RFID and Privacy an antagonism?

Size: px
Start display at page:

Download "RFID and Privacy an antagonism?"

Transcription

1 BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INORMATION, GERMANY RFID and Privacy an antagonism? Dr. Alexander Dix, LL.M. and Freedom of Information Member of the Art.29 Working Party Statement at the EU RFID Conference Brussels, 16 October 2006

2 Outline RFID a privacy issue? Personal data From tagged objects to persons Essentials Transparency Need for regulation Summary

3 Why is RFID a privacy issue? Common misunderstanding: RFID tags in the retail industry only identify objects, not persons But: they allow for - monitoring of staff handling the products and - tracing not only shoplifters but all persons possessing tagged objects

4 Personal data Broad definition of EU Directive 95/46 any information relating to an identified or identifiable natural person Identifiable is a person who can be identified directly or indirectly, in particular by reference... to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;

5 Profiling Linking RFID tags with payment systems (credit card) or CRM would lead to a massive storage of personal data, creation of consumer profiles, steering consumer behaviour Privacy is at stake even without storage of personal data on the tag (possible later)

6 Ubiquitous computing Invisible and intransparent technology Movements of tagged objects and their holders/owners can be traced What about data subject s rights? Infrastructure of surveillance possible

7 Wearable computing RFID tags may be integrated in clothes and fabrics They are wearable and washable We may resist subdermal chips but we will not notice that we wear them on our skin Pervasive, ubiquitous computing, ambient intelligence technology

8 Guiding principle data processing systems are designed to serve man; (...) they must, whatever the nationality or residence of natural persons, respect their fundamental rights and freedoms, in particular the right to privacy, and contribute to economic and social progress, trade expansion and the well-being of individuals. (Recital 2 of Directive 95/46)

9 Essentials Legal basis for processing in most cases: free and informed consent of the data subject (customer) - e.g. tagged loyalty cards Purpose limitation (only relevant data to be stored, use limitation, time limit for storage) User-controlled option to deactivate at point of sale and later without disadvantage

10 Transparency is key (1) Directive requires controllers to inform not only about the presence of tags (EPC Global) But also on the consequences for the data subject

11 Transparency is key (2) It must be made clear that tags broadcast information without the individual s initiative what is the purpose for which the information is to be used who is the controller how to exercise the right of access how to disable or remove tags

12 Technical measures for privacy-enhancing design (1) Visibility (marking) of RFID tags, readers and the reading process Simple technique enabling visual indication of tag status (activated, deactivated) User-friendly, easy readability If tag stores personal data: possibility for the data subject to read, correct them easily

13 Technical measures for privacy-enhancing design (2) In any case: Transparent, verifiable, user-controlled deactivation ( kill command, clippable tag) at point of sale Sleeping tags: who wakes them up if not the data subject (owner)? Encryption to protect tag content and communications with reader against unauthorized access

14 The need for regulation Attempts at self-regulation As yet no global standard EU and national legislation partly covering RFID (DP and Privacy Directives) Need for further regulation should be evaluated

15 Privacy-enhancing standards RFID standardization is main driver for interoperability Manufacturers and standards bodies should make privacy compliant RFID technology available Privacy should be built into technical specifications European initiatives necessary (ETSI-ISO)

16 Individual autonomy in the digital age The challenge is how to guarantee individual autonomy in the digital age (in the face of ambient intelligence technologies) Important is the right mix between technology and regulation

17 Summary RFID technology and privacy are no antagonism if manufacturers, standards bodies and deployers realize that privacy essentials are prerequisites for legality and economic success

18 Resources and contact details Sydney Resolution of the 25th International Conference of Privacy Commissioners on RFID ners.asp Art. 29 Working Document /wpdocs/2005/wp105_en.pdf Results of public consultation /wpdocs/2005/wp111_en.pdf

RFID and privacy - Some industry perspectives (ICC, EICTA)

RFID and privacy - Some industry perspectives (ICC, EICTA) RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.

More information

IoT governance roadmap

IoT governance roadmap IoT governance roadmap Florent Frederix Head of RFID Sector INFSO D4, European Commission Brussels, June 30, 2011 Content Why is governance for discussion? What is the IoT? What is IoT governance? Identified

More information

Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID

Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications

More information

RFID, user identity and the public interest

RFID, user identity and the public interest RFID, user identity and the public interest lara srivastava senior policy analyst international telecommunication union ANEC General Assembly 1 June 2007, Brussels note: the views expressed in this presentation

More information

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES Michael Friedewald, Fraunhofer ISI istockphoto.com/marco Volpi Panel on Privacy: Appraising challenges to technologies and ethics @ CPDP 2012 Brussels, 25

More information

Faculteit Rechtsgeleerdheid Faculteit Natuurkunde, Wiskunde en Informatica Leibniz Center for Law C-ITS and GDPR

Faculteit Rechtsgeleerdheid Faculteit Natuurkunde, Wiskunde en Informatica Leibniz Center for Law C-ITS and GDPR Faculteit Rechtsgeleerdheid Faculteit Natuurkunde, Wiskunde en Informatica Leibniz Center for Law C-ITS and GDPR Wouter van Haaften, Tom van Engers What does traffic with C-ITS look like? How does Cooperative

More information

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at

More information

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Privacy and Security in Europe Technology development and increasing pressure on the private sphere Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development

More information

Definitions of Ambient Intelligence

Definitions of Ambient Intelligence Definitions of Ambient Intelligence 01QZP Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 http://praxis.cs.usyd.edu.au/~peterris Summary Technology trends Definition(s) Requested features

More information

Profiling the European Citizen

Profiling the European Citizen Vrije Universiteit Brussel From the SelectedWorks of Serge Gutwirth January 17, 2008 Profiling the European Citizen Serge Gutwirth Mireille Hildebrandt Available at: https://works.bepress.com/serge_gutwirth/13/

More information

Definition of RF-ID. Lecture on RF-IDs

Definition of RF-ID. Lecture on RF-IDs Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

The 4A Vision: Anytime, anywhere, by anyone and anything

The 4A Vision: Anytime, anywhere, by anyone and anything The 4A Vision: Anytime, anywhere, by anyone and anything Dr Tim Kelly Head, Strategy & Policy Unit, ITU and Visiting Scholar, HKUST Business School ITAHK Luncheon, 8 December 2005 2 The 4A vision: Agenda

More information

DaPIS: an Ontology-based Data Protection Icon Set

DaPIS: an Ontology-based Data Protection Icon Set DaPIS: an Ontology-based Data Protection Icon Set Monica Palmirani*, Arianna Rossi* Law via the Internet Florence, October 11, 2018 *CIRSFID, University of Bologna; ICR, University of Luxembourg The information

More information

Wireless Sensor Networks and Privacy

Wireless Sensor Networks and Privacy Wireless Sensor Networks and Privacy UbiSec & Sens Workshop Aachen 7.2.2008 Agenda ULD who we are and what we do Privacy and Data Protection concept and terminology Privacy and Security technologies a

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact

More information

EUROPEAN DATA PROTECTION SUPERVISOR

EUROPEAN DATA PROTECTION SUPERVISOR 23.4.2008 C 101/1 I (Resolutions, recommendations and opinions) OPINIONS EUROPEAN DATA PROTECTION SUPERVISOR Opinion of the European Data Protection Supervisor on the communication from the Commission

More information

Presentation Outline

Presentation Outline Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity

More information

Policy implications 15h00 16h15

Policy implications 15h00 16h15 COMPLETE RFID Workshop Brussels 2009-10-28 1 COMPLETE Workshop Brussels, October 29, 2009 RFID: Economic Impact & Europe's Competitive Position The Cases of Item Level Tagging and Public Transportation

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best

More information

Having regard to the Treaty establishing the European Community, and in particular its Article 286,

Having regard to the Treaty establishing the European Community, and in particular its Article 286, Opinion of the European Data Protection Supervisor on the Communication from the Commission on an Action Plan for the Deployment of Intelligent Transport Systems in Europe and the accompanying Proposal

More information

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer

More information

Fraunhofer ISI Seite 1

Fraunhofer ISI Seite 1 Seite 1 A"NEW"WAY"OF"LOOKING"AT"PRIVACY" Michael"Friedewald,"Fraunhofer"ISI" istockphoto.com/marco Volpi Why"privacy"is" important" "at"least"in"western" countries! Philosophically,! Part of human dignity

More information

Foreword The Internet of Things Threats and Opportunities of Improved Visibility

Foreword The Internet of Things Threats and Opportunities of Improved Visibility Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks

More information

End-to-End Privacy Accountability

End-to-End Privacy Accountability End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof, Opinion of the European Data Protection Supervisor on the proposal for a Directive of the European Parliament and of the Council amending Directive 2006/126/EC of the European Parliament and of the Council

More information

WEON 2018 COREON (1) Marjolein Timmers. What is COREON? CO = Commissie (Committee) RE = Regelgeving (Regulation) ON = Onderzoek (Research)

WEON 2018 COREON (1) Marjolein Timmers. What is COREON? CO = Commissie (Committee) RE = Regelgeving (Regulation) ON = Onderzoek (Research) WEON 2018 Marjolein Timmers COREON (1) What is COREON? CO = Commissie (Committee) RE = Regelgeving (Regulation) ON = Onderzoek (Research) https://www.federa.org/over-coreon (in Dutch) 1 COREON (2) The

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the

More information

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to

More information

Ethics, privacy and legal issues concerning GIS. This is lecture 12

Ethics, privacy and legal issues concerning GIS. This is lecture 12 Ethics, privacy and legal issues concerning GIS This is lecture 12 New technologies; new laws Any new technology brings with it a set of previously unencountered ethical problems. E.g. printing press;

More information

Gender Pay Gap Reporting

Gender Pay Gap Reporting Gender Pay Gap Reporting The Cygnet Group of Companies A t Cygnet Health Care we welcome the annual requirement to publish data around our gender pay gap. This gives us an opportunity to show our commitment

More information

RECOMMENDATIONS. COMMISSION RECOMMENDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information

RECOMMENDATIONS. COMMISSION RECOMMENDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information L 134/12 RECOMMDATIONS COMMISSION RECOMMDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning

More information

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...

More information

Location Privacy by Design - Technology & Business Incentives

Location Privacy by Design - Technology & Business Incentives Location Privacy by Design - Technology & Business Incentives Dr. Lothar Fritsch Norsk Regnesentral Norwegian Computing Center Oslo Internetdargana, Stockholm, 26-27.10.2010 Contents Location Privacy Concepts

More information

The Disappearing Computer

The Disappearing Computer IPSI - Integrated Publication and Information Systems Institute Norbert Streitz AMBIENTE Research Division http:// http://www.future-office.de http://www.roomware.de http://www.ambient-agoras.org http://www.disappearing-computer.net

More information

Ubiquitous Computing. Spring 2010

Ubiquitous Computing. Spring 2010 Ubiquitous Computing Spring 2010 - Making Sense of Sensing Systems: Five questions for designers and Researchers - Distributed mediation of ambiguous context an aware environments - RFID: A key to Automating

More information

Legislation & Standardization. Pawel Waszczur McMaster RFID Applications Lab McMaster University

Legislation & Standardization. Pawel Waszczur McMaster RFID Applications Lab McMaster University 1 Legislation & Standardization Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Electromagnetic Spectrum EM Spectrum Issues Wireless Devices using the EM Spectrum Licensed &

More information

Privacy Self-Protection for Connected Cars

Privacy Self-Protection for Connected Cars Privacy Self-Protection for Connected Cars Harald Zwingelberg ULD at the meeting of the International Working Group on Data Protection in Telecommunications Berlin, 22 November 2017 Partly based on research

More information

AI AS A FORCE OF GOOD

AI AS A FORCE OF GOOD AI AS A FORCE OF GOOD Mariarosaria Taddeo Digital Ethics Lab - Oxford Internet Institute, University of Oxford Alan Turing Institute, London @RosariaTaddeo AI Definition Outline AI Challenges Ethics for

More information

TRB Workshop on the Future of Road Vehicle Automation

TRB Workshop on the Future of Road Vehicle Automation TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation

More information

Internet of Things. (Ref: Slideshare)

Internet of Things. (Ref: Slideshare) Internet of Things (Ref: Slideshare) Contents Introduction/Overview The Internet of Things Applications of IoT Challenges and Barriers in IoT Future of IoT Internet Revolution Impact of the Internet Education

More information

What does the revision of the OECD Privacy Guidelines mean for businesses?

What does the revision of the OECD Privacy Guidelines mean for businesses? m lex A B E X T R A What does the revision of the OECD Privacy Guidelines mean for businesses? The Organization for Economic Cooperation and Development ( OECD ) has long recognized the importance of privacy

More information

Principles for the Networked World

Principles for the Networked World Principles for the Networked World The American Library Association February, 2003 Intellectual Freedom: The right to express ideas and receive information in the networked world. Privacy: The freedom

More information

1 What is Standardization? 2 What is a standard? 3 The Spanish Association for Standardization, UNE

1 What is Standardization? 2 What is a standard? 3 The Spanish Association for Standardization, UNE 1 What is Standardization? 2 What is a standard? 3 The Spanish Association for Standardization, UNE 3 4 UNE and European and international standardization 5 How are standards prepared? 6 Why participate?

More information

Legislation & Standardization

Legislation & Standardization Legislation & Standardization Understanding the role governments and industry organizations play in RFID adoption Peter Basl, PhD. baslpa@mcmaster.ca (905) 906-1443 McMaster RFID Applications Lab McMaster

More information

The Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter

The Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter The Future of Smart Everyday Objects Advances in Human Computer Interaction 08.11.2007 Sven Steudter Overview Introduction Economical Chances Privacy, Definitions and Risks Social Challenges and Implications

More information

Microsoft Trustworthy Computing 2013 Privacy Survey Results

Microsoft Trustworthy Computing 2013 Privacy Survey Results Microsoft Trustworthy Computing 2013 Privacy Survey Results Research Methodology WHO HOW MANY WHEN HOW Technology Elites in the United States and Europe Own a Smartphone, tablet and/or computer Self-identify

More information

DIGITAL TECHNOLOGIES FOR A BETTER WORLD. NanoPC HPC

DIGITAL TECHNOLOGIES FOR A BETTER WORLD. NanoPC HPC DIGITAL TECHNOLOGIES FOR A BETTER WORLD NanoPC HPC EMBEDDED COMPUTER MODULES A unique combination of miniaturization & processing power Nano PC MEDICAL INSTRUMENTATION > BIOMETRICS > HOME & BUILDING AUTOMATION

More information

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert

More information

Norbert A. Streitz. Smart Future Initiative

Norbert A. Streitz. Smart Future Initiative 3. 6. May 2011, Budapest The Disappearing Computer, Ambient Intelligence, and Smart (Urban) Living Norbert A. Streitz Smart Future Initiative http://www.smart-future.net norbert.streitz@smart-future.net

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

Passive Sensors Technical Guide

Passive Sensors Technical Guide Application Note Version 1.0 10/17/2016 This document is a technical user guide to the working principles and usage of Smartrac passive sensor products using RF Micron Magnus S2 and S3 ICs. 1. INTRODUCTION...

More information

Ethical issues raised by big data and real world evidence projects. Dr Andrew Turner

Ethical issues raised by big data and real world evidence projects. Dr Andrew Turner Ethical issues raised by big data and real world evidence projects Dr Andrew Turner andrew.turner@oii.ox.ac.uk December 8, 2017 What is real world evidence and big data? Real world evidence is evidence

More information

New Age Technologies in Construction Safety and Associated Concerns

New Age Technologies in Construction Safety and Associated Concerns New Age Technologies in Construction Safety and Associated Concerns Saurav Sinha General Manager BSI Group India Pvt. Ltd. WE SHALL COVER. New age technologies in Construction Safety - Wearable Technology

More information

Overview of case studies: Germany. Case study: Nanotron Technologies GmbH (June 2011)

Overview of case studies: Germany. Case study: Nanotron Technologies GmbH (June 2011) Overview of case studies: Germany Technologies GmbH (June 2011) Summary Example of the application of the ISO methodology - Nanotron technologies: Information and Communication technologies (ICT) Credits

More information

DETERMINATION OF POPULATION REGULATION

DETERMINATION OF POPULATION REGULATION Province of Alberta MUNICIPAL GOVERNMENT ACT DETERMINATION OF POPULATION REGULATION Alberta Regulation 63/2001 With amendments up to and including Alberta Regulation 198/2017 Office Consolidation Published

More information

AN Starter guide PCB tagging. Rev Jan Application note PUBLIC. Document information

AN Starter guide PCB tagging. Rev Jan Application note PUBLIC. Document information Starter guide PCB tagging Rev. 2.0 21 Jan 2010 184720 Document information Info Keywords Abstract Content UCODE EPC G2, G2XM, G2XL, Reference Design, Antenna Design, PCB This paper describes two basic

More information

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017 Biometric Data, Deidentification and the GDPR E. Kindt Cost1206 Training school 2017 Overview Introduction 1. Definition of biometric data 2. Biometric data as a new category of sensitive data 3. De-identification

More information

Formal Accountability for Biometric Surveillance: A Case Study

Formal Accountability for Biometric Surveillance: A Case Study Vinh Thong Ta University of Central Lancashire, UK vtta@uclan.ac.uk Joint work with Denis Butin Technische Universität Darmstadt, Germany Daniel Le Métayer INRIA, France APF 2015, October 7-8, Luxembourg

More information

WJM1000. Next Generation RFID Reader Module Based on the WJC200 Gen2 RFID reader chipset. Key Features

WJM1000. Next Generation RFID Reader Module Based on the WJC200 Gen2 RFID reader chipset. Key Features Key Features Multi-protocol support: ISO 18000-6C (Gen2) & ISO 18000-6B Dynamic RF output power: 10dBm to 24dBm range Two antenna ports for added flexibility Special high performance single tag access

More information

ELECTRONIC ARTICLE SURVEILLANCE

ELECTRONIC ARTICLE SURVEILLANCE ELECTRONIC ARTICLE SURVEILLANCE WHY EAS? Electronic Article Surveillance (EAS) is an important defense against the rise of casual and organized retail theft. Traditional approaches use Acousto-Magnetic

More information

Secure identity and electronic signatures essential for digital trust

Secure identity and electronic signatures essential for digital trust Secure identity and electronic signatures essential for digital trust Betalingsformidlingskonferansen, November 16 th 2017 Eirik Dalen, Signicat (Eirik.dalen@Signicat.com) Signicat's vision is to be the

More information

The Social Impact of Pervasive Technologies

The Social Impact of Pervasive Technologies The Social Impact of Pervasive Technologies Anne Clarke European Management Services, Leeds, UK clarkeam@compuserve.com Abstract Large scale deployment of communications technologies has produced major

More information

Integrating Fundamental Values into Information Flows in Sustainability Decision-Making

Integrating Fundamental Values into Information Flows in Sustainability Decision-Making Integrating Fundamental Values into Information Flows in Sustainability Decision-Making Rónán Kennedy, School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie Presentation for

More information

Data protection and INSPIRE: an uncomfortable combination?

Data protection and INSPIRE: an uncomfortable combination? Data protection and INSPIRE: an uncomfortable combination? Bastiaan van Loenen, Stefan Kulk, Hendrik Ploeger b.vanloenen@tudelft.nl; www.otb.tudelft.nl/opendata 1 EU data protection directive 'personal

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Passive High-Function RFID: Sensors and Bi-Stable Displays

Passive High-Function RFID: Sensors and Bi-Stable Displays Passive High-Function RFID: Sensors and Bi-Stable Displays May 4, 2015 Charles Greene, Ph.D. Chief Technical Officer EDN 2010 Hot 100 Emerging Technology P2100 Powerharvester TX91501 Powercaster P2110

More information

The Eleventh Advanced International Conference on Telecommunications (AICT 2015) June 21-26, Brussels, Belgium

The Eleventh Advanced International Conference on Telecommunications (AICT 2015) June 21-26, Brussels, Belgium The Eleventh Advanced International Conference on Telecommunications (AICT 2015) June 21-26, 2015 - Brussels, Belgium Panel on Telecommunications Challenges in Urban Networking Moderator and Panelists

More information

The Alan Turing Institute, British Library, 96 Euston Rd, London, NW1 2DB, United Kingdom; 3

The Alan Turing Institute, British Library, 96 Euston Rd, London, NW1 2DB, United Kingdom; 3 Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Transparent, explainable, and accountable AI for robotics. Science Robotics, 2(6), eaan6080. Transparent, Explainable, and Accountable AI for Robotics

More information

The RFID Roadmap: The Next Steps for Europe

The RFID Roadmap: The Next Steps for Europe The RFID Roadmap: The Next Steps for Europe Bearbeitet von Gerd Wolfram, Birgit Gampl, Peter Gabriel 1. Auflage 2008. Buch. xxiii, 201 S. Hardcover ISBN 978 3 540 71018 9 Format (B x L): 15,5 x 23,5 cm

More information

Customer Service Charter

Customer Service Charter Customer Service Charter This charter explains what you can expect from us. It also outlines what we expect from you and how you can help us to improve. Published June 2016 Customer Service Charter Caranua

More information

Human Rights in the era of Information and Communication Technology

Human Rights in the era of Information and Communication Technology Human Rights in the era of Information and Communication Technology May 31, 2017 Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg Outline 1 Human rights 2 Human

More information

THE EUROPEAN DATA PROTECTION SUPERVISOR, Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

THE EUROPEAN DATA PROTECTION SUPERVISOR, Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof, Opinion of the EDPS on the proposal for a Regulation of the European Parliament and of the Council concerning type-approval requirements for the deployment of the ecall system and amending Directive 2007/46/EC

More information

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector 8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,

More information

Project magazine. Workpackage 5 // Deliverable

Project magazine. Workpackage 5 // Deliverable Project magazine Workpackage 5 // Deliverable 5.3 www.hackthebrainhub.com Ref. Ares(2017)6376575-28/12/2017 CO-CREATION BRAINHACK creates collaborations between multiple communities engaged in Brain Neural

More information

Digital transformation in the Catalan public administrations

Digital transformation in the Catalan public administrations Digital transformation in the Catalan public administrations Joan Ramon Marsal, Coordinator of the National Agreement for the Digital Society egovernment Working Group. Government of Catalonia Josep Lluís

More information

Health Information Technology Standards. Series Editor: Tim Benson

Health Information Technology Standards. Series Editor: Tim Benson Health Information Technology Standards Series Editor: Tim Benson Tim Benson Principles of Health Interoperability HL7 and SNOMED Second Edition Tim Benson Abies Ltd Hermitage, Thatcham Berkshire UK ISBN

More information

Information and Communications Technology and Environmental Regulation: Critical Perspectives

Information and Communications Technology and Environmental Regulation: Critical Perspectives Image: European Space Agency Information and Communications Technology and Environmental Regulation: Critical Perspectives Rónán Kennedy School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie

More information

The 8 step plan to build a digital culture. Martin Talks

The 8 step plan to build a digital culture. Martin Talks The 8 step plan to build a digital culture Martin Talks Introduction The key to driving digital transformation is culture. And that s where many businesses fail. This report outlines the essential steps

More information

Understanding the role governments and industry organizations play in RFID adoption. Mark Roberti, Founder & Editor, RFID Journal

Understanding the role governments and industry organizations play in RFID adoption. Mark Roberti, Founder & Editor, RFID Journal Understanding the role governments and industry organizations play in RFID adoption Mark Roberti, Founder & Editor, RFID Journal Regulations for spectrum allocation RFID standards development organizations

More information

DETERMINATION OF POPULATION REGULATION

DETERMINATION OF POPULATION REGULATION Province of Alberta MUNICIPAL GOVERNMENT ACT DETERMINATION OF POPULATION REGULATION Alberta Regulation 63/2001 With amendments up to and including Alberta Regulation 10/2013 Office Consolidation Published

More information

TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers

TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers Questions From which date exactly will this Directive be in power? Answers Member States must publish and apply the

More information

RS232-B1 User Manual V1.2 05/10/2017

RS232-B1 User Manual V1.2 05/10/2017 RS232-B1 User Manual V1.2 05/10/2017 Table of Contents 1. Introduction...2 1.1 Device Overview... 2 1.2 System Overview... 3 1.3 Features... 3 1.4 Connectors... 4 1.4.1 RS232 Connectors (J1, J2)... 4 1.4.2

More information

Danube University Krems. The University for Continuing Education. Smart Cities & Smart ICT

Danube University Krems. The University for Continuing Education. Smart Cities & Smart ICT Danube University Krems. The University for Continuing Education. Smart Cities & Smart ICT 3. Smart City Smart ICT www.donau-uni.ac.at Smartness Viewport & Dimensions Inside Outside Stakeholder viewport:

More information

Privacy Protection against Ubiquitous RFID Spying: Challenges, Countermeasures and Business Models

Privacy Protection against Ubiquitous RFID Spying: Challenges, Countermeasures and Business Models Privacy Protection against Ubiquitous RFID Spying: Challenges, Countermeasures and Business Models Diplomarbeit zur Erlangung des Grades eines Diplom-Ökonomen der Wirtschaftswissenschaftlichen Fakultät

More information

mpowering the Nations

mpowering the Nations mpowering the Nations Ibrahim Kushchu, MBA, MSc, PhD Associate Professor Director Mobile Government Consortium International UK www.mgovernment.org ik@aykey.net Ik@mgovernment.org Background & Research

More information

Smart Cards in the Public Sector

Smart Cards in the Public Sector Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

MSc Project Proposals

MSc Project Proposals MSc Project Proposals Programme Leader: Ali Al-Bayati 10 June 2015 PROJECT 01: MEASURING PRIVACY IN SMART METERING Project Outline Smart meters, like conventional electricity meters, measure the power

More information

The Game Changer: Privacy by Design

The Game Changer: Privacy by Design WHITE PAPER Dr. Ann Cavoukian, Privacy by Design Centre of Excellence, on leading with privacy by design The Game Changer: Privacy by Design Data Security: Cost of Taking the Reactive Approach CONTENTS

More information

Photography policy. Policy history

Photography policy. Policy history Reference: Date Approved: April 2017 Approving Body: Director of External Affairs on behalf of Directors Team Implementation Date: April 2017 Version: 1.0 Supersedes: Stakeholder groups consulted: Target

More information

Patents and Industry 4.0

Patents and Industry 4.0 24-04-2018 Patents and Industry 4.0 EPO practice for CII - Computer Implemented Inventions Koen Lievens CII GL Workgroup Sector ICT April 2018 Patents and Industry 4.0 Computer Implemented Inventions (CII)

More information

Heaven and hell: visions for pervasive adaptation

Heaven and hell: visions for pervasive adaptation University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2011 Heaven and hell: visions for pervasive adaptation Ben Paechter Edinburgh

More information

RADIO SPECTRUM POLICY GROUP. Commission activities related to radio spectrum policy

RADIO SPECTRUM POLICY GROUP. Commission activities related to radio spectrum policy EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology Electronic Communications Networks and Services Radio Spectrum Policy Group RSPG Secretariat Brussels, 24 February

More information

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University 1 Physics of RFID Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Radio Waves Active vs. Passive Near field vs. Far field Behavior of UHF fields Modulation & Signal Coding 3

More information

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,

More information