Feeds

EC should extend privacy regs to RFID, says bar code chief

Tags are a very private matter

Top three mobile application threats

The organization which runs the bar code systems has backed the extension of EU privacy rules to cover RFID technologies.

EC commissioner Viviane Reding earlier this month launched a consultation on RFID, saying that while there was a level of hysteria over the technology’s perceived threat to privacy she was prepared to extend EC privacy legislation to cover the technology.

Jim Bracken, chief executive of GS1 Ireland, said RFID and its associated technologies should indeed be brought under the existing privacy regime. GS1 has administered the bar code system for 30 years and also oversees the electronic product code standards which will underpin the expected explosive growth of RFID.

Bracken said some high value retail items are already being tracked on an item level basis, and this is likely to be extended down to many low cost items as the cost of tags drops in the coming years.

But Bracken said that the organization's existing policy already called on retailers to post signs informing customers that items are tagged, and to give customers the right to have tags switched off or destroyed at the checkout. At the same time, he said, customers may find it advantageous to keep tags active, eg, for returns/warranty purposes, and it is entirely possible to have tags switched off, then reactivated if customers wanted it.

He acknowledged that GS1 had no power to force companies to adhere to its own advice.

But, he said, "We'd support it if the EU made it statutory."

Item level tracking is the nightmare scenario for privacy advocates already tossing and turning over the rise of RFID, with the most paranoid claiming Walmart and the like will be able to track your toiletries right to your home - and beyond.

Bracken said that RFID tags will themselves carry just a bundle of product and tracking codes identifying the particular product, where it's been, where it's going, when it was made, etc.

Everything that rattles privacy geeks - such as tracking shopping patterns and profiling customers - just needs tweaks to allow the RFID data to be fed into databases so it can be data mined by vendors. Just like they already do with store loyalty cards, targeted marketing, etc, which should be covered by existing data protection regulations.

Bracken’s comments came as IBM opened an RFID Centre of Excellence at its campus in Dublin. Colm Shorten, CTO of the Dublin RFID site, said that the company had to reassure its potential corporate customers about the privacy implications of the technology as much as potential consumers. It has to set some of them straight on the limits of RFID tracking while outlining what is and isn't acceptable practice.

The Dublin site will focus on asset tracking technologies, and has already developed a system for tagging laptops, which can then be tracked automatically by RFID-enabled portals at “choke points”, ie, the exit doors. The firm has already run a pilot of the technology, and plans to extend it to around 500 laptops operating across seven buildings on the campus and in Dublin city.

The company did not say exactly what effect the program has had on "delinquent" laptops – presumably those machines that go walkies. Let's face it, if you can't trust the man in the blue suit, who can you trust.®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.