Shopping Cart

No products in the cart.

BSI PD CEN/TR 16673:2014

$167.15

Information technology. RFID privacy impact assessment analysis for specific sectors

Published By Publication Date Number of Pages
BSI 2014 42
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

The scope of this Technical Report is to use the RFID PIA Framework as the basis for exploring issues with four major sectors involved with RFID:

  • libraries;

  • retail;

  • e-Ticketing, toll roads, fee collection, events management;

  • banking and financial services.

After specific sector research and consolidation of the results of industry workshops and seminars that take place in several EU Member States, this Technical Report will identify the characteristics that need to be taken into consideration by operators of RFID systems in the example sectors. In addition it will provide advice to operators in the sector on significant variants both in terms of technology and application data. This will enable the appropriate risk factors to be taken into account.

Based on the synthesis of the applications in the chosen sectors, this Technical Report will also identify a set of factors relevant to specific RFID technologies and features that will need to be taken into account in preparing a Privacy and Data Protection Impact Assessment for many RFID applications.

PDF Catalog

PDF Pages PDF Title
6 Foreword
7 Introduction
8 1 Scope
2 Terms and definitions
10 3 Symbols and abbreviations
11 4 Brief description of an RFID system
4.1 Infrastructure of an RFID system
4.2 Components of an RFID system
4.2.1 Transponder/Tag
12 4.2.2 RFID reader or writer
4.2.3 Backend system
4.3 Characteristics of RFID technology compared to other data capture techniques
13 5 Privacy concept in RFID-based applications
5.1 Interaction between data protection, data security and privacy
14 5.2 Data protection
15 5.3 Data security
5.4 Privacy
5.5 General privacy risks
16 5.6 Challenges for a privacy concept in context with RFID
17 5.7 Need for transparency
6 Library sector overview
6.1 Aspects of the library sector
18 6.2 RFID technology overview
19 6.3 Applications and parties involved
20 6.4 Privacy considerations
6.4.1 Privacy of possession
6.4.2 Privacy of personal data in the central system
21 6.4.3 The impact of NFC-enabled phones
6.5 Prospects for PIA templates
22 7 Retail sector overview
7.1 Aspects of the retail sector
23 7.2 RFID Technology Overview
7.3 Applications and parties involved
7.3.1 General
7.3.2 Use of RFID in retail logistics
24 7.3.3 The role of the solution provider
7.3.4 Impact of RFID technology for the consumer
25 7.4 Privacy considerations
27 7.5 Technological prospects for privacy enhancements
8 Transport sector overview
8.1 Aspects of the transport sector
8.2 RFID Technology Overview
28 8.3 Applications and parties involved
8.3.1 General
8.3.2 Types of tickets, features and characteristics
29 8.3.3 Characteristics of automatic fare calculation
8.3.4 Sales channels and their impact on the products
8.3.4.1 General
8.3.4.2 Sale by personnel
30 8.3.4.3 Sale by fixed and mobile vending machines
8.3.4.4 Sale by internet
31 8.4 Privacy considerations
8.5 Other applications not covered in detail
8.5.1 General
8.5.2 Toll roads and fee collection using RFID
32 8.5.3 Event management using RFID
9 Banking and financial services sector overview
9.1 Aspects of the finance sector
33 9.2 RFID Technology Overview
9.2.1 General
34 9.2.2 Contactless payment cards
9.2.3 NFC based payment by mobile phones
9.2.4 Micro-tags or stick-on-tags
9.3 Applications and parties involved
9.4 Privacy considerations
9.4.1 General
35 9.4.2 Security of contactless payment cards
9.4.3 Organizations
9.4.3.1 General
9.4.3.2 Payment Card Industry (PCI)
36 9.4.3.3 EMV Co.
9.4.4 Impact of privacy in the banking and finance sector
9.4.5 Vulnerabilities
37 9.4.6 Transparency, consumer information, commercial confidentiality and security
9.4.7 Implications for the PIA
38 10 Conclusion and recommendations
10.1 Diversity of RFID based applications
10.2 Benefits of and recommendation for sector or application specific templates
39 10.3 Recommendation for a general approach to PIA
40 Bibliography
BSI PD CEN/TR 16673:2014
$167.15