Professional Documents
Culture Documents
privacy considerations for several reasons. For that may be considered. While today RFID readers
example, RFID technology increases the likelihood are usually located in designated locations support a
that someone PII can create through indirect means. particular business in the future readers ubiquitous
RFID technology creates opportunities to contact, and can use multiple are objectives. For example,
store, and process specific information item with today could be an RFID system implemented to
regard to business transactions easier than ever access to a facility with RFID-enabled badges. Badge
before. In Moreover, the width of the items in the holders are likely to possess other tagged items. In
daily life, which will be built-in RFID systems, is the future, cardholders can routinely carry a number
expected to increase in the coming years. The of tagged items, and the badge reader can be used to
increase in the range of the information systems in scan them and a profile and authenticate the badge.
our daily life, combined with the increase of the level The collected data to third parties parties to
of detail of the information in these systems is likely legitimate business needs and the legitimate data
new opportunities for combining of data elements to sharing agreements. The systems can be carried out
generate PII. Advances in Internet search and data with disclosure and consent, but may not be effective
mining software will also have the ability to capture because individuals and organizations can not
from PII facilitate large amounts of what might have reasonably understand all the potential uses of the
been previously considered to be non-correlated data. data or predict what type transactions can create PII
All these trends may occur PII even if not listed on through indirect inference. For these reasons, new
labels themselves. To maintain different inherent privacy tools and concepts to be developed to address
properties of RFID tags privacy controls more the complexity in RFID technology.
difficult than traditional information IT systems.
Organizations can challenges guaranteed privacy CONCLUSION: RFID technology is emerging as a
policies when they can not be linked to effective technology that could provide the answer to the
safeguards. RFID uses wireless communication, problems in automated data cpture and monitored in
which is more vulnerable to eavesdropping attacks real time.Thus by using radio waves to communicate
and other than the wired systems which most between the two RFID combined with the EPC
traditional IT systems are. In many applications, (Electronic Product Code ) is able to address these
RFID Tags will travel between organizations and pain points and would provide a range of benefits in
often found in public areas, which means that they various vertical markets such as manufacturing,
can not benefit from physical security often the most distribution, retail, logistics and security. The
traditional IT systems. In general, RFID resources are potential benefits arise from the increase of the
limited and can not implement advanced technical supply chain, increase efficiency and reduce costs
controls. Since this document describes many through better synchronization of data, increasing the
techniques exist to mitigate these security and sensitivity to changes due to real time information
privacy risks, and these are expected to improve over visibility and some additional industry / vertical
time. However, the economy many RFID specific advantages.
applications will require low-cost tags with limited
functionality, which has important implications for REFERENCES: 1.RFID Handbook: Fundamentals
privacy protection. Finally, in many applications, in and Applications in Contactless Smart Cards and
particular those involving passive tags, may Identification by Klaus Finkenzeller.
identifiers beyond life usefulness of the application
for which they are intended, but still may store PII or 2.The RF in RFID: Passive UHF RFID in Practice by
used to generate PII when combined with other data. Daniel M. Dobkin.
While traditional IT systems established policies and
3.Development and Implementation of RFID
procedures for maintaining and destruction of data,
Technology by Cristina Turcu.
can destroy or disable markers are achievable when
they are outside the control of the manages the RFID BIBLOGRAPHY:
system. RFID technology can introduce new privacy
for reasons not fully understood today. Privacy S. Harish
regulations and principles evolve to meet the
requirements of the new IT systems. As technical Born in 1991 in Guntur dist. currently pursuing
progress as Internet, electronic databases and
B.Tech final year in K.L.UNIVERSITY. His areas of
analytical system have the collection and exchange of
PII easier than it was made in a world of paper files. interest are wireless communication and digital
RFID technology extends the reach of IT systems and electronics.
the collection and exchange of personal information
Email: sadhuharish09@gmail.com