N.D. bans forced RFID chipping
Governor wants a balance between technology, privacy
Computerworld - As expected, North Dakota has become the second state in the U.S. to ban the forced implanting of radio frequency identification (RFID) chips in people.
The two-sentence bill, passed by the state legislature, was signed into law by Gov. John Hoeven last Wednesday. Essentially, it forbids anyone from compelling someone else to have an RFID chip injected into their skin. The state follows in the steps of Wisconsin, which passed similar legislation last year.
"We need to strike a balance as we continue to develop this technology between what it can do and our civil liberties, our right to privacy," Hoeven said in an interview. He emphasized that the law doesn't prohibit voluntary chipping. Military personnel who want an RFID chip injected so they can be more easily tracked will still be allowed to get a chip. There are also potential uses for the technology in corrections or in monitoring animals, he noted.
Marlin Schneider, the state legislator who sponsored the Wisconsin law, said he is glad to see an antichipping legislation trend. However, such statutes don't go far enough to curb the ability of private sector retailers and manufacturers to "implant these things into everything we buy."
Ultimately, with RFID tagging systems, corporations "will be able to monitor everything we buy, everywhere we go and, perhaps as these technologies develop, everything we say."
But Michael Shamos, a professor who specializes in security issues at Carnegie Mellon University in Pittsburgh, believes the law is too vague to do much good. For instance, it only addresses situations where a chip is injected, even though RFID tags can also be swallowed. And it doesn't clearly define what a forced implant really is; someone could make chipping a requirement for a financial reward.
"Suppose I offer to pay you $10,000 if you have an RFID [chip] implanted?" he asked. "Is that 'requiring' if it's totally voluntary on your part?"
The idea behind the law isn't bad, but "it looks hastily drawn and will have unpredictable consequences," said Shamos.
Read more about Mobile Apps in Computerworld's Mobile Apps Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Three Best Practices to Help Government Agencies Overcome BYOD Challenges This paper highlightschallenges facing government IT in a BYOD environment and discusses strategies for network preparation, ongoing support, and securing information to enable...
- 3 Steps to Content Sharing and Collaboration ft. Forrester Research Consumer sync and share tools help people access and send personal files, but smart IT leaders know that businesses require more than just...
- Empowering Your Mobile Workers A modern mobile IT strategy is no longer an option, it is an absolute necessity. Here's how some of the nation's most progressive...
- Omnichannel: From Buzzword to Strategy Customers demand a seamless experience across channels, especially mobile. Read this whitepaper for a research-based framework for using omnichannel for higher customer engagement.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more