RFID and Privacy an antagonism?
|
|
- Marion Sharp
- 6 years ago
- Views:
Transcription
1 BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INORMATION, GERMANY RFID and Privacy an antagonism? Dr. Alexander Dix, LL.M. and Freedom of Information Member of the Art.29 Working Party Statement at the EU RFID Conference Brussels, 16 October 2006
2 Outline RFID a privacy issue? Personal data From tagged objects to persons Essentials Transparency Need for regulation Summary
3 Why is RFID a privacy issue? Common misunderstanding: RFID tags in the retail industry only identify objects, not persons But: they allow for - monitoring of staff handling the products and - tracing not only shoplifters but all persons possessing tagged objects
4 Personal data Broad definition of EU Directive 95/46 any information relating to an identified or identifiable natural person Identifiable is a person who can be identified directly or indirectly, in particular by reference... to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;
5 Profiling Linking RFID tags with payment systems (credit card) or CRM would lead to a massive storage of personal data, creation of consumer profiles, steering consumer behaviour Privacy is at stake even without storage of personal data on the tag (possible later)
6 Ubiquitous computing Invisible and intransparent technology Movements of tagged objects and their holders/owners can be traced What about data subject s rights? Infrastructure of surveillance possible
7 Wearable computing RFID tags may be integrated in clothes and fabrics They are wearable and washable We may resist subdermal chips but we will not notice that we wear them on our skin Pervasive, ubiquitous computing, ambient intelligence technology
8 Guiding principle data processing systems are designed to serve man; (...) they must, whatever the nationality or residence of natural persons, respect their fundamental rights and freedoms, in particular the right to privacy, and contribute to economic and social progress, trade expansion and the well-being of individuals. (Recital 2 of Directive 95/46)
9 Essentials Legal basis for processing in most cases: free and informed consent of the data subject (customer) - e.g. tagged loyalty cards Purpose limitation (only relevant data to be stored, use limitation, time limit for storage) User-controlled option to deactivate at point of sale and later without disadvantage
10 Transparency is key (1) Directive requires controllers to inform not only about the presence of tags (EPC Global) But also on the consequences for the data subject
11 Transparency is key (2) It must be made clear that tags broadcast information without the individual s initiative what is the purpose for which the information is to be used who is the controller how to exercise the right of access how to disable or remove tags
12 Technical measures for privacy-enhancing design (1) Visibility (marking) of RFID tags, readers and the reading process Simple technique enabling visual indication of tag status (activated, deactivated) User-friendly, easy readability If tag stores personal data: possibility for the data subject to read, correct them easily
13 Technical measures for privacy-enhancing design (2) In any case: Transparent, verifiable, user-controlled deactivation ( kill command, clippable tag) at point of sale Sleeping tags: who wakes them up if not the data subject (owner)? Encryption to protect tag content and communications with reader against unauthorized access
14 The need for regulation Attempts at self-regulation As yet no global standard EU and national legislation partly covering RFID (DP and Privacy Directives) Need for further regulation should be evaluated
15 Privacy-enhancing standards RFID standardization is main driver for interoperability Manufacturers and standards bodies should make privacy compliant RFID technology available Privacy should be built into technical specifications European initiatives necessary (ETSI-ISO)
16 Individual autonomy in the digital age The challenge is how to guarantee individual autonomy in the digital age (in the face of ambient intelligence technologies) Important is the right mix between technology and regulation
17 Summary RFID technology and privacy are no antagonism if manufacturers, standards bodies and deployers realize that privacy essentials are prerequisites for legality and economic success
18 Resources and contact details Sydney Resolution of the 25th International Conference of Privacy Commissioners on RFID ners.asp Art. 29 Working Document /wpdocs/2005/wp105_en.pdf Results of public consultation /wpdocs/2005/wp111_en.pdf
RFID and privacy - Some industry perspectives (ICC, EICTA)
RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.
More informationIoT governance roadmap
IoT governance roadmap Florent Frederix Head of RFID Sector INFSO D4, European Commission Brussels, June 30, 2011 Content Why is governance for discussion? What is the IoT? What is IoT governance? Identified
More informationWhere s The Beep? Privacy, Security, & User (Mis)undestandings of RFID
Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications
More informationRFID, user identity and the public interest
RFID, user identity and the public interest lara srivastava senior policy analyst international telecommunication union ANEC General Assembly 1 June 2007, Brussels note: the views expressed in this presentation
More informationFUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES
FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES Michael Friedewald, Fraunhofer ISI istockphoto.com/marco Volpi Panel on Privacy: Appraising challenges to technologies and ethics @ CPDP 2012 Brussels, 25
More informationFaculteit Rechtsgeleerdheid Faculteit Natuurkunde, Wiskunde en Informatica Leibniz Center for Law C-ITS and GDPR
Faculteit Rechtsgeleerdheid Faculteit Natuurkunde, Wiskunde en Informatica Leibniz Center for Law C-ITS and GDPR Wouter van Haaften, Tom van Engers What does traffic with C-ITS look like? How does Cooperative
More informationMULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID
garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at
More informationPrivacy and Security in Europe Technology development and increasing pressure on the private sphere
Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development
More informationDefinitions of Ambient Intelligence
Definitions of Ambient Intelligence 01QZP Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 http://praxis.cs.usyd.edu.au/~peterris Summary Technology trends Definition(s) Requested features
More informationProfiling the European Citizen
Vrije Universiteit Brussel From the SelectedWorks of Serge Gutwirth January 17, 2008 Profiling the European Citizen Serge Gutwirth Mireille Hildebrandt Available at: https://works.bepress.com/serge_gutwirth/13/
More informationDefinition of RF-ID. Lecture on RF-IDs
Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator
More informationPersonal Data Protection Competency Framework for School Students. Intended to help Educators
Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework
More informationPanel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany
The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics
More informationIAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER
IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group
More informationThe 4A Vision: Anytime, anywhere, by anyone and anything
The 4A Vision: Anytime, anywhere, by anyone and anything Dr Tim Kelly Head, Strategy & Policy Unit, ITU and Visiting Scholar, HKUST Business School ITAHK Luncheon, 8 December 2005 2 The 4A vision: Agenda
More informationDaPIS: an Ontology-based Data Protection Icon Set
DaPIS: an Ontology-based Data Protection Icon Set Monica Palmirani*, Arianna Rossi* Law via the Internet Florence, October 11, 2018 *CIRSFID, University of Bologna; ICR, University of Luxembourg The information
More informationWireless Sensor Networks and Privacy
Wireless Sensor Networks and Privacy UbiSec & Sens Workshop Aachen 7.2.2008 Agenda ULD who we are and what we do Privacy and Data Protection concept and terminology Privacy and Security technologies a
More informationRobert Bond Partner, Commercial/IP/IT
Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public
More informationShould privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009
Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact
More informationEUROPEAN DATA PROTECTION SUPERVISOR
23.4.2008 C 101/1 I (Resolutions, recommendations and opinions) OPINIONS EUROPEAN DATA PROTECTION SUPERVISOR Opinion of the European Data Protection Supervisor on the communication from the Commission
More informationPresentation Outline
Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity
More informationPolicy implications 15h00 16h15
COMPLETE RFID Workshop Brussels 2009-10-28 1 COMPLETE Workshop Brussels, October 29, 2009 RFID: Economic Impact & Europe's Competitive Position The Cases of Item Level Tagging and Public Transportation
More informationCCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy
CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best
More informationHaving regard to the Treaty establishing the European Community, and in particular its Article 286,
Opinion of the European Data Protection Supervisor on the Communication from the Commission on an Action Plan for the Deployment of Intelligent Transport Systems in Europe and the accompanying Proposal
More informationFinal Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou
Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer
More informationFraunhofer ISI Seite 1
Seite 1 A"NEW"WAY"OF"LOOKING"AT"PRIVACY" Michael"Friedewald,"Fraunhofer"ISI" istockphoto.com/marco Volpi Why"privacy"is" important" "at"least"in"western" countries! Philosophically,! Part of human dignity
More informationForeword The Internet of Things Threats and Opportunities of Improved Visibility
Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks
More informationEnd-to-End Privacy Accountability
End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?
More informationEnabling Trust in e-business: Research in Enterprise Privacy Technologies
Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the proposal for a Directive of the European Parliament and of the Council amending Directive 2006/126/EC of the European Parliament and of the Council
More informationWEON 2018 COREON (1) Marjolein Timmers. What is COREON? CO = Commissie (Committee) RE = Regelgeving (Regulation) ON = Onderzoek (Research)
WEON 2018 Marjolein Timmers COREON (1) What is COREON? CO = Commissie (Committee) RE = Regelgeving (Regulation) ON = Onderzoek (Research) https://www.federa.org/over-coreon (in Dutch) 1 COREON (2) The
More informationCCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy
CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the
More informationMOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification
MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to
More informationEthics, privacy and legal issues concerning GIS. This is lecture 12
Ethics, privacy and legal issues concerning GIS This is lecture 12 New technologies; new laws Any new technology brings with it a set of previously unencountered ethical problems. E.g. printing press;
More informationGender Pay Gap Reporting
Gender Pay Gap Reporting The Cygnet Group of Companies A t Cygnet Health Care we welcome the annual requirement to publish data around our gender pay gap. This gives us an opportunity to show our commitment
More informationRECOMMENDATIONS. COMMISSION RECOMMENDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information
L 134/12 RECOMMDATIONS COMMISSION RECOMMDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning
More informationLAB3-R04 A Hard Privacy Impact Assessment. Post conference summary
LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...
More informationLocation Privacy by Design - Technology & Business Incentives
Location Privacy by Design - Technology & Business Incentives Dr. Lothar Fritsch Norsk Regnesentral Norwegian Computing Center Oslo Internetdargana, Stockholm, 26-27.10.2010 Contents Location Privacy Concepts
More informationThe Disappearing Computer
IPSI - Integrated Publication and Information Systems Institute Norbert Streitz AMBIENTE Research Division http:// http://www.future-office.de http://www.roomware.de http://www.ambient-agoras.org http://www.disappearing-computer.net
More informationUbiquitous Computing. Spring 2010
Ubiquitous Computing Spring 2010 - Making Sense of Sensing Systems: Five questions for designers and Researchers - Distributed mediation of ambiguous context an aware environments - RFID: A key to Automating
More informationLegislation & Standardization. Pawel Waszczur McMaster RFID Applications Lab McMaster University
1 Legislation & Standardization Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Electromagnetic Spectrum EM Spectrum Issues Wireless Devices using the EM Spectrum Licensed &
More informationPrivacy Self-Protection for Connected Cars
Privacy Self-Protection for Connected Cars Harald Zwingelberg ULD at the meeting of the International Working Group on Data Protection in Telecommunications Berlin, 22 November 2017 Partly based on research
More informationAI AS A FORCE OF GOOD
AI AS A FORCE OF GOOD Mariarosaria Taddeo Digital Ethics Lab - Oxford Internet Institute, University of Oxford Alan Turing Institute, London @RosariaTaddeo AI Definition Outline AI Challenges Ethics for
More informationTRB Workshop on the Future of Road Vehicle Automation
TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation
More informationInternet of Things. (Ref: Slideshare)
Internet of Things (Ref: Slideshare) Contents Introduction/Overview The Internet of Things Applications of IoT Challenges and Barriers in IoT Future of IoT Internet Revolution Impact of the Internet Education
More informationWhat does the revision of the OECD Privacy Guidelines mean for businesses?
m lex A B E X T R A What does the revision of the OECD Privacy Guidelines mean for businesses? The Organization for Economic Cooperation and Development ( OECD ) has long recognized the importance of privacy
More informationPrinciples for the Networked World
Principles for the Networked World The American Library Association February, 2003 Intellectual Freedom: The right to express ideas and receive information in the networked world. Privacy: The freedom
More information1 What is Standardization? 2 What is a standard? 3 The Spanish Association for Standardization, UNE
1 What is Standardization? 2 What is a standard? 3 The Spanish Association for Standardization, UNE 3 4 UNE and European and international standardization 5 How are standards prepared? 6 Why participate?
More informationLegislation & Standardization
Legislation & Standardization Understanding the role governments and industry organizations play in RFID adoption Peter Basl, PhD. baslpa@mcmaster.ca (905) 906-1443 McMaster RFID Applications Lab McMaster
More informationThe Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter
The Future of Smart Everyday Objects Advances in Human Computer Interaction 08.11.2007 Sven Steudter Overview Introduction Economical Chances Privacy, Definitions and Risks Social Challenges and Implications
More informationMicrosoft Trustworthy Computing 2013 Privacy Survey Results
Microsoft Trustworthy Computing 2013 Privacy Survey Results Research Methodology WHO HOW MANY WHEN HOW Technology Elites in the United States and Europe Own a Smartphone, tablet and/or computer Self-identify
More informationDIGITAL TECHNOLOGIES FOR A BETTER WORLD. NanoPC HPC
DIGITAL TECHNOLOGIES FOR A BETTER WORLD NanoPC HPC EMBEDDED COMPUTER MODULES A unique combination of miniaturization & processing power Nano PC MEDICAL INSTRUMENTATION > BIOMETRICS > HOME & BUILDING AUTOMATION
More informationThe Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence
Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert
More informationNorbert A. Streitz. Smart Future Initiative
3. 6. May 2011, Budapest The Disappearing Computer, Ambient Intelligence, and Smart (Urban) Living Norbert A. Streitz Smart Future Initiative http://www.smart-future.net norbert.streitz@smart-future.net
More informationHuman RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019
Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device
More informationPassive Sensors Technical Guide
Application Note Version 1.0 10/17/2016 This document is a technical user guide to the working principles and usage of Smartrac passive sensor products using RF Micron Magnus S2 and S3 ICs. 1. INTRODUCTION...
More informationEthical issues raised by big data and real world evidence projects. Dr Andrew Turner
Ethical issues raised by big data and real world evidence projects Dr Andrew Turner andrew.turner@oii.ox.ac.uk December 8, 2017 What is real world evidence and big data? Real world evidence is evidence
More informationNew Age Technologies in Construction Safety and Associated Concerns
New Age Technologies in Construction Safety and Associated Concerns Saurav Sinha General Manager BSI Group India Pvt. Ltd. WE SHALL COVER. New age technologies in Construction Safety - Wearable Technology
More informationOverview of case studies: Germany. Case study: Nanotron Technologies GmbH (June 2011)
Overview of case studies: Germany Technologies GmbH (June 2011) Summary Example of the application of the ISO methodology - Nanotron technologies: Information and Communication technologies (ICT) Credits
More informationDETERMINATION OF POPULATION REGULATION
Province of Alberta MUNICIPAL GOVERNMENT ACT DETERMINATION OF POPULATION REGULATION Alberta Regulation 63/2001 With amendments up to and including Alberta Regulation 198/2017 Office Consolidation Published
More informationAN Starter guide PCB tagging. Rev Jan Application note PUBLIC. Document information
Starter guide PCB tagging Rev. 2.0 21 Jan 2010 184720 Document information Info Keywords Abstract Content UCODE EPC G2, G2XM, G2XL, Reference Design, Antenna Design, PCB This paper describes two basic
More informationBiometric Data, Deidentification. E. Kindt Cost1206 Training school 2017
Biometric Data, Deidentification and the GDPR E. Kindt Cost1206 Training school 2017 Overview Introduction 1. Definition of biometric data 2. Biometric data as a new category of sensitive data 3. De-identification
More informationFormal Accountability for Biometric Surveillance: A Case Study
Vinh Thong Ta University of Central Lancashire, UK vtta@uclan.ac.uk Joint work with Denis Butin Technische Universität Darmstadt, Germany Daniel Le Métayer INRIA, France APF 2015, October 7-8, Luxembourg
More informationWJM1000. Next Generation RFID Reader Module Based on the WJC200 Gen2 RFID reader chipset. Key Features
Key Features Multi-protocol support: ISO 18000-6C (Gen2) & ISO 18000-6B Dynamic RF output power: 10dBm to 24dBm range Two antenna ports for added flexibility Special high performance single tag access
More informationELECTRONIC ARTICLE SURVEILLANCE
ELECTRONIC ARTICLE SURVEILLANCE WHY EAS? Electronic Article Surveillance (EAS) is an important defense against the rise of casual and organized retail theft. Traditional approaches use Acousto-Magnetic
More informationSecure identity and electronic signatures essential for digital trust
Secure identity and electronic signatures essential for digital trust Betalingsformidlingskonferansen, November 16 th 2017 Eirik Dalen, Signicat (Eirik.dalen@Signicat.com) Signicat's vision is to be the
More informationThe Social Impact of Pervasive Technologies
The Social Impact of Pervasive Technologies Anne Clarke European Management Services, Leeds, UK clarkeam@compuserve.com Abstract Large scale deployment of communications technologies has produced major
More informationIntegrating Fundamental Values into Information Flows in Sustainability Decision-Making
Integrating Fundamental Values into Information Flows in Sustainability Decision-Making Rónán Kennedy, School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie Presentation for
More informationData protection and INSPIRE: an uncomfortable combination?
Data protection and INSPIRE: an uncomfortable combination? Bastiaan van Loenen, Stefan Kulk, Hendrik Ploeger b.vanloenen@tudelft.nl; www.otb.tudelft.nl/opendata 1 EU data protection directive 'personal
More informationPotential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain
This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting
More informationPassive High-Function RFID: Sensors and Bi-Stable Displays
Passive High-Function RFID: Sensors and Bi-Stable Displays May 4, 2015 Charles Greene, Ph.D. Chief Technical Officer EDN 2010 Hot 100 Emerging Technology P2100 Powerharvester TX91501 Powercaster P2110
More informationThe Eleventh Advanced International Conference on Telecommunications (AICT 2015) June 21-26, Brussels, Belgium
The Eleventh Advanced International Conference on Telecommunications (AICT 2015) June 21-26, 2015 - Brussels, Belgium Panel on Telecommunications Challenges in Urban Networking Moderator and Panelists
More informationThe Alan Turing Institute, British Library, 96 Euston Rd, London, NW1 2DB, United Kingdom; 3
Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Transparent, explainable, and accountable AI for robotics. Science Robotics, 2(6), eaan6080. Transparent, Explainable, and Accountable AI for Robotics
More informationThe RFID Roadmap: The Next Steps for Europe
The RFID Roadmap: The Next Steps for Europe Bearbeitet von Gerd Wolfram, Birgit Gampl, Peter Gabriel 1. Auflage 2008. Buch. xxiii, 201 S. Hardcover ISBN 978 3 540 71018 9 Format (B x L): 15,5 x 23,5 cm
More informationCustomer Service Charter
Customer Service Charter This charter explains what you can expect from us. It also outlines what we expect from you and how you can help us to improve. Published June 2016 Customer Service Charter Caranua
More informationHuman Rights in the era of Information and Communication Technology
Human Rights in the era of Information and Communication Technology May 31, 2017 Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg Outline 1 Human rights 2 Human
More informationTHE EUROPEAN DATA PROTECTION SUPERVISOR, Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the EDPS on the proposal for a Regulation of the European Parliament and of the Council concerning type-approval requirements for the deployment of the ecall system and amending Directive 2007/46/EC
More information8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector
8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,
More informationProject magazine. Workpackage 5 // Deliverable
Project magazine Workpackage 5 // Deliverable 5.3 www.hackthebrainhub.com Ref. Ares(2017)6376575-28/12/2017 CO-CREATION BRAINHACK creates collaborations between multiple communities engaged in Brain Neural
More informationDigital transformation in the Catalan public administrations
Digital transformation in the Catalan public administrations Joan Ramon Marsal, Coordinator of the National Agreement for the Digital Society egovernment Working Group. Government of Catalonia Josep Lluís
More informationHealth Information Technology Standards. Series Editor: Tim Benson
Health Information Technology Standards Series Editor: Tim Benson Tim Benson Principles of Health Interoperability HL7 and SNOMED Second Edition Tim Benson Abies Ltd Hermitage, Thatcham Berkshire UK ISBN
More informationInformation and Communications Technology and Environmental Regulation: Critical Perspectives
Image: European Space Agency Information and Communications Technology and Environmental Regulation: Critical Perspectives Rónán Kennedy School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie
More informationThe 8 step plan to build a digital culture. Martin Talks
The 8 step plan to build a digital culture Martin Talks Introduction The key to driving digital transformation is culture. And that s where many businesses fail. This report outlines the essential steps
More informationUnderstanding the role governments and industry organizations play in RFID adoption. Mark Roberti, Founder & Editor, RFID Journal
Understanding the role governments and industry organizations play in RFID adoption Mark Roberti, Founder & Editor, RFID Journal Regulations for spectrum allocation RFID standards development organizations
More informationDETERMINATION OF POPULATION REGULATION
Province of Alberta MUNICIPAL GOVERNMENT ACT DETERMINATION OF POPULATION REGULATION Alberta Regulation 63/2001 With amendments up to and including Alberta Regulation 10/2013 Office Consolidation Published
More informationTÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers
TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers Questions From which date exactly will this Directive be in power? Answers Member States must publish and apply the
More informationRS232-B1 User Manual V1.2 05/10/2017
RS232-B1 User Manual V1.2 05/10/2017 Table of Contents 1. Introduction...2 1.1 Device Overview... 2 1.2 System Overview... 3 1.3 Features... 3 1.4 Connectors... 4 1.4.1 RS232 Connectors (J1, J2)... 4 1.4.2
More informationDanube University Krems. The University for Continuing Education. Smart Cities & Smart ICT
Danube University Krems. The University for Continuing Education. Smart Cities & Smart ICT 3. Smart City Smart ICT www.donau-uni.ac.at Smartness Viewport & Dimensions Inside Outside Stakeholder viewport:
More informationPrivacy Protection against Ubiquitous RFID Spying: Challenges, Countermeasures and Business Models
Privacy Protection against Ubiquitous RFID Spying: Challenges, Countermeasures and Business Models Diplomarbeit zur Erlangung des Grades eines Diplom-Ökonomen der Wirtschaftswissenschaftlichen Fakultät
More informationmpowering the Nations
mpowering the Nations Ibrahim Kushchu, MBA, MSc, PhD Associate Professor Director Mobile Government Consortium International UK www.mgovernment.org ik@aykey.net Ik@mgovernment.org Background & Research
More informationSmart Cards in the Public Sector
Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart
More informationOur position. ICDPPC declaration on ethics and data protection in artificial intelligence
ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure
More informationMSc Project Proposals
MSc Project Proposals Programme Leader: Ali Al-Bayati 10 June 2015 PROJECT 01: MEASURING PRIVACY IN SMART METERING Project Outline Smart meters, like conventional electricity meters, measure the power
More informationThe Game Changer: Privacy by Design
WHITE PAPER Dr. Ann Cavoukian, Privacy by Design Centre of Excellence, on leading with privacy by design The Game Changer: Privacy by Design Data Security: Cost of Taking the Reactive Approach CONTENTS
More informationPhotography policy. Policy history
Reference: Date Approved: April 2017 Approving Body: Director of External Affairs on behalf of Directors Team Implementation Date: April 2017 Version: 1.0 Supersedes: Stakeholder groups consulted: Target
More informationPatents and Industry 4.0
24-04-2018 Patents and Industry 4.0 EPO practice for CII - Computer Implemented Inventions Koen Lievens CII GL Workgroup Sector ICT April 2018 Patents and Industry 4.0 Computer Implemented Inventions (CII)
More informationHeaven and hell: visions for pervasive adaptation
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2011 Heaven and hell: visions for pervasive adaptation Ben Paechter Edinburgh
More informationRADIO SPECTRUM POLICY GROUP. Commission activities related to radio spectrum policy
EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology Electronic Communications Networks and Services Radio Spectrum Policy Group RSPG Secretariat Brussels, 24 February
More informationPhysics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University
1 Physics of RFID Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Radio Waves Active vs. Passive Near field vs. Far field Behavior of UHF fields Modulation & Signal Coding 3
More informationHL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)
HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,
More information