RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.

Slides:



Advertisements
Similar presentations
Presented by: Chakman Choi, Baradhwaj Hariharan, Uday Sankar Kandolath Date: 4/3/07.
Advertisements

Consumer Interaction with RFID Fashion Labels. Today, RFID labels are predominantly used for inventory management on the shop floor. After the point of.
Location Based Services and Privacy Issues
M-technology pilot programme Radio Frequency Identification Device (RFID)
New Venture Creation December 10, 2010 tracker buy New Venture Creation December 10, 2010 Buy Tracker Turning Consumer Information into Knowledge tracker.
E-Seals for container security. E-Seals advantages over mechanical seals Can be checked by –automatic systems –unqualified personal Lowers probability.
London & Zurich Plc User Guide. Service Benefits Full on-line management of client accounts Paperless direct debit – no signatures required Standing orders.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
RFID The consumers’ scenarios Emilie Barrau ANEC General Assembly Brussels 1 June 2007.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
A look around the corner: How permission-based marketing, data-alignment, and RFID will shape the future of commerce. Presented By Jeffery Giesener MinneBar.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
1 Challenges For A Credit Bureau In Emerging Markets.
IPM Asset Solutions: Where Innovation Meets Experience.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Wichitarotary.org Mobile version. When you go to our mobile website, you begin on the Home page which looks like this.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
ABC eGiving A simple, EASY online solution for tithes, offerings and donations.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
A questionnaire is a effective way of gaining information quickly and directly from an audience, and the results from a questionnaire can be displayed.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Administrator – Employee Overview September, 2011.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
RFID and Privacy Dan White RFID Technical Evangelist Engineering & Development Retail Solutions Division.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID and Public Policy Elliot Maxwell Fellow, Communications Program, Johns Hopkins University and Distinguished Research Fellow, Pennsylvania State University.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
Data Protection and research Rachael Maguire Records Manager.
Policies and Security for Internet Access
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Computers in the Textiles Industry. More Efficient Faster: Reduces the time taken to complete tasks Cheaper: Decreases costs within industry Provide a.
SOLUTION TO PERMANENTLY STOP SALE OF FAKE, SPURIOUS, PIRATED AND DUPLICATE PRODUCTS.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Independent Centre for Privacy Protection Schleswig-Holstein
Technology in Retail.
Nina Barakzai November 2017
OCR GCSE ICT Data capture methods.
Who Uses Encryption? Module 7 Section 3.
Wichitarotary.org Mobile version
Introduction, Adoption And challenges
Computers in the Textiles Industry
HOW DO I KEEP MY COMPUTER SAFE?
I (do not) consent to behavioural advertising
MIPC Proposal – <INSERT TITLE> for <INSERT INDUSTRY>
IT and Society Week 2: Privacy.
Presentation transcript:

RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven

RFID Applications  Logistics  Recycling and waste management  Passports  Libraries  Newborn armbands  Prisoners tagging  VIP Clubs E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

E. Kosta: “RFID Technology: When innovation brings along data protection challenges” Are there privacy risks in all the aforementioned applications?

E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

What are “personal data”? “Personal data” shall mean any information relating to an identified or identifiable natural person. E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

When do data protection issues arise? RFID tags contain personal data RFID tags can be linked to a natural person E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

RFID Applications  Logistics  Recycling and waste management  Passports  Libraries  Newborn armbands  Prisoners tagging  VIP Clubs E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

RFID Applications  Logistics  Recycling and waste management  Libraries  Newborn armbands  Prisoners tagging  VIP Clubs  Passports E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

E. Kosta: “RFID Technology: When innovation brings along data protection challenges” What about retail sector?

Privacy threats  Continuous link between tag and object  holder of the object, e.g. “shopper’s profile”  Linking with personal data, such as credit card details or loyalty cards  Consumer anonymity?  Creation of databases  Profiling E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

Privacy threats  Direct marketing when entering an area  Location & Tracking (via the tagged objects)  Easy surveillance  No transparency  Lack of user control E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

Industry? E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

You don’t need this!! E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

What should industry do?  Collect the data for a specified purpose  Use only the absolutely necessary data  Keep the data accurate and up to date  Delete the data when they are not needed any more  Information to the consumer  About their rights  About the tags  About the readers E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

Information Like ‘speed camera signs’… E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

…we could have signs like E. Kosta: “RFID Technology: When innovation brings along data protection challenges” RFID READER Information

Applicability of the ePrivacy directive ? Publicly available electronic communications services ? Public communications network FIDIS Project: E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

Solutions  De-activation mechanisms: Kill command OR enable/disable mechanism  Standardisation initiatives for the minimisation of the collection and use of c  Passwords in tags  Encryption  Shielding of tags E. Kosta: “RFID Technology: When innovation brings along data protection challenges”

Name: Surname: Company: Phone: Eleni Kosta ICRI – K.U.Leuven