RFID Technology and its Impact on Privacy

Author(s):  
Tatiana-Eleni Sinodinou

The present chapter explores privacy issues posed by the use of RFID systems and applications. The existing legal framework for data protection is analyzed in order to discover how general privacy safeguarding principles should be applied in the case of RFIDs, with special focus on the main areas which are going to experience widespread use of such applications. The structure of the chapter is based on a chronological order which follows the consecutive phases of contact and interaction between the individual and the RFID tag. The implementation of a tag to a product or in the human body establishes the first point of contact of the individual with the RFID tag. This stage of data processing is examined in the first part of the chapter. In more particular, this part deals with the application of general principles of fair processing, such as information transparency, the debate about the necessity to require the prior consent of the individual (possible opt-in and opt-out solutions) and the precondition of a clearly defined purpose of the data processing. The symbiosis of the person with the tag is examined in the second part. Indeed, privacy concerns are equally significant during the phase of processing of personal information, even if processing is conducted lawfully, either based on the legal ground of the individual’s consent or justified on another legal basis. The requirement of data quality and the obligation to secure the RFID system against unauthorized interceptions or alterations of data by third parties constitute essential guarantees of fair data processing. Privacy protection in the activation phase of the tag is also ensured by the obligation to inform the tagged individual every time a reading takes place and by the right to verify the accuracy of the tag data, whether stored from the beginning or added at a later date. Finally, the last part of the chapter examines the legal regime of separation between the person and the tag. This phase refers to the termination of the processing either by act of the data subject or by act of the RFID system controller. The focus is given to the exercise of the right to object to the processing of personal data through RFID devices. In this context practical solutions, such as the “tag kill” or “tag sleep” command should be taken into consideration in order to the make the exercise of the right to object feasible.

Author(s):  
William Bülow ◽  
Misse Wester

As information technology is becoming an integral part of modern society, there is a growing concern that too much data containing personal information is stored by different actors in society and that this could potentially be harmful for the individual. The aim of this contribution is to show how the extended use of ICT can affect the individual’s right to privacy and how the public perceives risks to privacy. Three points are raised in this chapter: first, if privacy is important from a philosophical perspective, how is this demonstrated by empirical evidence? Do individuals trust the different actors that control their personal information, and is there a consensus that privacy can and should be compromised in order to reach another value? Second, if compromises in privacy are warranted by increased safety, is this increased security supported by empirical evidence? Third, the authors will argue that privacy can indeed be a means to increase the safety of citizens and that the moral burden of ensuring and protecting privacy is a matter for policy makers, not individuals. In conclusion, the authors suggest that more nuanced discussion on the concepts of privacy and safety should be acknowledged and the importance of privacy must be seen as an important objective in the development and structure of ICT uses.


Information ◽  
2022 ◽  
Vol 13 (1) ◽  
pp. 27
Author(s):  
Diego Garat ◽  
Dina Wonsever

In order to provide open access to data of public interest, it is often necessary to perform several data curation processes. In some cases, such as biological databases, curation involves quality control to ensure reliable experimental support for biological sequence data. In others, such as medical records or judicial files, publication must not interfere with the right to privacy of the persons involved. There are also interventions in the published data with the aim of generating metadata that enable a better experience of querying and navigation. In all cases, the curation process constitutes a bottleneck that slows down general access to the data, so it is of great interest to have automatic or semi-automatic curation processes. In this paper, we present a solution aimed at the automatic curation of our National Jurisprudence Database, with special focus on the process of the anonymization of personal information. The anonymization process aims to hide the names of the participants involved in a lawsuit without losing the meaning of the narrative of facts. In order to achieve this goal, we need, not only to recognize person names but also resolve co-references in order to assign the same label to all mentions of the same person. Our corpus has significant differences in the spelling of person names, so it was clear from the beginning that pre-existing tools would not be able to reach a good performance. The challenge was to find a good way of injecting specialized knowledge about person names syntax while taking profit of previous capabilities of pre-trained tools. We fine-tuned an NER analyzer and we built a clusterization algorithm to solve co-references between named entities. We present our first results, which, for both tasks, are promising: We obtained a 90.21% of F1-micro in the NER task—from a 39.99% score before retraining the same analyzer in our corpus—and a 95.95% ARI score in clustering for co-reference resolution.


Author(s):  
Sam De Silva

Developments in technology and the global nature of business means that personal information about individuals in the UK may often be processed overseas, frequently without the explicit knowledge or consent of those individuals. This raises issues such as the security of such data, who may have access to it and for what purposes and what rights the individual may have to object. The Data Protection Act 1998 provides a standard of protection for personal data, including in respect of personal data that is being transferred outside of the UK. Chapter 18 focus on how a UK data controller (the organisation that controls how and why personal data is processed and is therefore legally responsible for compliance) can fulfil its business and operational requirements in transferring personal data outside the EEA, whilst ensuring legal compliance.


2008 ◽  
pp. 1360-1365
Author(s):  
Tziporah Stern

People have always been concerned about protecting personal information and their right to privacy. It is an age-old concern that is not unique to the Internet. People are concerned with protecting their privacy in various environments, including healthcare, the workplace and e-commerce. However, advances in technology, the Internet, and community networking are bringing this issue to the forefront. With computerized personal data files: a. retrieval of specific records is more rapid; b. personal information can be integrated into a number of different data files; and c. copying, transporting, collecting, storing, and processing large amounts of information are easier.


Author(s):  
Ben Qara Mustafa Aisha

This study aimed to identify the international, regional and even national efforts to protect the rights and privacy of the individual from the impact of informatics, and the extent to which it succeeded in achieving this. To achieve this, the researcher used the analytical method by explaining the new technical challenges to personal data and various legal mechanisms to protect this right. The research was based on an introduction, two papers and a conclusion. The first topic was entitled "What is the privacy of informatics and the dangers it faces in the digital age", while the second topic is devoted to international and regional efforts to protect information privacy. The results of the study showed that most of the legislations, especially the Arab ones, are not able to deal with violations of personal data, and concluded that new legal rules must be enacted to protect information privacy, based on established international principles in the field of informatics.


2021 ◽  
Author(s):  
◽  
Mark Prebble

<p>This thesis considers how best to administer redistribution policies. It focuses particularly on the information needed to assess relative circumstances, the implications of the government collecting such information, and processes by which the appropriate information may be assembled and assessed. In New Zealand, as with many other OECD nations, the Government's redistribution policies are administered through a range of different agencies, with duplication in some areas and gaps in others. An integrated approach to redistribution systems may offer a means to improve equity and efficiency. Part One discusses the assessment of relative well-being, and adopts the choice set as the intellectual device for this purpose. The time period for the assessment of income is examined in detail, with the conclusion that a long period should be used except where the individual is constrained to operate under a short time horizon. A new concept of "bankability" is developed as a means of identifying those operating under such constraints. Part Two uses the philosophical foundations of the value of privacy to develop a new statement of the right to privacy, such that everyone should be protected against the requirement to divulge information, unless that information is the "business" of another party. A view on the business of the state depends on one's ideology of the state. Since it is generally accepted in New Zealand in the late twentieth century that the state has a role in redistribution, the state has some right to collect information for that purpose. However, the rights of the state are moderated by the existence of a common law tradition of respect for individuals. A set of criteria for evaluating redistribution systems is devised in Part Three. These criteria, which include consideration of the information to be collected, individual control over personal information, and administrative simplicity, are then used to identify significant weaknesses in the systems currently used in New Zealand. The main problems identified are the collection of inadequate information, duplication, and complex institutional structures; the main virtue of the current systems is that information provided is only used for the purpose for which it was provided. An alternative approach is outlined which would address the problems while retaining the current protection of privacy interests. This thesis is a mix of inter-disciplinary academic enquiry and policy development. Part One is an amalgam of economic and philosophical approaches, Part Two involves philosophy and politics, and Part Three applies the theoretical considerations to issues of public administration.</p>


2021 ◽  
Author(s):  
◽  
Zuryati Mohamed Yusoff

<p>In Malaysia, the rights and liberties of the individual are recognised in the Federal Constitution of Malaysia. However, the right to privacy does not have the express constitutional recognition enjoyed by other rights such as the right to life and liberty and freedom of expression. This thesis identifies gaps in the protection of privacy interests in the current legal framework. There is no self-standing law on privacy in Malaysia, though there are several laws which provide limited rights to privacy such as the laws on data protection and criminal law. The existing laws are inadequate to protect private information and to protect against the intrusion of privacy. The importation of foreign principles through the reception of English Common Law offers only limited protection. Malaysia should, therefore, have a specific law to protect privacy. With a view to attaining that goal for Malaysia, this thesis undertakes a comparative analysis of two different experiences of the development of the law of privacy. They are the privacy law in England, which is largely based on the law of breach of confidence, and the privacy law in New Zealand, which has a distinct privacy tort recognised in its case law. The conclusion is that those countries’ experience can inform developments in Malaysia, and that the best way for Malaysia to develop its law now is by the enactment of a specific Privacy Act.</p>


2020 ◽  
Vol 24 (4) ◽  
pp. 985-1004
Author(s):  
Anzhelika N. Izotova

The article is devoted to the regulation of communication privacy, which is not only a guarantee of the individual right to confidentiality and privacy, but also a necessary condition for the collective freedom of speech, trust in communication services, which is essential for formation of the information society. The right to communication privacy with the advent of new communication technologies is being transformed and expanded, which requires updating and harmonization of the legal framework. In this regard, the purpose of the research is to reveal problems and contradictions in updating legal regulation of communication privacy, including by analyzing legislation and existent scientific approaches to the content of communication privacy, description of mechanisms for both ensuring and limiting communication privacy, as well as interaction of legal entities regarding communication privacy. The relationship between Russian and European legislation, which regulate communication privacy (ePrivacy) have been considered in this paper. The research methodology is represented by such methods as dialectical, analysis, analogies, formal-legal, comparative methods of research activity. The work demonstrates different approaches to determining the content of the right to communication privacy, expanding the range of professional subjects of communication privacy, and loosening the mechanisms for limiting this right in the direction of its expansion in the context of interrelations between subjects of legal relations concerning communication privacy.


2020 ◽  
Vol 15 (47) ◽  
pp. 5-34
Author(s):  
Marta Mitrović

The paper examines the views of Internet users concerning the protection of their rights on the Internet. The Web survey, conducted by the snowball sampling, included 783 Internet users who expressed their views regarding the ways the state (Serbia) and private agents (Facebook and Google) relate to the right of freedom of expression and privacy on the Internet. Also, the survey was used to examine the individual responsibility of users when it comes to the use of Internet services. Several hypotheses suggested that Internet users in Serbia do not have confidence in the country and private actors on the issue of protecting their rights. However, users also do not demonstrate a satisfactory level of individual responsibility. The most important findings indicate that: 1) only one-sixth of the respondents consider that the Government of the Republic of Serbia does not violate the privacy of Internet users; 2) almost half of the respondents do not feel free to express their views criticizing the government; 3) almost 90% of users are not satisfied how Facebook protects their privacy, while it is 1% lower in the case of Google; 4) a third of respondents answered positively to the question whether they had read terms of use of the analyzed companies, but half of them did not give a correct answer to the main questions; 5) only 8.9% of respondents who claimed to have read terms of use are aware of the fact that Facebook shares their data with third parties.


2020 ◽  
Vol 3 (1) ◽  
pp. 13
Author(s):  
Anggun Putri Ramadhan ◽  
Endang Ruhiyat

Academic cheating, especially those committed by students, is a worrying phenomenon that should not occur. Dishonest behavior is one of the factors causing the fraud. Pressure, opportunity and rationalization are other factors that cause students to cheat. The purpose of this study was to determine the analysis of diamond fraud p, dishonest behavior, and student perceptions influence academic cheating, the control variables used were religiosity and technological progress. This research approach is a mix method (mix methods). The object of research is Pamulang University S1 Accounting Study Program in odd semester 2018/2019 with a sample of 142 people. All questions are submitted via Google Drive. For data processing using SPSS version 22. The result of data processing requires diamond fraud to have a significant positive effect on academic fraud. There are 1.5% of students stating academic cheating related to the absence and collusion during exams, this is due to the pressure and ability of more than the individual student. And 3.9% of students are proven to have plagiarism when e-learning and writing papers, this is done because of the often wrong rationalization of unscrupulous students. Person of the student usually justifies what he usually does not accustom the right. Student perceptions and dishonest behavior did not have a significant effect on academic fraud. Keywords:   Fraud diamond; dishonest behavior; student perception; academic cheating


Sign in / Sign up

Export Citation Format

Share Document