RFID ( Electronic Tags ) Legal problems in Japan Takato Natsui Professor, Meiji University, Japan Practicing Lawyer (Asuka Kyowa Law Firm, Tokyo) Copyright.

Slides:



Advertisements
Similar presentations
H OGAN & H ARTSON, L.L.P.
Advertisements

European Standards for (RF)ID-Systems Helmut Wolf Phone: +49 (0) 6131 – ETSI Workshop on RFID and The Internet.
By Yuenyee Leung Section 6 Schools use an RFID chip to track the location of students. RFID is basically a wireless radio and electromagnetic identifying.
Hart District Acceptable Use Policy Acceptable Use Policy.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Boyertown Area School District Acceptable Use Policy.
1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
Jan. 28, 2004UCB Sensor Nets Day1 TOWARD A LEGAL FRAMEWORK FOR SENSOR NETWORKS Pamela Samuelson, Law/SIMS UCB Sensor Nets Day January 28, 2004.
Agenda Scope of Requirement Security Requirements
1. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Copyright (C) 2002 Takato Natsui.1 Omissions by ISPs are unlawful or not? A Comparative analysis to legal standards for Criminal Liability Takato Natsui.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
Privacy and Security Risks in Higher Education
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Anonymity, Security, Privacy and Civil Liberties
Electronic Use Policies.   Social Media  Internet.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Florida Information Protection Act of 2014 (FIPA).
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Woodland Hills School District Computer Network Acceptable Use Policy.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
CREDIT CARD PAYMENT SYSTEM System involves Several major participants Purchaser that is cardholder Card Issuer that issues credit card Merchant that makes.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
The Acceptable Use of Technology
Privacy and the Law.
Florida Information Protection Act of 2014 (FIPA)
Florida Information Protection Act of 2014 (FIPA)
Cyber Issues Facing Medical Practice Managers
Impact of new technologies on regulation
Essentials of the legal environment today, 5e
Technological, Legal, and Ethical Considerations
Confidentiality Agreement
2002 International Conference on Personal Data Protection
Woodland Hills School District
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

RFID ( Electronic Tags ) Legal problems in Japan Takato Natsui Professor, Meiji University, Japan Practicing Lawyer (Asuka Kyowa Law Firm, Tokyo) Copyright © 2003 Takato Natsui, All rights reserved.

2 Realty RFID systems have been introduced into and used in real society of JapanRFID systems have been introduced into and used in real society of Japan –Example Suica Card of JRSuica Card of JR Edy Card of ANAEdy Card of ANA Hitachi developed μ ‐ chipHitachi developed μ ‐ chip

3 JR Suica Card

4 ANA Mileage Points Card

5 Hitachi - μ ‐ chip 0.3 mm IC chip

6 Legal Problems Violations of privacy rightsViolations of privacy rights SecuritySecurity Other ProblemsOther Problems –Disclosure and violation of confidential corporate information (Trade Secrets) –Electromagnetic interference and allocation of the electromagnetic spectrum –Code standards –Environmental issues –Harm to human health –Products liability

7 Mechanism of Privacy Violation The issue of privacy with respect to RFID is not one that arises from RFID, and is no more than an existing issue that has been expanded and made more apparent by RFID.The issue of privacy with respect to RFID is not one that arises from RFID, and is no more than an existing issue that has been expanded and made more apparent by RFID. Tracking in some sense is possible in any environment in which some “ object ” with tracking ID functions using a wireless or cable network can match data with individual identifications.Tracking in some sense is possible in any environment in which some “ object ” with tracking ID functions using a wireless or cable network can match data with individual identifications.

8 Human Identification Device Identification Privacy Violation +

9 Japanese Laws to be addressed to RFID problems Unauthorized Computer Access LawUnauthorized Computer Access Law –Not Applicable –Requires “ access via telecommunication line ” Personal Privacy Information LawPersonal Privacy Information Law –Applicable to only limited cases –Requires “ an entity handling personal information who has gathered a certain volume of such data ” Penal CodePenal Code –Applicable to only limited cases –Requires “ Physical Payment Card ” Wireless Communication LawWireless Communication Law –Not Applicable –Now drafting for amendment of the Law

10 My recommendation to protect Privacy right Current Japanese Laws shall be amended quicklyCurrent Japanese Laws shall be amended quickly Good Policy shall be establishedGood Policy shall be established –A policy should be adopted that when personal information is collected using RFID or RFID and data matching, clear notice or notification that personal information is being gathered using RFID must be provided. –Stealth application of RFID should be prohibited