SlideShare a Scribd company logo
1 of 17
Regulation models
addressing data protection
issues in the EU concerning
RFID technology

             Ioannis Iglezakis
  Assistant Professor in Computers & Law
   Faculty of Law, Aristotle University of
                Thessaloniki
RFID
 Radio frequency identification (RFID) is a
  new technology which uses radio waves
  for the automatic identification of individual
  items and thus, it allows the processing of
  data over short distances
 RFID systems are considered the next
  generation of bar codes
                4TH INTERNATIONAL CONFERENCE
                      ON INFORMATION LAW
                 THESSALONIKI –MAY 20-21, 2011   2
RFID Infrastructure
   Tags




   The tag consists of an electronic circuit that
    stores data and an antenna which transmits the
    data

                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011     3
RFID Infrastructure
   RFID reader




   It has an antenna which receives the data and a
    demodulator.
   The RFID reader sends and receives back signals from
    the tags via one or more antennas and transmits the
    data to databases or software applications.


                    4TH INTERNATIONAL CONFERENCE
                          ON INFORMATION LAW
                     THESSALONIKI –MAY 20-21, 2011         4
Taxonomy of Tags
   passive tags have no own power supply
    and receive energy from the reader
    antenna




                4TH INTERNATIONAL CONFERENCE
                      ON INFORMATION LAW
                 THESSALONIKI –MAY 20-21, 2011   5
Taxonomy of Tags
   active tags have their
    own power supply.




                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   6
RFID systems applications
   Retail Sector
   Transportation
   Logistics
   Healthcare
   Security & access control
   Aviation
   Libraries
   Schools
   Leisure
                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   7
Risks of RFID systems to privacy

   RFID technology enables identification
    and profiling of a person; it may also lead
    to covert monitoring of individuals, which
    infringes informational privacy




                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   8
Risks of RFID systems to privacy
   where RFID systems are implemented in order
    to collect information directly or indirectly linked
    to personal data,
     so e.g., where products from a store are tagged with
      unique product codes which the retailer combines
      with customer names collected upon payment with
      credit cards and link them with the customer
      database.
     also, where personal data is stored in RFID
      tags, so, e.g. in transport ticketing

                    4TH INTERNATIONAL CONFERENCE
                          ON INFORMATION LAW
                     THESSALONIKI –MAY 20-21, 2011           9
Risks of RFID systems to privacy

   Even if the customer is not directly identified by means of
    the tagged card, he can be identified each time he visits
    the same shop as the holder of the card.
   Similarly, an individual can be tracked by shops which
    scan tagged products of customers.
   And further, third parties may use readers to detect
    tagged items of by passers, violating in that way their
    privacy


                      4TH INTERNATIONAL CONFERENCE
                            ON INFORMATION LAW
                       THESSALONIKI –MAY 20-21, 2011         10
Risks of RFID systems to privacy

   RFID tags can be read without line-of-sight
    and from a distance without being noticed
    and therefore, they are prone for
    application by retailers for customer
    profiling, as well as for monitoring for other
    purposes, e.g., for law enforcement
    purposes, etc.

                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011   11
Legal requirements of data protection
with regard to RFID
   Directive 1995/46
     Data  quality principles
     Legitimacy
     Right to information
     Right of Access
     Data Security



                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   12
Legal requirements of data protection
with regard to RFID
   Directive 2002/58 on privacy in
    electronic communications

   It applies “to the processing of
    personal data in connection with the
    provision of publicly available
    electronic communications services
    in public communications networks
    in the Community, including public
    communications networks
    supporting data collection and
    identification devices”.

                     4TH INTERNATIONAL CONFERENCE
                           ON INFORMATION LAW
                      THESSALONIKI –MAY 20-21, 2011   13
Legal requirements of data
protection with regard to RFID
   EU Commission
    Recommendation of May
    12, 2009on the
    implementation of privacy
    and data protection
    principles in applications
    supported by radio-
    frequency identification

                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   14
Regulation vs Self-Regulation
 The PIA Framework that was endorsed by
  the Article 29 Working Party is an
  important instrument
 However, the recommendation on which it
  was based is not mandatory, but it is
  drafted to provide guidance to EU Member
  States on the design and operation of
  RFID applications.
              4TH INTERNATIONAL CONFERENCE
                    ON INFORMATION LAW
               THESSALONIKI –MAY 20-21, 2011   15
Regulation vs Self-Regulation
   To effectively address the data protection
    issues posed by RFID technology requires
    making the PIA process
    mandatory, providing also for the
    notification of its results to the competent
    data protection authorities, which should
    have the right to prior checking of RFID
    systems posing significant privacy risks.
                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   16
Regulation vs Self-Regulation
   Alternatively, the data protection
    legislation could introduce specific rules
    for RFID systems and more
    particularly, rules establishing technical
    solutions, since it is difficult to achieve
    privacy by design by self-regulation


                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011   17

More Related Content

What's hot

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisSMO Clicks
 
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"CNRFID
 
15213897 pss7
15213897 pss715213897 pss7
15213897 pss779831251
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusSubbuBuddu
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications DataAlex G. Lee, Ph.D. Esq. CLP
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
Rfid Applications In Manufacturing Draft 7
Rfid Applications In Manufacturing  Draft 7Rfid Applications In Manufacturing  Draft 7
Rfid Applications In Manufacturing Draft 7laser1971
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
13213164.pps7.ppt
13213164.pps7.ppt13213164.pps7.ppt
13213164.pps7.pptt6165abc
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
 

What's hot (20)

LMS/RFID (Dis)integration: why standards matter
LMS/RFID (Dis)integration: why standards matterLMS/RFID (Dis)integration: why standards matter
LMS/RFID (Dis)integration: why standards matter
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
Frid based final year report
Frid based final year reportFrid based final year report
Frid based final year report
 
12212687
1221268712212687
12212687
 
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
15213897 pss7
15213897 pss715213897 pss7
15213897 pss7
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabus
 
K1103047173
K1103047173K1103047173
K1103047173
 
Vicinity-Future Is RFID
Vicinity-Future Is RFIDVicinity-Future Is RFID
Vicinity-Future Is RFID
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
Rfid Applications In Manufacturing Draft 7
Rfid Applications In Manufacturing  Draft 7Rfid Applications In Manufacturing  Draft 7
Rfid Applications In Manufacturing Draft 7
 
Iaetsd e-passport
Iaetsd e-passportIaetsd e-passport
Iaetsd e-passport
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
200
200200
200
 
13213164.pps7.ppt
13213164.pps7.ppt13213164.pps7.ppt
13213164.pps7.ppt
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 

Viewers also liked

Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Jnasslander
 
Intro to-html-backbone-angular
Intro to-html-backbone-angularIntro to-html-backbone-angular
Intro to-html-backbone-angularzonathen
 
Intro to-html-backbone
Intro to-html-backboneIntro to-html-backbone
Intro to-html-backbonezonathen
 
Linkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundLinkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundJnasslander
 

Viewers also liked (7)

E book competition
E book competitionE book competition
E book competition
 
Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]
 
Intro to-html-backbone-angular
Intro to-html-backbone-angularIntro to-html-backbone-angular
Intro to-html-backbone-angular
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
Intro to-html-backbone
Intro to-html-backboneIntro to-html-backbone
Intro to-html-backbone
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Linkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundLinkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathund
 

Similar to Papers 201 iglezakis-presentation-en-v001

PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSPRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSCNRFID
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxnettletondevon
 
Radio-frequency_identification‎
Radio-frequency_identification‎ Radio-frequency_identification‎
Radio-frequency_identification‎ Mubashir Hassan
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
ANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfmukhtaransarcloth
 
Rfid article
Rfid articleRfid article
Rfid articletrangbk
 
License-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal NetworksLicense-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal NetworksMatthieu Schapranow
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectA Singh
 
The future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalThe future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalBrian Berger
 
The future is now final
The future is now finalThe future is now final
The future is now finalBrian Berger
 
RFID_version 3.0
RFID_version 3.0RFID_version 3.0
RFID_version 3.0Quach Vu
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 

Similar to Papers 201 iglezakis-presentation-en-v001 (20)

PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSPRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
 
Radio-frequency_identification‎
Radio-frequency_identification‎ Radio-frequency_identification‎
Radio-frequency_identification‎
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
ANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdf
 
Rfid article
Rfid articleRfid article
Rfid article
 
License-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal NetworksLicense-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal Networks
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
RFID
RFID RFID
RFID
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_Project
 
The future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalThe future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-final
 
The future is now final
The future is now finalThe future is now final
The future is now final
 
RFID_version 3.0
RFID_version 3.0RFID_version 3.0
RFID_version 3.0
 
RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 

More from ioannis iglezakis

Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile appsioannis iglezakis
 
τεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωντεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωνioannis iglezakis
 
Κανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας ΔεδομενωνΚανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας Δεδομενωνioannis iglezakis
 
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνεξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνioannis iglezakis
 
Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος ioannis iglezakis
 
Δυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουΔυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουioannis iglezakis
 
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδατο νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδαioannis iglezakis
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start upsioannis iglezakis
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...ioannis iglezakis
 
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...ioannis iglezakis
 
Elektronischer Geschäftsverkehr
Elektronischer GeschäftsverkehrElektronischer Geschäftsverkehr
Elektronischer Geschäftsverkehrioannis iglezakis
 

More from ioannis iglezakis (12)

Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile apps
 
τεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωντεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριων
 
Κανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας ΔεδομενωνΚανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας Δεδομενων
 
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνεξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
 
Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος
 
Δυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουΔυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύου
 
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδατο νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
 
Hate speech on the internet
Hate speech on the internetHate speech on the internet
Hate speech on the internet
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start ups
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
 
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
 
Elektronischer Geschäftsverkehr
Elektronischer GeschäftsverkehrElektronischer Geschäftsverkehr
Elektronischer Geschäftsverkehr
 

Recently uploaded

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 

Recently uploaded (20)

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 

Papers 201 iglezakis-presentation-en-v001

  • 1. Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty of Law, Aristotle University of Thessaloniki
  • 2. RFID  Radio frequency identification (RFID) is a new technology which uses radio waves for the automatic identification of individual items and thus, it allows the processing of data over short distances  RFID systems are considered the next generation of bar codes 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 2
  • 3. RFID Infrastructure  Tags  The tag consists of an electronic circuit that stores data and an antenna which transmits the data 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 3
  • 4. RFID Infrastructure  RFID reader  It has an antenna which receives the data and a demodulator.  The RFID reader sends and receives back signals from the tags via one or more antennas and transmits the data to databases or software applications. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 4
  • 5. Taxonomy of Tags  passive tags have no own power supply and receive energy from the reader antenna 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 5
  • 6. Taxonomy of Tags  active tags have their own power supply. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 6
  • 7. RFID systems applications  Retail Sector  Transportation  Logistics  Healthcare  Security & access control  Aviation  Libraries  Schools  Leisure 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 7
  • 8. Risks of RFID systems to privacy  RFID technology enables identification and profiling of a person; it may also lead to covert monitoring of individuals, which infringes informational privacy 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 8
  • 9. Risks of RFID systems to privacy  where RFID systems are implemented in order to collect information directly or indirectly linked to personal data,  so e.g., where products from a store are tagged with unique product codes which the retailer combines with customer names collected upon payment with credit cards and link them with the customer database.  also, where personal data is stored in RFID tags, so, e.g. in transport ticketing 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 9
  • 10. Risks of RFID systems to privacy  Even if the customer is not directly identified by means of the tagged card, he can be identified each time he visits the same shop as the holder of the card.  Similarly, an individual can be tracked by shops which scan tagged products of customers.  And further, third parties may use readers to detect tagged items of by passers, violating in that way their privacy 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 10
  • 11. Risks of RFID systems to privacy  RFID tags can be read without line-of-sight and from a distance without being noticed and therefore, they are prone for application by retailers for customer profiling, as well as for monitoring for other purposes, e.g., for law enforcement purposes, etc. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 11
  • 12. Legal requirements of data protection with regard to RFID  Directive 1995/46  Data quality principles  Legitimacy  Right to information  Right of Access  Data Security 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 12
  • 13. Legal requirements of data protection with regard to RFID  Directive 2002/58 on privacy in electronic communications  It applies “to the processing of personal data in connection with the provision of publicly available electronic communications services in public communications networks in the Community, including public communications networks supporting data collection and identification devices”. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 13
  • 14. Legal requirements of data protection with regard to RFID  EU Commission Recommendation of May 12, 2009on the implementation of privacy and data protection principles in applications supported by radio- frequency identification 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 14
  • 15. Regulation vs Self-Regulation  The PIA Framework that was endorsed by the Article 29 Working Party is an important instrument  However, the recommendation on which it was based is not mandatory, but it is drafted to provide guidance to EU Member States on the design and operation of RFID applications. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 15
  • 16. Regulation vs Self-Regulation  To effectively address the data protection issues posed by RFID technology requires making the PIA process mandatory, providing also for the notification of its results to the competent data protection authorities, which should have the right to prior checking of RFID systems posing significant privacy risks. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 16
  • 17. Regulation vs Self-Regulation  Alternatively, the data protection legislation could introduce specific rules for RFID systems and more particularly, rules establishing technical solutions, since it is difficult to achieve privacy by design by self-regulation 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 17