SlideShare a Scribd company logo
Regulation models
addressing data protection
issues in the EU concerning
RFID technology

             Ioannis Iglezakis
  Assistant Professor in Computers & Law
   Faculty of Law, Aristotle University of
                Thessaloniki
RFID
 Radio frequency identification (RFID) is a
  new technology which uses radio waves
  for the automatic identification of individual
  items and thus, it allows the processing of
  data over short distances
 RFID systems are considered the next
  generation of bar codes
                4TH INTERNATIONAL CONFERENCE
                      ON INFORMATION LAW
                 THESSALONIKI –MAY 20-21, 2011   2
RFID Infrastructure
   Tags




   The tag consists of an electronic circuit that
    stores data and an antenna which transmits the
    data

                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011     3
RFID Infrastructure
   RFID reader




   It has an antenna which receives the data and a
    demodulator.
   The RFID reader sends and receives back signals from
    the tags via one or more antennas and transmits the
    data to databases or software applications.


                    4TH INTERNATIONAL CONFERENCE
                          ON INFORMATION LAW
                     THESSALONIKI –MAY 20-21, 2011         4
Taxonomy of Tags
   passive tags have no own power supply
    and receive energy from the reader
    antenna




                4TH INTERNATIONAL CONFERENCE
                      ON INFORMATION LAW
                 THESSALONIKI –MAY 20-21, 2011   5
Taxonomy of Tags
   active tags have their
    own power supply.




                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   6
RFID systems applications
   Retail Sector
   Transportation
   Logistics
   Healthcare
   Security & access control
   Aviation
   Libraries
   Schools
   Leisure
                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   7
Risks of RFID systems to privacy

   RFID technology enables identification
    and profiling of a person; it may also lead
    to covert monitoring of individuals, which
    infringes informational privacy




                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   8
Risks of RFID systems to privacy
   where RFID systems are implemented in order
    to collect information directly or indirectly linked
    to personal data,
     so e.g., where products from a store are tagged with
      unique product codes which the retailer combines
      with customer names collected upon payment with
      credit cards and link them with the customer
      database.
     also, where personal data is stored in RFID
      tags, so, e.g. in transport ticketing

                    4TH INTERNATIONAL CONFERENCE
                          ON INFORMATION LAW
                     THESSALONIKI –MAY 20-21, 2011           9
Risks of RFID systems to privacy

   Even if the customer is not directly identified by means of
    the tagged card, he can be identified each time he visits
    the same shop as the holder of the card.
   Similarly, an individual can be tracked by shops which
    scan tagged products of customers.
   And further, third parties may use readers to detect
    tagged items of by passers, violating in that way their
    privacy


                      4TH INTERNATIONAL CONFERENCE
                            ON INFORMATION LAW
                       THESSALONIKI –MAY 20-21, 2011         10
Risks of RFID systems to privacy

   RFID tags can be read without line-of-sight
    and from a distance without being noticed
    and therefore, they are prone for
    application by retailers for customer
    profiling, as well as for monitoring for other
    purposes, e.g., for law enforcement
    purposes, etc.

                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011   11
Legal requirements of data protection
with regard to RFID
   Directive 1995/46
     Data  quality principles
     Legitimacy
     Right to information
     Right of Access
     Data Security



                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   12
Legal requirements of data protection
with regard to RFID
   Directive 2002/58 on privacy in
    electronic communications

   It applies “to the processing of
    personal data in connection with the
    provision of publicly available
    electronic communications services
    in public communications networks
    in the Community, including public
    communications networks
    supporting data collection and
    identification devices”.

                     4TH INTERNATIONAL CONFERENCE
                           ON INFORMATION LAW
                      THESSALONIKI –MAY 20-21, 2011   13
Legal requirements of data
protection with regard to RFID
   EU Commission
    Recommendation of May
    12, 2009on the
    implementation of privacy
    and data protection
    principles in applications
    supported by radio-
    frequency identification

                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   14
Regulation vs Self-Regulation
 The PIA Framework that was endorsed by
  the Article 29 Working Party is an
  important instrument
 However, the recommendation on which it
  was based is not mandatory, but it is
  drafted to provide guidance to EU Member
  States on the design and operation of
  RFID applications.
              4TH INTERNATIONAL CONFERENCE
                    ON INFORMATION LAW
               THESSALONIKI –MAY 20-21, 2011   15
Regulation vs Self-Regulation
   To effectively address the data protection
    issues posed by RFID technology requires
    making the PIA process
    mandatory, providing also for the
    notification of its results to the competent
    data protection authorities, which should
    have the right to prior checking of RFID
    systems posing significant privacy risks.
                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   16
Regulation vs Self-Regulation
   Alternatively, the data protection
    legislation could introduce specific rules
    for RFID systems and more
    particularly, rules establishing technical
    solutions, since it is difficult to achieve
    privacy by design by self-regulation


                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011   17

More Related Content

What's hot

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisSMO Clicks
 
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"CNRFID
 
15213897 pss7
15213897 pss715213897 pss7
15213897 pss779831251
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusSubbuBuddu
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications DataAlex G. Lee, Ph.D. Esq. CLP
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
Rfid Applications In Manufacturing Draft 7
Rfid Applications In Manufacturing  Draft 7Rfid Applications In Manufacturing  Draft 7
Rfid Applications In Manufacturing Draft 7laser1971
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
13213164.pps7.ppt
13213164.pps7.ppt13213164.pps7.ppt
13213164.pps7.pptt6165abc
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
 

What's hot (20)

LMS/RFID (Dis)integration: why standards matter
LMS/RFID (Dis)integration: why standards matterLMS/RFID (Dis)integration: why standards matter
LMS/RFID (Dis)integration: why standards matter
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
Frid based final year report
Frid based final year reportFrid based final year report
Frid based final year report
 
12212687
1221268712212687
12212687
 
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
15213897 pss7
15213897 pss715213897 pss7
15213897 pss7
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabus
 
K1103047173
K1103047173K1103047173
K1103047173
 
Vicinity-Future Is RFID
Vicinity-Future Is RFIDVicinity-Future Is RFID
Vicinity-Future Is RFID
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
Rfid Applications In Manufacturing Draft 7
Rfid Applications In Manufacturing  Draft 7Rfid Applications In Manufacturing  Draft 7
Rfid Applications In Manufacturing Draft 7
 
Iaetsd e-passport
Iaetsd e-passportIaetsd e-passport
Iaetsd e-passport
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
200
200200
200
 
13213164.pps7.ppt
13213164.pps7.ppt13213164.pps7.ppt
13213164.pps7.ppt
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 

Viewers also liked

Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Jnasslander
 
Intro to-html-backbone-angular
Intro to-html-backbone-angularIntro to-html-backbone-angular
Intro to-html-backbone-angularzonathen
 
Intro to-html-backbone
Intro to-html-backboneIntro to-html-backbone
Intro to-html-backbonezonathen
 
Linkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundLinkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundJnasslander
 

Viewers also liked (7)

E book competition
E book competitionE book competition
E book competition
 
Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]
 
Intro to-html-backbone-angular
Intro to-html-backbone-angularIntro to-html-backbone-angular
Intro to-html-backbone-angular
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
Intro to-html-backbone
Intro to-html-backboneIntro to-html-backbone
Intro to-html-backbone
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Linkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundLinkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathund
 

Similar to Papers 201 iglezakis-presentation-en-v001

PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSPRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSCNRFID
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxnettletondevon
 
Radio-frequency_identification‎
Radio-frequency_identification‎ Radio-frequency_identification‎
Radio-frequency_identification‎ Mubashir Hassan
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
ANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfmukhtaransarcloth
 
Rfid article
Rfid articleRfid article
Rfid articletrangbk
 
License-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal NetworksLicense-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal NetworksMatthieu Schapranow
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectA Singh
 
The future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalThe future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalBrian Berger
 
The future is now final
The future is now finalThe future is now final
The future is now finalBrian Berger
 
RFID_version 3.0
RFID_version 3.0RFID_version 3.0
RFID_version 3.0Quach Vu
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 

Similar to Papers 201 iglezakis-presentation-en-v001 (20)

PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSPRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONS
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
 
Radio-frequency_identification‎
Radio-frequency_identification‎ Radio-frequency_identification‎
Radio-frequency_identification‎
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
ANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdf
 
Rfid article
Rfid articleRfid article
Rfid article
 
License-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal NetworksLicense-based Access Control in EPCglobal Networks
License-based Access Control in EPCglobal Networks
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
RFID
RFID RFID
RFID
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_Project
 
The future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalThe future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-final
 
The future is now final
The future is now finalThe future is now final
The future is now final
 
RFID_version 3.0
RFID_version 3.0RFID_version 3.0
RFID_version 3.0
 
RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 

More from ioannis iglezakis

Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile appsioannis iglezakis
 
τεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωντεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωνioannis iglezakis
 
Κανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας ΔεδομενωνΚανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας Δεδομενωνioannis iglezakis
 
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνεξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνioannis iglezakis
 
Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος ioannis iglezakis
 
Δυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουΔυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουioannis iglezakis
 
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδατο νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδαioannis iglezakis
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start upsioannis iglezakis
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...ioannis iglezakis
 
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...ioannis iglezakis
 
Elektronischer Geschäftsverkehr
Elektronischer GeschäftsverkehrElektronischer Geschäftsverkehr
Elektronischer Geschäftsverkehrioannis iglezakis
 

More from ioannis iglezakis (12)

Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile apps
 
τεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωντεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριων
 
Κανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας ΔεδομενωνΚανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας Δεδομενων
 
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνεξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
 
Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος
 
Δυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουΔυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύου
 
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδατο νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
 
Hate speech on the internet
Hate speech on the internetHate speech on the internet
Hate speech on the internet
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start ups
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
 
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
 
Elektronischer Geschäftsverkehr
Elektronischer GeschäftsverkehrElektronischer Geschäftsverkehr
Elektronischer Geschäftsverkehr
 

Recently uploaded

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdcreerey
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxWorkforce Group
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesDragon Dream Bar
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographerofm712785
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraShajara Artificial Plants
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceDragon Dream Bar
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxSymbio Agency Ltd
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback AnalysisSafe PaaS
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfHenry Tapper
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdfDerekIwanaka1
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterNathanBaughman3
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiaFalcon Invoice Discounting
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfsuperbizness1227
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfinsightssuccess2
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.FelixPerez547899
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...Khaled Al Awadi
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon investment
 

Recently uploaded (20)

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdf
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdf
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 

Papers 201 iglezakis-presentation-en-v001

  • 1. Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty of Law, Aristotle University of Thessaloniki
  • 2. RFID  Radio frequency identification (RFID) is a new technology which uses radio waves for the automatic identification of individual items and thus, it allows the processing of data over short distances  RFID systems are considered the next generation of bar codes 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 2
  • 3. RFID Infrastructure  Tags  The tag consists of an electronic circuit that stores data and an antenna which transmits the data 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 3
  • 4. RFID Infrastructure  RFID reader  It has an antenna which receives the data and a demodulator.  The RFID reader sends and receives back signals from the tags via one or more antennas and transmits the data to databases or software applications. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 4
  • 5. Taxonomy of Tags  passive tags have no own power supply and receive energy from the reader antenna 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 5
  • 6. Taxonomy of Tags  active tags have their own power supply. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 6
  • 7. RFID systems applications  Retail Sector  Transportation  Logistics  Healthcare  Security & access control  Aviation  Libraries  Schools  Leisure 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 7
  • 8. Risks of RFID systems to privacy  RFID technology enables identification and profiling of a person; it may also lead to covert monitoring of individuals, which infringes informational privacy 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 8
  • 9. Risks of RFID systems to privacy  where RFID systems are implemented in order to collect information directly or indirectly linked to personal data,  so e.g., where products from a store are tagged with unique product codes which the retailer combines with customer names collected upon payment with credit cards and link them with the customer database.  also, where personal data is stored in RFID tags, so, e.g. in transport ticketing 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 9
  • 10. Risks of RFID systems to privacy  Even if the customer is not directly identified by means of the tagged card, he can be identified each time he visits the same shop as the holder of the card.  Similarly, an individual can be tracked by shops which scan tagged products of customers.  And further, third parties may use readers to detect tagged items of by passers, violating in that way their privacy 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 10
  • 11. Risks of RFID systems to privacy  RFID tags can be read without line-of-sight and from a distance without being noticed and therefore, they are prone for application by retailers for customer profiling, as well as for monitoring for other purposes, e.g., for law enforcement purposes, etc. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 11
  • 12. Legal requirements of data protection with regard to RFID  Directive 1995/46  Data quality principles  Legitimacy  Right to information  Right of Access  Data Security 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 12
  • 13. Legal requirements of data protection with regard to RFID  Directive 2002/58 on privacy in electronic communications  It applies “to the processing of personal data in connection with the provision of publicly available electronic communications services in public communications networks in the Community, including public communications networks supporting data collection and identification devices”. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 13
  • 14. Legal requirements of data protection with regard to RFID  EU Commission Recommendation of May 12, 2009on the implementation of privacy and data protection principles in applications supported by radio- frequency identification 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 14
  • 15. Regulation vs Self-Regulation  The PIA Framework that was endorsed by the Article 29 Working Party is an important instrument  However, the recommendation on which it was based is not mandatory, but it is drafted to provide guidance to EU Member States on the design and operation of RFID applications. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 15
  • 16. Regulation vs Self-Regulation  To effectively address the data protection issues posed by RFID technology requires making the PIA process mandatory, providing also for the notification of its results to the competent data protection authorities, which should have the right to prior checking of RFID systems posing significant privacy risks. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 16
  • 17. Regulation vs Self-Regulation  Alternatively, the data protection legislation could introduce specific rules for RFID systems and more particularly, rules establishing technical solutions, since it is difficult to achieve privacy by design by self-regulation 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 17