Skip to content
Image
h
Image

2 Days. 2 Phases. Endless Innovation — Ideathon + Hackathon

Hack.IT@BVP 3.0: Engineering a Transparent and Secure Digital Future

Hosted by the Department of Information Technology at Bharati Vidyapeeth’s College of Engineering (BVCOE), New Delhi, Hack.IT@BVP 3.0 is a premier technical symposium designed for passionate innovators. This iteration brings together diverse disciplines to architect solutions centered on digital trust, data accountability, and the strategic pillars of the G20 priorities.


The Experience

Designed as a rigorous two-day hybrid event, the program is structured to take participants from initial conceptualization to a finished technical product:

  • Phase I: Ideathon 💡- 11 April 2026
    A forum for high-level brainstorming and strategic pitching, where teams present impactful ideas that address contemporary global challenges.
  • Phase II: Hackathon 💻- 17-18 April 2026
    A transition into rapid development, where participants build and refine functional prototypes under time-sensitive conditions.

All teams chosen to present their ideas in the ideathon are automatically selected for the first round of the Hackathon.
The presentation round for the Ideathon will be on 11 April 2026 on the BVCOE Campus.
The first and second round of the Hackathon will be online whereas the final round will be on held on the BVCOE Camous on 18 April 2026.

Please mail at [email protected] for any further doubts.

Technical Domains & Innovation

Hack.IT@BVP 3.0 emphasizes the intersection of advanced technology and ethical design. Participants are encouraged to explore:

  • Emerging Technologies: Utilizing Artificial Intelligence, Cybersecurity frameworks, and Blockchain to solve complex problems.
  • Regulatory Alignment: Designing systems that are not only technologically superior but also legally compliant and architecturally sound.
  • Social Responsibility: Creating data-driven solutions that prioritize user accountability and global digital safety.

Mentorship and Growth

This event serves as an incubator for professional development, providing participants with:

  • Expert Guidance: Direct access to industry veterans and distinguished academicians for technical and strategic mentorship.
  • Collaborative Environment: An opportunity to network with a peer group of engineers and technologists from across the country.
  • Tangible Impact: A platform to showcase innovations that have the potential to influence real-world digital policy and infrastructure.

Please note: As this is not a 24 hour offline hackathin, no accomodation will be provided to the participants.

Build. Innovate. Impact.
Join us at Hack.IT@BVP 3.0 to transform your vision into the next standard of digital excellence.

The tracks for the hackathon are as follows:
1.Consent-Aware AI Pipelines
• AI systems increasingly rely on personal datasets without dynamic consent tracking or data lifecycle visibility.
• How can intelligent systems automatically verify consent validity, enforce data minimisation, and prevent unauthorised data usage in AI model training and inference?
2.Privacy-Preserving Age Verification Intelligence
• Age detection systems frequently rely on intrusive identity data collection or inaccurate heuristics.
• How might AI enable accurate yet privacy-preserving age assurance mechanisms using minimal personal data exposure?
3.Tamper-Proof Data Consent Ledgers
Consent records today are stored in centralised databases that are prone to manipulation or inconsistencies.
How can decentralised technologies enable immutable, verifiable consent histories accessible across platforms?
4.Real-Time Data Breach Detection & Response Systems
• Delayed breach detection increases financial loss and reputational damage.
• Develop proactive monitoring solutions that detect anomalous data access patterns and trigger automated containment actions.
5.Automated Regulatory Breach Reporting Frameworks
• Organisations lack efficient systems to notify authorities and users within mandated timelines.
• Create secure reporting pipelines that generate compliant alerts and structured incident disclosures.
6.Sector-Specific Sensitive Data Protection Architectures
• Healthcare, financial, and education platforms face high-impact risks from unauthorized data exposure.
• Design adaptive security frameworks ensuring granular access control and high-assurance data protection.
7.Detecting Over-Collection of Personal Data
• Digital services frequently collect excessive user information beyond functional requirements.
• How can analytical models identify redundant data collection patterns and recommend minimisation strategies?
8.Trust Score Modelling for Digital Platforms
• Users lack measurable indicators of how responsibly platforms handle their personal data
• Develop data-driven trust scoring mechanisms based on transparency, compliance signals, and incident history.
9.Privacy-Aware Smart Device Data Governance
• Connected devices continuously collect behavioural and environmental data with limited user awareness.
• How can automated systems enforce contextual data collection policies in smart environments?

Rules

Follow the Code of Conduct.

Find us on

Instagram

2 Days. 2 Phases. Endless Innovation — Ideathon + Hackathon

Runs from

Apr 11 - 18, 2026

Happening

New Delhi, India

Closes in

Hack.IT@BVP 3.0: Engineering a Transparent and Secure Digital Future

Hosted by the Department of Information Technology at Bharati Vidyapeeth’s College of Engineering (BVCOE), New Delhi, Hack.IT@BVP 3.0 is a premier technical symposium designed for passionate innovators. This iteration brings together diverse disciplines to architect solutions centered on digital trust, data accountability, and the strategic pillars of the G20 priorities.


The Experience

Designed as a rigorous two-day hybrid event, the program is structured to take participants from initial conceptualization to a finished technical product:

  • Phase I: Ideathon 💡- 11 April 2026
    A forum for high-level brainstorming and strategic pitching, where teams present impactful ideas that address contemporary global challenges.
  • Phase II: Hackathon 💻- 17-18 April 2026
    A transition into rapid development, where participants build and refine functional prototypes under time-sensitive conditions.

All teams chosen to present their ideas in the ideathon are automatically selected for the first round of the Hackathon.
The presentation round for the Ideathon will be on 11 April 2026 on the BVCOE Campus.
The first and second round of the Hackathon will be online whereas the final round will be on held on the BVCOE Camous on 18 April 2026.

Please mail at [email protected] for any further doubts.

Technical Domains & Innovation

Hack.IT@BVP 3.0 emphasizes the intersection of advanced technology and ethical design. Participants are encouraged to explore:

  • Emerging Technologies: Utilizing Artificial Intelligence, Cybersecurity frameworks, and Blockchain to solve complex problems.
  • Regulatory Alignment: Designing systems that are not only technologically superior but also legally compliant and architecturally sound.
  • Social Responsibility: Creating data-driven solutions that prioritize user accountability and global digital safety.

Mentorship and Growth

This event serves as an incubator for professional development, providing participants with:

  • Expert Guidance: Direct access to industry veterans and distinguished academicians for technical and strategic mentorship.
  • Collaborative Environment: An opportunity to network with a peer group of engineers and technologists from across the country.
  • Tangible Impact: A platform to showcase innovations that have the potential to influence real-world digital policy and infrastructure.

Please note: As this is not a 24 hour offline hackathin, no accomodation will be provided to the participants.

Build. Innovate. Impact.
Join us at Hack.IT@BVP 3.0 to transform your vision into the next standard of digital excellence.

The tracks for the hackathon are as follows:
1.Consent-Aware AI Pipelines
• AI systems increasingly rely on personal datasets without dynamic consent tracking or data lifecycle visibility.
• How can intelligent systems automatically verify consent validity, enforce data minimisation, and prevent unauthorised data usage in AI model training and inference?
2.Privacy-Preserving Age Verification Intelligence
• Age detection systems frequently rely on intrusive identity data collection or inaccurate heuristics.
• How might AI enable accurate yet privacy-preserving age assurance mechanisms using minimal personal data exposure?
3.Tamper-Proof Data Consent Ledgers
Consent records today are stored in centralised databases that are prone to manipulation or inconsistencies.
How can decentralised technologies enable immutable, verifiable consent histories accessible across platforms?
4.Real-Time Data Breach Detection & Response Systems
• Delayed breach detection increases financial loss and reputational damage.
• Develop proactive monitoring solutions that detect anomalous data access patterns and trigger automated containment actions.
5.Automated Regulatory Breach Reporting Frameworks
• Organisations lack efficient systems to notify authorities and users within mandated timelines.
• Create secure reporting pipelines that generate compliant alerts and structured incident disclosures.
6.Sector-Specific Sensitive Data Protection Architectures
• Healthcare, financial, and education platforms face high-impact risks from unauthorized data exposure.
• Design adaptive security frameworks ensuring granular access control and high-assurance data protection.
7.Detecting Over-Collection of Personal Data
• Digital services frequently collect excessive user information beyond functional requirements.
• How can analytical models identify redundant data collection patterns and recommend minimisation strategies?
8.Trust Score Modelling for Digital Platforms
• Users lack measurable indicators of how responsibly platforms handle their personal data
• Develop data-driven trust scoring mechanisms based on transparency, compliance signals, and incident history.
9.Privacy-Aware Smart Device Data Governance
• Connected devices continuously collect behavioural and environmental data with limited user awareness.
• How can automated systems enforce contextual data collection policies in smart environments?

Find us on

Instagram

$9,000

Available in Prizes

$9,000

Available in Prizes

Sponsors

Sponsors

Gold

hoverRobotixRevUp GlobaltheMENTORxLUCR8 VENTURES
Wolfram

Sponsors

Sponsors

Gold

hoverRobotixRevUp GlobaltheMENTORxLUCR8 VENTURES
Wolfram

FAQs

Team size

1 - 4

Registration costs?

Nada.

Team size

1 - 4

Registration costs?

Nada.

Got more questions? Reach out to [email protected]

FAQs

Team size

1 - 4

Registration costs?

Nada.

Team size

1 - 4

Registration costs?

Nada.

Got more questions? Reach out to [email protected]

Hacker reviews

0/5

No reviews for this rating yet.