Use of RFID Raises Privacy Concerns
'Smart' tags could profile consumers, critics contend
Computerworld - Privacy concerns related to the use of radio frequency identification (RFID) technology got an airing at a recent California state legislative hearing.
RFID is a nascent technology that's expected to eventually replace bar codes. It uses low-powered radio transmitters to read data stored in tags that are embedded with tiny chips and antennas.
Proponents of the technology say such "smart" tags can store more detailed information than conventional bar codes, enabling retailers and manufacturers to track items at the unit level.
But privacy advocates who testified at the California hearing late last month said the technology has the potential to seriously infringe on personal privacy.
"If ever there was a technology calling for public-policy assessment, it is RFID," said Beth Givens, director of the Privacy Rights Clearinghouse, an advocacy organization in San Diego. "RFID is essentially invisible and can result in both profiling and locational tracking of consumers without their knowledge or consent."
Placing RFID tags on consumer products will allow merchants to capture personal information about shoppers, Givens said.
For example, the information contained on RFID tags could be picked up by readers in a store to reveal where a consumer purchased an item or how much he paid for it. This could result in unacceptable profiling of consumers, she said.
The unique information contained in each RFID tag could also be captured by various readers and used to track a person's movements through tollbooths, public transportation and airports, Givens said.
"So far, the development and implementation of RFID has been done in a public-policy void. What is needed is a formal technology assessment process to be done by some sort of a nonpartisan body comprised of all stakeholders, including consumers," she said.
That sentiment was echoed by Liz McIntyre, a spokeswoman for Consumers Against Supermarket Privacy Invasion and Numbering, a consumer advocacy group that also testified at the hearing.
"Without some sort of oversight, this technology could create a very frightening society," McIntyre said.
"RFID per se is not the big issue," said Greg Pottie, an engineer at the Center for Embedded Network Sensing at the University of California at Los Angeles. "The major questions relate to sharing of digital information, however that information is collected."
A representative from AIM Inc., The Association for Automatic Identification and Data Capture Technologies, a Pittsburgh-based proponent of the use of RFID technology, also testified at the hearing but didn't return calls seeking comment. However, the organization has created a workgroup that's focused on addressing privacy concerns relating to RFID.
According to the organization's Web site, it believes that "RFID presents no more of a threat to individual privacy than the use of cell phones, toll tags, credit cards, the use of ATM machines and access-control badges."
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Privacy White Papers | Webcasts