RFID and privacy - Some industry perspectives (ICC, EICTA)

Size: px
Start display at page:

Download "RFID and privacy - Some industry perspectives (ICC, EICTA)"

Transcription

1 RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris

2 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services. Identify and track GOODS. ICC, EICTA Jeroen Terstegge OECD, Paris

3 RFID and Identity RFID has 3 identity types ID linked to Person: direct identification: personal data on chip (biometrics) personal data in database (employee badge) ID linked to Service: In combination with person ID (banking, season cards) Anonymous (one time public transportation paper tickets) ID linked to Object / Product: product information in database (retail products, library books) direct identification (car keys) Combining Object/Product ID with Individual is additional step, covered by existing privacy principles 3

4 Ubiquitous Computing and Electronic Footprints Several technologies involved in leaving footprints Offline and online footprints But ubiquitous computing will increase number of footprints Concerns for the Individual Is my footprint accurate? Does it reflect me? personalization of services, convenience discrimination, social sorting Where are my footprints? And why are they there? OECD Privacy Principles: transparency, purpose Do I have some control over my footprints? Relationship (citizen, employee, consumer), degree of freedom/privacy Notice and choice, access to data Some trade-off between Accuracy and Control Key question: Can we enhance accuracy while maintaining control? 4

5 Privacy-enhancing solutions for RFID (PETs) System-solutions Encryption Tag/Reader Authentication Range reduction Antenna size/design? Consumer-in-Control Solutions Kill-switch Removable tags Blocker tags Shielding User interface (NFC-device).? 4

6 Determining Privacy Risk { Identification (people): low, medium, high { Linkability (information): low, medium, high Observerability: low, medium, high PRIVACY RISK = low, medium, high When Privacy Risk is: High: Medium: Low: use smart cards + PETs use smart cards, smart tag + PETs use smart tag (PETs optional) 5

7 Ways of protecting privacy Privacy by Design (technological) examples: encryption, kill command, read range main actors: technology providers, standardization bodies influencing factors: cost, usability public policy: R&D-funding, Launching customer Privacy by Design (organizational) examples: anonymization, system design, business model main actors: system integrators, end-users (business) influencing factors: business opportunities, customer trust public policy: privacy principles, guidelines, best-practices Rule-based protection examples: self-regulation, law main actors: government, business, stakeholders influencing factors: administrative burdens (cost), market development public policy: compliance verification ( Trust but Verify ) 6

8 Ways of protecting privacy Privacy by Design (technological) examples: encryption, kill command, read range main actors: technology providers, standardization bodies influencing factors: cost, usability public policy: R&D-funding, Launching customer Privacy by Design (organizational) examples: anonymization, system design, business model main actors: system integrators, end-users (business) influencing factors: business opportunities, customer trust public policy: privacy principles, guidelines, best-practices Rule-based protection examples: self-regulation, law main actors: government, business, stakeholders influencing factors: administrative burdens (cost), market development public policy: compliance verification ( Trust but Verify ) 7

9 Contactless Smart Cards and Privacy Data security Personal data (may be) stored in chip s memory Password protection Mutual authentication chip and reader Advanced encryption (3DES, AES, PKI) Extremely short operating range: < 10 cm Advanced system design and sensor technology to prevent tempering Multi-application smart cards Several applications on a single card Exclusivity Clear separation of applications and data (as if different cards were used) Back office and system design Full application of current privacy and data protection laws 8

10 RFID/EPC tags and privacy ICC Principles of Fair RFID/EPC use RFID-use should be legal, honest, decent No personal data stored in RFID-tag Consumer information and choice Labeling How to remove / disable tags Privacy statement including RFID/EPC use What data is collected via RFID Purposes of collection/use Data disclosures (if any) Data security Individual s right of access to data in RFID-enabled IT-system 9

11 Recommendations Do not legislate RFID-technology, but only its applications and use Address privacy risks of the entire system Current OECD Privacy Principles already apply to system design, applications and data collection and management Use Privacy-Enhancing Technologies only where relevant Stimulate R&D, standardization and use/acceptance of PETs RFID is the enabling technology! 10

Presentation Outline

Presentation Outline Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity

More information

RFID and Privacy an antagonism?

RFID and Privacy an antagonism? BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INORMATION, GERMANY RFID and Privacy an antagonism? Dr. Alexander Dix, LL.M. and Freedom of Information Member of the Art.29 Working Party Statement

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

Preface to the Third Edition. List of Abbreviations

Preface to the Third Edition. List of Abbreviations Contents Preface to the Third Edition List of Abbreviations 1 Introduction 1 1.1 Automatic Identification Systems 2 1.1.1 Barcode Systems 2 1.1.2 Optical Character Recognition 3 1.1.3 Biometric Procedures

More information

Privacy by Design: Integrating Technology into Global Privacy Practices

Privacy by Design: Integrating Technology into Global Privacy Practices Privacy by Design: Integrating Technology into Global Privacy Practices Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Harvard Privacy Symposium August 23, 2007 Role of the IPC

More information

ST25TA product presentation. June 2018

ST25TA product presentation. June 2018 ST25TA product presentation June 2018 ST25TA Product 2 The ST25TA chip belongs to ST25 NFC / RFID Tags & Readers family. The ST25TA product is HF Tag based on ISO14443 & NFC forum standards with following

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector 8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,

More information

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to

More information

IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE

IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE Smart Card Alliance 2005 Fall Annual Conference Presented by Mike Butler Director of Smart Card Programs and Operations Defense Manpower Data Center

More information

Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID

Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications

More information

RFID, user identity and the public interest

RFID, user identity and the public interest RFID, user identity and the public interest lara srivastava senior policy analyst international telecommunication union ANEC General Assembly 1 June 2007, Brussels note: the views expressed in this presentation

More information

Victor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA

Victor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA Victor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA Involved in RFID for 17 years. Responsibilities have ranged from design engineer to marketing director. Prior employment engagements

More information

RFID HANDBOOK THIRD EDITION

RFID HANDBOOK THIRD EDITION RFID HANDBOOK THIRD EDITION RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION Klaus Finkenzeller Giesecke

More information

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer

More information

Identity Management and its impact on the Digital Economy

Identity Management and its impact on the Digital Economy Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...

More information

Practical Experiences with NFC Security on mobile Phones

Practical Experiences with NFC Security on mobile Phones Practical Experiences with NFC Security on mobile Phones Gauthier Van Damme Karel Wouters Katholieke Universiteit Leuven ESAT/SCD/IBBT-COSIC Workshop on RFID Security, 2009 ESAT/SCD/IBBT-COSIC (KUL) Practical

More information

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering

More information

ST25DV-PWM product presentation. July 2018

ST25DV-PWM product presentation. July 2018 ST25DV-PWM product presentation July 2018 Main ST25DV-PWM Market Segments 2 Smart Industry Smart City Industrial Lighting, Motor control Street Lighting,, building Lighting (offices, museums ) ST25DV-PWM

More information

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012 Dermalog Gate The next generation gate Made in Germany. v_1.0_171012 Contents 03 Welcome to the World of DERMALOG. 02 Welcome to the world of DERMALOG The Biometrics Innovation Leader. As a pioneer in

More information

Contents and Preface of the RFID-Handbook

Contents and Preface of the RFID-Handbook Contents and Preface of the RFID-Handbook RFID-Handbook, Wiley & Sons LTD 1999 Radio-Frequency Identification: Fundamentals and Applications Klaus Finkenzeller, Munich, Germany ISBN 0-471-98851-0 Contents

More information

Northfleet Technology College Course Outline: Information Technology in a Global Society

Northfleet Technology College Course Outline: Information Technology in a Global Society Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers

More information

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

Boeing NFC Project Team #43 Shao-Chi Ou Yang James Kim Neil Misak

Boeing NFC Project Team #43 Shao-Chi Ou Yang James Kim Neil Misak Boeing NFC Project Team #43 Shao-Chi Ou Yang James Kim Neil Misak ECE 445-Senior Design Spring 2013 Neil Misak James Kim Shao-Chi Ou Yang Team Members Collaboration with Our 6 team members visited Boeing's

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

The 4A Vision: Anytime, anywhere, by anyone and anything

The 4A Vision: Anytime, anywhere, by anyone and anything The 4A Vision: Anytime, anywhere, by anyone and anything Dr Tim Kelly Head, Strategy & Policy Unit, ITU and Visiting Scholar, HKUST Business School ITAHK Luncheon, 8 December 2005 2 The 4A vision: Agenda

More information

Lothar Fritsch Norwegian Computing Center, Oslo

Lothar Fritsch Norwegian Computing Center, Oslo Investing in Privacy Protection with Privacy-Enhancing Technology Nova Gorica, Slovenia, 11. 6. 2008 Lothar Fritsch Norwegian Computing Center, Oslo INFOSEK Vaš 2008 partner FORUM za varovanje Conference

More information

RFID Integrated Teacher Monitoring

RFID Integrated Teacher Monitoring RFID Integrated Teacher Monitoring Introduction Article by Adewopo Adeniyi M.Sc, Texila American University, Nigeria Email: preciousadewopon@yahoo.com Radio Frequency Identification (RFID) is a generic

More information

RFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott

RFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott RFID Presented by BESSER ASSOCIATES Instructor: Al Scott 1 COURSE OUTLINE Uses of RFID Basic RFID System ISM Frequency Bands Walmart Directive EPC RFID System How RF part of EPC System Works RF antennas

More information

Laser Surface Authentication TM : biometrics for documents and goods

Laser Surface Authentication TM : biometrics for documents and goods Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

GOVERNMENT RESOLUTION ON THE OBJECTIVES OF THE NATIONAL INFORMATION SOCIETY POLICY FOR

GOVERNMENT RESOLUTION ON THE OBJECTIVES OF THE NATIONAL INFORMATION SOCIETY POLICY FOR GOVERNMENT RESOLUTION ON THE OBJECTIVES OF THE NATIONAL INFORMATION SOCIETY POLICY FOR 2007-2011 2 1. Introduction Information and communications technology (ICT) plays an ever greater role in everyday

More information

Policy implications 15h00 16h15

Policy implications 15h00 16h15 COMPLETE RFID Workshop Brussels 2009-10-28 1 COMPLETE Workshop Brussels, October 29, 2009 RFID: Economic Impact & Europe's Competitive Position The Cases of Item Level Tagging and Public Transportation

More information

Digitale Ausweise für physische Identifikation?

Digitale Ausweise für physische Identifikation? Digitale Ausweise für physische Identifikation? Univ.-Prof. Dr. René Mayrhofer und Michael Hölzl, MSc Institut für Netzwerke und Sicherheit, Johannes Kepler Universität Linz Vortrag zur IKT-Sicherheitskonferenz

More information

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam. Student Quick Guide Accessing Examity You can easily access Examity through Canvas. First, login to your course in Canvas, then click on the Examity link. This will bring you to your Examity dashboard.

More information

Extending the range of NFC capable devices

Extending the range of NFC capable devices February 6, 2017 Source: The Guardian Source: Betaalvereniging Nederland NFC NFC is a subtype of RFID NFC High frequency 13.56 MHz Reader & tags Active & Passive devices Source: NPO Inductance Electromagnetic

More information

Privacy by Design: essential for organizational accountability and strong business practices

Privacy by Design: essential for organizational accountability and strong business practices IDIS (2010) 3:405 413 DOI 10.1007/s12394-010-0053-z Privacy by Design: essential for organizational accountability and strong business practices Ann Cavoukian & Scott Taylor & Martin E. Abrams Received:

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party Brussels, 10 April 2017 Hans Graux Project editor of the draft Code of Conduct on privacy for mobile health applications By e-mail: hans.graux@timelex.eu Dear Mr

More information

Student Integrated Quick Guide

Student Integrated Quick Guide Student Integrated Quick Guide Accessing Examity You can easily access Examity through D2L. First, select the name of your course. Next, click on the Examity link within UA Tools. This will bring you to

More information

The future of IoT: Expert Survey results

The future of IoT: Expert Survey results The future of IoT: Expert Survey results The following paragraphs summarise the main findings of the foresight study on the future of the Internet of Things (IoT) and Ambient Intelligence (AmI). The study

More information

Definition of RF-ID. Lecture on RF-IDs

Definition of RF-ID. Lecture on RF-IDs Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator

More information

V I S O c o r e I n s p e c t

V I S O c o r e I n s p e c t V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification

More information

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy

More information

Information and Communications Technology and Environmental Regulation: Critical Perspectives

Information and Communications Technology and Environmental Regulation: Critical Perspectives Image: European Space Agency Information and Communications Technology and Environmental Regulation: Critical Perspectives Rónán Kennedy School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie

More information

Personal. Identity. Information

Personal. Identity. Information Personal Identity Information What is it? Work Membership Student Citizen Identity Healthcare On-line Financial Military What Is Identity Information? Definition: Identity information is an assortment

More information

SUSTAINABILITY MATERIALITY OVERVIEW

SUSTAINABILITY MATERIALITY OVERVIEW SUSTAINABILITY MATERIALITY OVERVIEW EMC undertakes materiality assessments to identify and prioritize sustainability factors for the purposes of deciding where to focus our resources, setting goals, and

More information

A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions

A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions Maria Karyda 1, Stefanos Gritzalis 1, and Jong Hyuk Park 2 1 Dept. of Information & Communication Systems

More information

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam. Student Quick Guide Accessing Examity You can easily access Examity through Brightspace/D2L. First, select the name of your course. Next, click on the Examity link within Content. This will bring you to

More information

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense

More information

ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0

ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0 ORCA-50 UHF Demo Manual V1.0 ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0 Eximia Srl. www.eximia.it - www.rfidstore.it mario.difloriano@eximia.it 1 Eximia Srl www.eximia.it - www.rfidstore.it Catelogue

More information

Smart Cards in the Public Sector

Smart Cards in the Public Sector Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart

More information

Decentralisation, i.e. Internet for Social Good

Decentralisation, i.e. Internet for Social Good Decentralisation, i.e. Internet for Social Good Fabrizio Sestini DG CONNECT E3 (Next-Generation Internet) http://ec.europa.eu/digital-single-market/en/collectiveawareness * The personal views expressed

More information

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA August 5, 2016 ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA The Information Technology Association of Canada (ITAC) appreciates the opportunity to participate in the Office of the Privacy Commissioner

More information

What I want to do tonight is to share some of the emerging issues thrown up by our work at the National Consumer Council (NCC) on identity.

What I want to do tonight is to share some of the emerging issues thrown up by our work at the National Consumer Council (NCC) on identity. The Age of Identity Ed Mayo National Consumer Council James Baldwin, the author, wrote that identity is the garment with which one covers the nakedness of the self: in which case, it is best that the garment

More information

MPR kHz Reader

MPR kHz Reader MPR-5005 Page 1 Doc# 041326 MPR-5005 125kHz Reader Installation & Operation Manual - 041326 MPR-5005 Page 2 Doc# 041326 COPYRIGHT ACKNOWLEDGEMENTS The contents of this document are the property of Applied

More information

Canada s Digital ID Future - A Federated Approach

Canada s Digital ID Future - A Federated Approach Canada s Digital ID Future - A Federated Approach Spring 2018 Digital ID Digital ID is the challenge of answering Who are you? with a high degree of certainty, without resorting to face-to-face interaction

More information

ID4Africa 2018 E-voting: An analysis of scenarios and preconditions of success

ID4Africa 2018 E-voting: An analysis of scenarios and preconditions of success ID4Africa 2018 E-voting: An analysis of scenarios and preconditions of success Nicolas Jaouen Business Development Manager Government ID April 25, 2018 Agenda 1 2 3 4 5 6 7 Infineon presentation Definition

More information

PRINTED ELECTRONICS 3

PRINTED ELECTRONICS 3 PRINTED ELECTRONICS 3 4 INKTEC PRINTED ELECTRONICS 5 6 INKTEC PRINTED ELECTRONICS 7 InkTec Leads New Paradigm in Printed Electronic Materials Applications OTFT, Memory Cell, Display, RFID and so on Product

More information

Location Privacy by Design - Technology & Business Incentives

Location Privacy by Design - Technology & Business Incentives Location Privacy by Design - Technology & Business Incentives Dr. Lothar Fritsch Norsk Regnesentral Norwegian Computing Center Oslo Internetdargana, Stockholm, 26-27.10.2010 Contents Location Privacy Concepts

More information

Success factor technology

Success factor technology Success factor technology Career opportunities for women at NXP www.nxp.com/jobs Careers without barriers NXP Semiconductors is driving innovation in a globalized environment in cooperation with different

More information

NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags

NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags previously known as Kovio NFC Barcode Functional Specification Product Features Passive 13.56MHz 128- or 256-bit Read-Only Memory (ROM) 106 Kb/s Data

More information

OECD WORK ON ARTIFICIAL INTELLIGENCE

OECD WORK ON ARTIFICIAL INTELLIGENCE OECD Global Parliamentary Network October 10, 2018 OECD WORK ON ARTIFICIAL INTELLIGENCE Karine Perset, Nobu Nishigata, Directorate for Science, Technology and Innovation ai@oecd.org http://oe.cd/ai OECD

More information

Student Quick Guide. Accessing your Examity Dashboard

Student Quick Guide. Accessing your Examity Dashboard Student Quick Guide Accessing your Examity Dashboard Access your Examity dashboard at https://prod.examity.com/otis by logging in with credentials provided. This will bring you to your Examity dashboard.

More information

1040 DPI High Resolution Full-page epassport Reader Regula 8703

1040 DPI High Resolution Full-page epassport Reader Regula 8703 1040 DPI High Resolution Full-page epassport Reader Regula 8703 The world`s first mobile true high resolution full-page epassport reader featuring 1040 DPI resolution. Automatic reading and authenticity

More information

Working Party on Security and Privacy in the Digital Economy

Working Party on Security and Privacy in the Digital Economy Unclassified DSTI/ICCP/REG(2015)12 DSTI/ICCP/REG(2015)12 Unclassified Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 06-Nov-2015 English

More information

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount SPECIFICATION Part No. : FXR.06.A.dg Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount Features : 13.56 MHz RFID / NFC Antenna Can be placed directly

More information

Success factor technology

Success factor technology Success factor technology Career opportunities for women at NXP www.nxp.com/jobs Careers without barriers NXP Semiconductors is driving innovation in a globalized environment in cooperation with different

More information

UNIVERSAL SERVICE PRINCIPLES IN E-COMMUNICATIONS

UNIVERSAL SERVICE PRINCIPLES IN E-COMMUNICATIONS UNIVERSAL SERVICE PRINCIPLES IN E-COMMUNICATIONS BEUC paper EC register for interest representatives: identification number 9505781573-45 100% broadband coverage by 2013 ICT services have become central

More information

Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D

Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D IDIS (2010) 3:247 251 DOI 10.1007/s12394-010-0062-y Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D Ann Cavoukian Received: 10 March 2010 / Accepted: 5 May 2010 / Published

More information

Digital Identity. Workshop. Roland Berger Munich Office

Digital Identity. Workshop. Roland Berger Munich Office Digital Identity Workshop Roland Berger Munich Office 7 April 2017 We are looking forward to working with you in today's workshop Your Roland Berger hosts Sebastian Steger Stephan Janssens Sebastian Maus

More information

Privacy Management in Smart Cities

Privacy Management in Smart Cities Privacy Management in Smart Cities Antonio Kung 26/04/2017 Data management and citizens privacy in smart cities open governance 1 Introduction Speaker Antonio Kung, Trialog (www.trialog.com,fr) Engineering

More information

Cards and Fobs. Cards & Fobs. What is a card / fob? What is a batch coded card/ fob? RFID. What is a site coded card/fob?

Cards and Fobs. Cards & Fobs. What is a card / fob? What is a batch coded card/ fob? RFID. What is a site coded card/fob? Cards and Fobs There are currently a number of different technologies involved in access control cards and fobs. This document aims to inform the reader of what cards or fobs are appropriate for different

More information

Fundamentals of NFC. Jeff Fonseca Regional Sales Director, NXP Semiconductors Smart Card Alliance. All Rights Reserved.

Fundamentals of NFC. Jeff Fonseca Regional Sales Director, NXP Semiconductors Smart Card Alliance. All Rights Reserved. Fundamentals of NFC Jeff Fonseca Regional Sales Director, NXP Semiconductors 2014. Smart Card Alliance. All Rights Reserved. NXP Solution Provider for a Connected World Leader in security and contactless

More information

RFID Frequency Overview to Application fit

RFID Frequency Overview to Application fit RFID Frequency Overview to Application fit 1 The Radio Spectrum RFID tags exhibit different characteristics at different frequencies and it is highly unlikely that there will ever be one tag that can be

More information

Secure identity and electronic signatures essential for digital trust

Secure identity and electronic signatures essential for digital trust Secure identity and electronic signatures essential for digital trust Betalingsformidlingskonferansen, November 16 th 2017 Eirik Dalen, Signicat (Eirik.dalen@Signicat.com) Signicat's vision is to be the

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector SPECIFICATION Part No. : FXR.06.52.0075X.A.dg Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector Features : 13.56 MHz RFID

More information

Authenticating Identities & Securing Transactions. March 29, 2012

Authenticating Identities & Securing Transactions. March 29, 2012 Authenticating Identities & Securing Transactions March 29, 2012 Forward Looking Statements This document includes forward-looking statements which include statements regarding our business strategy, financial

More information

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES Michael Friedewald, Fraunhofer ISI istockphoto.com/marco Volpi Panel on Privacy: Appraising challenges to technologies and ethics @ CPDP 2012 Brussels, 25

More information

TOKEN SALE AGREEMENT

TOKEN SALE AGREEMENT TOKEN SALE AGREEMENT SwiftDemand Last Updated: March 30, 2018 This Token Sale Agreement is a legally binding contract between you and SwiftDemand Inc. (hereinafter Company ) regarding your rights and responsibilities

More information

IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE

IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE This document is designed to be a template for a document you can provide to your employees who will be using TimeIPS in your business

More information

Wireless Environments & Privacy

Wireless Environments & Privacy Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist

More information

Mira M-3 Handheld Raman Spectrometer. On-site verification of materials in seconds

Mira M-3 Handheld Raman Spectrometer. On-site verification of materials in seconds Mira M-3 Handheld Raman Spectrometer On-site verification of materials in seconds Mira M-3 compact, fast, and highly accurate 02 The Mira M-3 is one of the fastest and most compact handheld Raman spectrometers

More information

Maintaining privacy in pervasive computing enabling acceptance of sensor-based services

Maintaining privacy in pervasive computing enabling acceptance of sensor-based services Maintaining privacy in pervasive computing enabling acceptance of sensor-based services A Soppera and T Burbridge In the near future, everyday objects like cars and home appliances will connect the living

More information

Student Integrated Quick Guide

Student Integrated Quick Guide Student Integrated Quick Guide Accessing Examity You can easily access Examity through D2L. First, select the name of your course. Next, click on the Examity link in the Table of Contents on the left of

More information

NFC Forum NFC Use Cases

NFC Forum NFC Use Cases NFC Forum NFC Use Cases Peter Preuss Nokia Chairman NFC Forum Marketing Committee September 2009 THE NFC FORUM 2 History and Membership of the NFC Forum Established in 2004 Founded by Philips, Nokia and

More information

Wireless Keyboard Without Need For Battery

Wireless Keyboard Without Need For Battery Technical Disclosure Commons Defensive Publications Series April 29, 2015 Wireless Keyboard Without Need For Battery Vijay Asrani James Tanner Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016

UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016 UHF-Technology Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016 RFID System A traditional passive label (tag) is queried and it responds with it s ID accordingly. Power

More information

Big Data & AI Governance: The Laws and Ethics

Big Data & AI Governance: The Laws and Ethics Institute of Big Data Governance (IBDG): Inauguration-cum-Digital Economy and Big Data Governance Symposium 5 December 2018 InnoCentre, Kowloon Tong Big Data & AI Governance: The Laws and Ethics Stephen

More information

SLAVERY AND HUMAN TRAFFICKING

SLAVERY AND HUMAN TRAFFICKING 1 SLAVERY AND HUMAN TRAFFICKING Pursuant to Section 3 of the California Transparency in Supply Chains Act of 2010 and the United Kingdom (UK) Modern Slavery Act 2015, Chapter 30, Part 6, Provision 54,

More information

End-to-End Privacy Accountability

End-to-End Privacy Accountability End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?

More information

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017 The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing

More information

The Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG

The Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG The Privacy Case Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG Agenda Introduction Defining the privacy case Privacy-relevant

More information

Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport

Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport Rich Redemske MIT AutoID Lab Cambridge, MA, USA redemske@mit.edu Rich Fletcher TagSense, Inc. Cambridge, MA, USA rf@tagsense.com

More information

Fraunhofer ISI Seite 1

Fraunhofer ISI Seite 1 Seite 1 A"NEW"WAY"OF"LOOKING"AT"PRIVACY" Michael"Friedewald,"Fraunhofer"ISI" istockphoto.com/marco Volpi Why"privacy"is" important" "at"least"in"western" countries! Philosophically,! Part of human dignity

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

ELG 5121/CSI 7631 Fall Projects Overview. Projects List ELG 5121/CSI 7631 Fall 2009 Projects Overview Projects List X-Reality Affective Computing Brain-Computer Interaction Ambient Intelligence Web 3.0 Biometrics: Identity Verification in a Networked World

More information

Student Quick Guide. For Stand-Alone Access

Student Quick Guide. For Stand-Alone Access Student Quick Guide For Stand-Alone Access Accessing your Examity Dashboard For ALEKS exams, access your Examity dashboard at https://prod.examity.com/lanecc by logging in with credentials provided. For

More information