments —including Cloud, Edge, and IoT infrastructures.

EMERALD directly addresses the critical gap in achieving the ‘high’ assurance level of EUCS by offering a technical pathway based on automation, traceability, and interoperability. This is especially relevant in light of the emerging need for continuous and AI-integrated certification processes, as AI becomes increasingly embedded in cloud services.

The project also fosters strategic alignment with European initiatives on digital sovereignty, supporting transparency and trust in digital services. By doing so, EMERALD promotes the adoption of secure cloud services across both large enterprises and SMEs, ensuring that security certification becomes a practical enabler rather than a barrier.

Ultimately, EMERALD’s vision is to provide a robust, flexible, and forward-looking certification ecosystem, paving the way for more resilient, trustworthy, and user-centric digital infrastructures in Europe.

SEC4AI4SEC

Sec4AI4Sec is a project funded by the European Union’s Horizon Europe research and innovation programme under grant agreement No 101120393.

This project aims to create a range of cutting-edge technologies, open-source tools, and new methodologies for designing and certifying secure AI-enhanced systems and AI-enhanced systems for security. Additionally, it will provide reference benchmarks that can be utilized to standardize the evaluation of research outcomes within the secure software research community.

The project is divided into two main phases, each with its own name.

·       AI4Sec – stands for using artificial intelligence in security. Democratize security expertise with an AI-enhanced system that reduces development costs and improves software quality. This part of the project improves via AIs the secure coding and testing.

·       Sec4AI –  involves AI-enhanced systems. These systems also have risks that make them vulnerable to new security threats unique to AI-based software, especially when fairness and explainability are essential.

The project considers the economic and technological impacts of combining AI and security.

The economic phase of the project focuses on leveraging AI to drive growth, productivity, and competitiveness across industries. It includes developing new business models, identifying new market opportunities, and driving innovation across various sectors.