Page 195 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 195

Unit 13: Privacy Technological Impacts




          parties information regarding objects carried by individuals without their information. It might  Notes
          permit inferences allowing links to more information on  the individual  and more accurate
          profiling.

                 Example: Inferences completed from numerous tags carried by an individual or from
          sensitive data, like biometrics in an unsecured RFID passport, or from tagged medicines.
          Such a scenario would need the occurrence of readers in the tags’ environment in addition to the
          capacity for the third party to convert the objects’ tag information into meaningful data. Likewise,
          tracking in real time or after the fact may be the major functionality of RFID that raises issues.
          Particularly, due to the invisibility of the technology, tracking of individuals could take place
          without their knowledge, if they are provided with hidden tags or tags that are not sufficiently
          secured. In other cases, tracking people could also be the purpose of the RFID application (e.g.
          tracking children in an amusement park). Another apprehension is that interoperable (“open
          loop”) RFID technologies make possible and as a result multiply the collection and processing
          of personal  information. Invasive RFID taking benefit of  interoperability and ever-present
          Internet connectivity is often described as a predictable future, although there are currently few
          instances of open loop systems. In cases where RFID systems collect data which is connected
          with an  identified  or  identifiable individual,  the OECD  Privacy  Guidelines  offer a  useful
          framework. When an RFID system processes personal data, transparency of the function of the
          processing and  consent of individuals  are  necessary. Beyond  fundamental data  protection
          information, privacy observe may usefully comprise additional information like:
          1.   The existence of the tags,

          2.   Their content, use and control,
          3.    The presence of readers,
          4.   The reading activity,
          5.   The ability to disable tags, and

          6.   Where to obtain assistance.
          Innovative  means of  informing individuals competently  could  be  discovered. Continued
          stakeholder dialogue among stakeholders, across sectors and in each of the particular application
          areas, would help elucidate or reach a consensus on what information to offer to individuals, the
          best means to converse it to attain efficient transparency, in addition to the cases where consent
          should be or not be needed. Naturally, security safeguards are necessary for  the defense of
          privacy in RFID systems.

          The broad variety of technical configurations and use scenarios make privacy impact assessments
          a good practice for identifying and accepting privacy risks and best approaches to mitigate them
          in a specified system. As for protection, since RFID systems are often components of broader
          information systems, it cannot be predictable that all privacy challenges can be solved at the
          RFID level. A holistic method to privacy management may be tinted as a good practice. Such an
          approach would regard all the components of the information systems implicated, besides the
          core RFID components in  addition to the whole life cycle of the tag when it remains useful
          beyond the reach of the data controller. The option of the RFID technology to be used in a system
          influences the defense of privacy just as it impacts the security of the system. Privacy by design
          or embedding privacy in the design of the technology and of the systems can considerably help
          the protection of privacy and promote trust in RFID systems. Strategies to offer incentives to
          industry and business for scheming and using RFID technologies that comprise sufficient privacy
          protections could be pursued. Yet, as for security, privacy protection should not solely depend
          on technical dimensions but instead on a mix of technical and non-technical safeguards. Some




                                           LOVELY PROFESSIONAL UNIVERSITY                                   189
   190   191   192   193   194   195   196   197   198   199   200