Use of RFID Raises Privacy Concerns
'Smart' tags could profile consumers, critics contend
Computerworld - Privacy concerns related to the use of radio frequency identification (RFID) technology got an airing at a recent California state legislative hearing.
RFID is a nascent technology that's expected to eventually replace bar codes. It uses low-powered radio transmitters to read data stored in tags that are embedded with tiny chips and antennas.
Proponents of the technology say such "smart" tags can store more detailed information than conventional bar codes, enabling retailers and manufacturers to track items at the unit level.
But privacy advocates who testified at the California hearing late last month said the technology has the potential to seriously infringe on personal privacy.
"If ever there was a technology calling for public-policy assessment, it is RFID," said Beth Givens, director of the Privacy Rights Clearinghouse, an advocacy organization in San Diego. "RFID is essentially invisible and can result in both profiling and locational tracking of consumers without their knowledge or consent."
Placing RFID tags on consumer products will allow merchants to capture personal information about shoppers, Givens said.
For example, the information contained on RFID tags could be picked up by readers in a store to reveal where a consumer purchased an item or how much he paid for it. This could result in unacceptable profiling of consumers, she said.
The unique information contained in each RFID tag could also be captured by various readers and used to track a person's movements through tollbooths, public transportation and airports, Givens said.
"So far, the development and implementation of RFID has been done in a public-policy void. What is needed is a formal technology assessment process to be done by some sort of a nonpartisan body comprised of all stakeholders, including consumers," she said.
That sentiment was echoed by Liz McIntyre, a spokeswoman for Consumers Against Supermarket Privacy Invasion and Numbering, a consumer advocacy group that also testified at the hearing.
"Without some sort of oversight, this technology could create a very frightening society," McIntyre said.
"RFID per se is not the big issue," said Greg Pottie, an engineer at the Center for Embedded Network Sensing at the University of California at Los Angeles. "The major questions relate to sharing of digital information, however that information is collected."
A representative from AIM Inc., The Association for Automatic Identification and Data Capture Technologies, a Pittsburgh-based proponent of the use of RFID technology, also testified at the hearing but didn't return calls seeking comment. However, the organization has created a workgroup that's focused on addressing privacy concerns relating to RFID.
According to the organization's Web site, it believes that "RFID presents no more of a threat to individual privacy than the use of cell phones, toll tags, credit cards, the use of ATM machines and access-control badges."
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!