Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar

Slides:



Advertisements
Similar presentations
Acquire foundational knowledge of marketing-information management to understand its nature and scope Marketing Indicator 1.05.
Advertisements

MARKETING INFORMATION AND RESEARCH
ICP 25 CONSUMER PROTECTION Y. Priya Bharat. ICP 25: CONSUMER PROTECTION. Principle: Minimum requirements for Insurers and Intermediaries in dealing with.
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
Challenges & opportunities in Europe Christopher Graham Chairman, EASA.
Last update: 2010 Bringing Smart Policies to Life The basics: Consumer protection.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
How is the IT-Driven Concept of “Permission Marketing” Changing the Way Companies Establish Customer Relationships Using “Old” Media as well as New? By.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
Privacy as an International Information Issue MD823 October 18, 2004.
Privacy as an International Information Issue MD823 September 22, 2003.
Indicator 3.07 Understand the nature of customer relationship management to show its contributions to a company.
3rd Eurasian Corporate Governance Roundtable Shareholder Rights, Equitable Treatment and the Role of the State April 17-18, 2002 hosted by Securities and.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Managing Ethics and Social Responsibility
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
1 CREATING A LEARNING ORGANIZATION AND AN ETHICAL ORGANIZATION STRATEGIC MANAGEMENT BUAD 4980.
Anonymity, Security, Privacy and Civil Liberties
Building User Trust Online Sarah Andrews International Conference on the Legal Aspects of an E-Commerce Transaction The Hague October 2004.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
Section 28.1 Marketing Information Chapter 28 marketing research Section 28.2 Issues in Marketing Research.
MARKETING STRATEGY O.C. FERRELL MICHAEL D. HARTLINE 1 Marketing in the New Economy.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
© 2009 South-Western, Cengage LearningMARKETING 1 Chapter 5 MARKETING INFORMATION AND RESEARCH 5-1Understanding the Need for Market Information 5-2Finding.
Social contexts of IS Ch. 3 – Boddy et al.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Privacy ECT 582 Robin Burke. Outline Homework #6 Privacy basics relationship to security privacy policies and requirements.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
THOMPSON & HENDERSON (2011): CHAPTER 4 Legal and Ethical Considerations for Counselors.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Rethinking a Responsibility In India: a review of Pharmaceutical & Private Healthcare sectors BUSINESSES’ CONTRIBUTION TOWARDS GROWTH & SUSTAINABLE DEVELOPMENT.
CHAPTER 5: Marketing Information & Research Mrs. Piotrowski Principles of Marketing 1.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
The Protection of Personal Information Bill 13 February
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
© 2009 South-Western, Cengage LearningMARKETING 1 Chapter 5 MARKETING INFORMATION AND RESEARCH 5-1Understanding the Need for Market Information 5-2Finding.
Building a common platform for commercial communications education in Europe.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Big Data Analytics: An Ethical Question Leah Korganowski COMP 607 – Fall 2015.
Types of Information Ms Bentil1. Types of Information  There are basically five (5) types of information: a) Public Domain Information b)Private Information.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
MARKETING STRATEGY O.C. FERRELL MICHAEL D. HARTLINE 1 Marketing in the New Economy.
Jim Loter Director of Information Technology
Privacy and the Law.
Getting to the Right Health Information Public Policies
Privacy principles Individual written policies
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Ethical questions on the use of big data in official statistics
Consumer Protection Online
Tools & Approaches for Ongoing Privacy Compliance
Introduction to Health Privacy
Interaction of RFID Technology and Public Policy Rakesh Kumar
Ethical Implications of using Big Data for Official Statistics
Tax Risk Management - Taxpayer Rights and Obligations
Presentation transcript:

Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar Wipro Technologies India

RFID World 2 Privacy Consumer’s Perspective Privacy can be defined as customer’s ability to control the terms under which their personal information is acquired and used (Westin 1967) Business perspective Privacy is about making consumers comfortable disclosing the personal information needed for relationship marketing

RFID World 3 Privacy in context of RFID Some Concerns 1. RFID tags without notice 2. Unauthorized development of detailed profiles 3. Unauthorized third party access 4. Government’s perfect hegemony 5. Redress-al mechanism

RFID World 4 Catherine and RFID Catherine purchases Handbag. Radio tag attached to it (unknown to her) Data Collection 1)Product information 2)Credit Card number 3)Personal information Product Category Product name Product code Unit of measurement Manufacturer’s name Place of manufacture Product information Name Credit Card No. Social Security No. Address Personal Information

RFID World 5 Amalgamation of Transactional and Personal Data Name : Catherine Age : 26 Sex : F Credit Card no.: Social Security no Address Blood Group Insurance Details Credit History Product Category Product Name Product Code Insurance Details Credit History Medical History Data Repository Product Category Product name Product code Unit of measurement Manufacturer’s name Place of manufacture + = Product information Insurance details Credit history Medical history Third Party Repositories + Name Credit Card No. Social Security No. Address Personal Information

RFID World 6 Unauthorized Access and Usage ■ Name : Catherine ■ Age : 26 ■ Sex : F ■ Credit Card no.: ■ Social Security no ■ Address ■ Blood Group ■ Product Name ■ Product Category ■ Product Attributes ■ Insurance details ■ Credit history ■ Medical history Unauthorized Third Party Marketing agencies Data Repository Government

RFID World 7 Paradox 1. To participate in today's marketplace 2. Catherine is willing to make trade-offs 1. Reward Programmes 2. Better Tracking 3. Guarantees 4. Financial Incentives

RFID World 8 Information Type Concern for Privacy Medical Records Financial Information Social Security No Family Records Information Type Purchasing Habits Media Opinions Sensitivity is contextual; that is, what is considered sensitive differs by person and by situation High Concern for Privacy LowHigh Control over Collection and Usage of Information Relationship with the information gatherer and owner Control and Relationship

RFID World 9 Why Policy is important ? 1. If RFID commerce has to realize its full potential! 2. Fundamental shift to a customer-centered world 3. Probability of reengaging customer reduced 4. Conducting business nationally and internationally 5. Infuse trust in public and private institutions

RFID World 10 Basic Building Blocks Integrated approach for framing RFID Public Policy : 1. Technical 2. Industry Self-Regulation ( Mandatory vs. Voluntary) 3. Ethical approach 4. Legislation 5. Branding RFID and 6. Educating Consumers Public Policy Education Technical Self Regulation Ethics Legislation Branding

RFID World 11 Framework for formulating Public Policy Commercial Justification  Cost  Standards  Technology Corporate Codes Formulation of RFID Public Policy Organizational RFID practices:  Data Collection  Access  Security  Dissemination  Secondary use Consumer’s Characteristics w.r.t. RFID privacy: Beliefs Attitudes Experiences Cultural values & trust in Public and Private Institutions Existing Legislations Public Opinion Consumer Expectations

RFID World 12 Framing the RFID Public Policy Policy Questions 1. Definition & role of stake holders 2. Operational features 3. Legal rights 4. Analogies 5. Criteria 6. Research methodology Major Expectations 1.Data collection procedures ( informed vs. un-informed) 2.Authentication 3.Major expectations ( both implicit and explicit) 4.Level of security Major concerns 1.Collection 2.Access 3.Use 4.Exchange 5.Control

RFID World 13 Building Block - Technical 1. The “Kill Tag" approach 2. The Faraday Cage approach 3. The Active Jamming Approach 4. The Smart RFID Tag Approach 5. Selective disclosure of information

RFID World 14 Building Block - The Regulation Approach ■ Self Regulation ♦ Industry Legislation ♦ Enforcement and ♦ Adjudication ■ A pure market approach ■ Legislation Legislation by Law Self Regulation (Voluntary) Self Regulation (Mandatory) Laissez Faire Public Concern about Privacy Public Trust in Institutions Existing Space

RFID World 15 Building Block - Bringing Ethics 1. Respect confidentiality 2. Don't "flame" 3. Don't be anonymous 4. Don't allow third party to access other’s data 5. Don't misrepresent or lie 6. Follow government’s general guidelines 7. Consider presentation of message

RFID World 16 Take Away Notice Enforcement Choice Access Security Public Policy Technical EthicalLegislation Self Regulation Branding RFID Educating Consumers

RFID World 17 Thank You