Interaction of RFID Technology and Public Policy Presentation at - - PowerPoint PPT Presentation

interaction of rfid technology and public policy
SMART_READER_LITE
LIVE PREVIEW

Interaction of RFID Technology and Public Policy Presentation at - - PowerPoint PPT Presentation

Interaction of RFID Technology and Public Policy Presentation at RFID Privacy Workshop @ MIT 15 TH November 2003 By Rakesh Kumar Wipro Technologies India Privacy Consumers Perspective Privacy can be defined as customers ability to


slide-1
SLIDE 1

Interaction of RFID Technology and Public Policy

Presentation at RFID Privacy Workshop @ MIT 15TH November 2003

By

Rakesh Kumar

Wipro Technologies India

slide-2
SLIDE 2

2

RFID World

Privacy

Consumer’s Perspective Privacy can be defined as customer’s ability to control the terms under which their personal information is acquired and used (Westin 1967) Business perspective Privacy is about making consumers comfortable disclosing the personal information needed for relationship marketing

slide-3
SLIDE 3

3

RFID World

Privacy in context of RFID

Some Concerns

  • 1. RFID tags without notice
  • 2. Unauthorized development of detailed

profiles

  • 3. Unauthorized third party access
  • 4. Government’s perfect hegemony
  • 5. Redress-al mechanism
slide-4
SLIDE 4

4

RFID World

Catherine and RFID

Catherine purchases

  • Handbag. Radio

tag attached to it (unknown to her)

Data Collection

1) Product information 2) Credit Card number 3) Personal information Product Category Product name Product code Unit of measurement Manufacturer’s name Place of manufacture Product information Name Credit Card No. Social Security No. Address Personal Information

slide-5
SLIDE 5

5

RFID World

Amalgamation of Transactional and Personal Data

Name : Catherine Age : 26 Sex : F Credit Card no.: Social Security no Address Blood Group Insurance Details Credit History Product Category Product Name Product Code Insurance Details Credit History Medical History

Data Repository

Product Category Product name Product code Unit of measurement Manufacturer’s name Place of manufacture

+ =

Product information

Insurance details Credit history Medical history

Third Party Repositories

+

Name Credit Card No. Social Security No. Address Personal Information

slide-6
SLIDE 6

6

RFID World

Unauthorized Access and Usage

Name : Catherine

Age : 26

Sex : F

Credit Card no.:

Social Security no

Address

Blood Group

Product Name

Product Category

Product Attributes

Insurance details

Credit history

Medical history

Unauthorized Third Party Marketing agencies

Data Repository

Government

slide-7
SLIDE 7

7

RFID World

Paradox

1.

To participate in today's marketplace

2.

Catherine is willing to make trade-offs

  • 1. Reward Programmes
  • 2. Better Tracking
  • 3. Guarantees
  • 4. Financial Incentives
slide-8
SLIDE 8

8

RFID World

Information Type

Concern for Privacy Medical Records Financial Information Social Security No Family Records Information Type Purchasing Habits Media Opinions Sensitivity is contextual; that is, what is considered sensitive differs by person and by situation

High Concern for Privacy Low High C

  • n

t r

  • l
  • v

e r C

  • l

l e c t i

  • n

a n d U s a g e

  • f

I n f

  • r

m a t i

  • n

Relationship with the information gatherer and owner Control and Relationship

slide-9
SLIDE 9

9

RFID World

Why Policy is important ?

1.

If RFID commerce has to realize its full potential!

2.

Fundamental shift to a customer-centered world

3.

Probability of reengaging customer reduced

4.

Conducting business nationally and internationally

5.

Infuse trust in public and private institutions

slide-10
SLIDE 10

10

RFID World

Basic Building Blocks

Integrated approach for framing RFID Public Policy :

  • 1. Technical
  • 2. Industry Self-Regulation ( Mandatory vs. Voluntary)
  • 3. Ethical approach
  • 4. Legislation
  • 5. Branding RFID and
  • 6. Educating Consumers

Public Policy Education Technical Self Regulation Ethics Legislation Branding

slide-11
SLIDE 11

11

RFID World

Framework for formulating Public Policy

Commercial Justification Cost Standards Technology Corporate Codes Formulation of RFID Public Policy Organizational RFID practices: Data Collection Access Security Dissemination Secondary use Consumer’s Characteristics w.r.t. RFID privacy:

  • Beliefs
  • Attitudes
  • Experiences

Cultural values & trust in Public and Private Institutions Existing

  • Legislations
  • Public Opinion

Consumer Expectations

slide-12
SLIDE 12

12

RFID World

Framing the RFID Public Policy

Policy Questions

1.

Definition & role of stake holders

2.

Operational features

3.

Legal rights

4.

Analogies

5.

Criteria

6.

Research methodology

Major Expectations

1. Data collection procedures ( informed vs. un-informed) 2. Authentication 3. Major expectations ( both implicit and explicit) 4. Level of security

Major concerns

1. Collection 2. Access 3. Use 4. Exchange 5. Control

slide-13
SLIDE 13

13

RFID World

Building Block - Technical

1.

The “Kill Tag" approach

2.

The Faraday Cage approach

3.

The Active Jamming Approach

4.

The Smart RFID Tag Approach

5.

Selective disclosure of information

slide-14
SLIDE 14

14

RFID World

Building Block - The Regulation Approach

Self Regulation

Industry Legislation

Enforcement and

Adjudication

A pure market approach

Legislation

Legislation by Law Self Regulation (Voluntary) Self Regulation (Mandatory) Laissez Faire Public Concern about Privacy Public Trust in Institutions Existing Space

slide-15
SLIDE 15

15

RFID World

Building Block - Bringing Ethics

1.

Respect confidentiality

2.

Don't "flame"

3.

Don't be anonymous

4.

Don't allow third party to access other’s data

5.

Don't misrepresent or lie

6.

Follow government’s general guidelines

7.

Consider presentation of message

slide-16
SLIDE 16

16

RFID World

Take Away

Notice Enforcement Choice A c c e s s S e c u r i t y

Public Policy

Technical Ethical Legislation Self Regulation

Branding RFID Educating Consumers

slide-17
SLIDE 17

17

RFID World

Thank You