Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Slides:



Advertisements
Similar presentations
Dr. Vinod Chachra Chairman, NISO Working Group on Library Applications of RFID CEO, VTLS Inc. A Report on NISOs work on RFID Standards in Libraries ALA.
Advertisements

RFID and the UK Book Trade Brian Green BIC / EDItEUR.
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
WP4 – Task 4.4 LCA Activities
Review Questions Business 205
Overview of IS Controls, Auditing, and Security Fall 2005.
3M Library Systems © 3M All Rights Reserved. RFID Education series of Whitepapers.
General Financial Supply Website & E-Commerce Solutions This presentation will demo the GFS corporate website and On-Line Order Inquiry options available.
RFID & III API MENA IUG 3rd Annual Meeting November 18 – 19, 2008 American University of Sharjah United Arab Emirates Huguette Yaghmour Director of Library.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Tuesday 13 November The QEII Conference Centre, Westminster, London SPONSORED BY SUPPORTED BYMEDIA SPONSORS PRESENTED BY Standards and Interoperability.
ISO 9001 Interpretation : Exclusions
Computer Security: Principles and Practice
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
October 05 Standards. October My own lesson in RFID standardization.
ASPEC Internal Auditor Training Version
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
LMS/RFID (Dis)integration Why Standards Matter Mick Fortune.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
IT CAREERS Prepared by: Careene McCallum-Rodney. Computer Technician  Computer technicians:  install,  repair,  maintain,  and analyze many different.
Internal Auditing and Outsourcing
RFID and LMS: improving interoperability Mick Fortune, 2CQR.
Information Asset Classification
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Introduction to Software Quality Assurance (SQA)
Information Systems Security Computer System Life Cycle Security.
The physical parts of a computer are called hardware.
Information ITIL Technology Infrastructure Library ITIL.
1 Quality Assurance In moving information from statistical programs into the hands of users we have to guard against the introduction of error. Quality.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
ISBN-13 An Overview. ACTS – Biloxi - July 25, About BISG Industry-wide trade association for policy, standards, and research, composed of: Publishers.
ISO 9000 & TOTAL QUALITY ISO 9000 refers to a group of quality assurance standards established by the International Organization for Standardization.This.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Concepts and phrases From ODLIS (Online Dictionary of Library and Information Science)
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
As implemented in Memorial University Libraries Louise White SAIL Conference May 2015, St. John’s NL DEMAND DRIVEN ACQUISITION (DDA)
1-1 System Development Process System development process – a set of activities, methods, best practices, deliverables, and automated tools that stakeholders.
Information: Policy, Strategy and Systems Module Overview
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Chapter 13: Marketing Channels 1 Copyright Cengage Learning 2013 All Rights Reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Copyright 2010, The World Bank Group. All Rights Reserved. Recommended Tabulations and Dissemination Section B.
Legal Issues with Cataloging Supplied by MARCIVE Joan Chapa.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Project management Topic 8 Configuration Management.
4 Mar 2004http:// VERS: Victorian Electronic Record Strategy Digital Preservation Seminar ODU Spring 2004.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Integrated ISO ILL for staff users Borrowing requests – part two Yoel Kortick 2007.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Information ITIL Technology Infrastructure Library ITIL.
Security Development Lifecycle (SDL) Overview
Software Quality Control and Quality Assurance: Introduction
Providing Access to Your Data: Handling sensitive data
Radio Frequency Identification (RFID)
UNIT V QUALITY SYSTEMS.
An Overview of MPEG-21 Cory McKay.
Systems Analysis and Design
Business Process Management
PLANNING A SECURE BASELINE INSTALLATION
TECHNOLOGY ASSESSMENT
Presentation transcript:

Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC, June 23, 2007

Visionary Technology in Library Solutions NISO RFID Working Group Following types of organizations are participating in the working group: 1. RFID hardware manufacturers 2. RFID solution providers (software and integration) 3. RFID Library users 4. Book jobbers/ book processors 5. Other related organizations

Visionary Technology in Library Solutions Working Group Members Livia Bitner, Baker & Taylor Vinod Chachra, VTLS – Committee Chairman Brian Green, EDItEUR Jim Litchenberg, BISG Alastair McArthur, Tagsys Allan McWilliams, Baltimore County Public Library Louise Schaper, Fayetteville Public Library Paul Sevcik, 3M Paul Simon, Checkpoint Rick Weingarten, ALA Marty Withrow, OCLC

Visionary Technology in Library Solutions Scope of NISO RFID Working Group RFID solutions run at several frequencies – Low – from 125KHz to 134KHz High – 13.56MHz Ultra High – MHz Micro Wave – 2.45 GHz NISO ’ s work is limited to Tags used in libraries Note: At present, these tags operate at MHz, though this may change in the future

Visionary Technology in Library Solutions Goals of NISO RFID Working Group To review existing RFID standards… and promote its use where appropriate; To examine and assess privacy concerns; To investigate the way RFID is used in the United States and identify best practices in standards development and implementation; To focus on security and data models for RFID tags, along with issues of interoperability and privacy; To create a “best practices” document for libraries … and help safeguard library investments in RFID and minimize the cost of obsolescence.

Visionary Technology in Library Solutions Functions Examined Supply Chain Tracking Item Level Tagging Carton Level Tagging Application of tags by book jobbers Application of tags by libraries Self Checkout Stations Book drops Sortation systems Inventory systems Media tagging ILL functions

Visionary Technology in Library Solutions Functions Examined Supply Chain Tracking Item Level Tagging Carton Level Tagging Application of tags by book jobbers Application of tags by libraries Self Checkout Stations Book drops Sortation systems Inventory systems Media tagging ILL functions

Visionary Technology in Library Solutions The Book The Publisher The Jobber The Library Library Applied RFID Tags Library applies proprietary tag and programs RFID tag with proprietary conversion station for use in library applications Barcode contains with item identifier for use at different levels of supply change Barcode used to track books in warehouse Publisher uses carton level barcode and ASN transaction to provide shipment information to wholesaler Jobber uses carton level barcode and ASN transaction to receive books from the publishers. Provide ASN transactions to libraries With the use of an ILS developed module, the Library uses carton level barcode and ASN transaction to receive books from the wholesalers Jobber Situation – No Interoperability

Visionary Technology in Library Solutions The Jobber RFID tag Hardware Software Hardware RFID tag Software Hardware RFID tag Vendor AVendor BVendor C Jobber maintains conversion stations for each RFID vendor to program RFID tag Library uses RFID Vendor A Library uses RFID Vendor B Library uses RFID Vendor C Jobber applied RFID Tags

Visionary Technology in Library Solutions The Book The Publisher The Jobber Library uses RFID Vendor A Library uses RFID Vendor B Library uses RFID Vendor C Library uses RFID Vendor D Jobber programs RFID tags in a batch process and applies to each library’s books independent of Library’s RFID Vendor Jobber Supplied RFID tags Programs the embedded RFID tag with item identifier Uses the item identifier in the embedded RFID tag for tracking book in warehouse Publisher uses carton level RFID tag and ASN transaction to provide shipment information to jobber Jobber uses carton level RFID tag and ASN transaction to receive books from the publishers. Provide ASN transactions to libraries Embedded RFID tag enables use at different levels of the supply chain

Visionary Technology in Library Solutions Functions Examined Supply Chain Tracking Item Level Tagging Carton Level Tagging Application of tags by book jobbers Application of tags by libraries Self Checkout Stations Book drops Sortation systems Inventory systems Media tagging ILL functions

Visionary Technology in Library Solutions Privacy Concerns Proper caution and concern raised by some privacy advocates … including EFF (Electronic Frontier Foundation) Exaggerated concerns raised by others. Issue is very sensitive for it can potentially cause privacy problems and/or potentially cause privacy problems and/or possibly derail or slow down RFID implementations and/or possibly derail or slow down RFID implementations and/or add to the implementation costs add to the implementation costs Organizations like BISG, EFF and American Library Association are providing leadership in this area.

Visionary Technology in Library Solutions Privacy Concerns EFF (Electronic Frontier Foundation) says: While RFIDs are a convenient way to track items, they are also a convenient way to do something far less benign: track people and their activities through their belongings. EFF is working to prevent the embrace of this technology from eroding privacy and freedom. EFF also highlights reports of the ‘hackability’ of RFID chips which appears to have inspired their epithet: ‘privacy-leaking’. Among EFF’s priorities is to keep these ‘privacy-leaking’ chips out …

Visionary Technology in Library Solutions Privacy Concerns Similar concerns were also reflected in a piece in Wired magazine (May 2006) entitled “The RFID Hacking Underground” which included a variety of comments and opinions. David Molnar... a computer science graduate student who studies commercial uses for RFIDs at UC Berkeley.... discovered he could destroy the data on the books' passive-emitting RFID tags by wandering the aisles with an off-the-shelf RFID reader-writer and his laptop.

Visionary Technology in Library Solutions Privacy Concerns Center for Democracy and Technology (CDT Group). Among the recommendations – notify customers in all cases when RFID technology is being used; notify customers in all cases when RFID technology is being used; inform customers whether they can deactivate the tags, and inform customers whether they can deactivate the tags, and build security into the technology as an essential design element. build security into the technology as an essential design element. practices.php practices.php

Visionary Technology in Library Solutions Privacy – Technology Perspective RFID tags are powerless; without power they are inert and inactive RFID tags are powerless; without power they are inert and inactive When a tag reader comes close it charges the tag The tag then transmits the data to the reader RFID tags used in libraries have a short read range RFID tags used in libraries have a short read range Range is 8 to 18 inches This small read range is important to the application as we do not wish to “influence” the tags on the book shelves while dealing with the tags on checkout or checkin stations

Visionary Technology in Library Solutions Book Industry Study Group (BISG) RFID Privacy Principles (This is a direct quote from the BISG web site) All businesses, organizations, libraries, educational institutions and non-profits that buy, sell, loan, or otherwise make available books and other content to the public utilizing RFID technologies shall: 1) Implement and enforce an up-to-date organizational privacy policy that gives notice and full disclosure as to the use, terms of use, and any change in the terms of use for data collected via new technologies and processes, including RFID. 2) Ensure that no personal information is recorded on RFID tags which, however, may contain a variety of transactional data.

Visionary Technology in Library Solutions Book Industry Study Group (BISG) 3) Protect data by reasonable security safeguards against interpretation by any unauthorized third party. 4) Comply with relevant federal, state, and local laws as well as industry best practices and policies. 5) Ensure that the four principles outlined above must be verifiable by an independent audit. This policy has been developed and released by the Book Industry Study Group in cooperation with the American Library Association, Office of Information Technology and the Office for Intellectual Freedom, as well as the National Information Standards Organization

Visionary Technology in Library Solutions Vandalism RFID Systems in libraries are vulnerable to electronic vandalism. Modification of security information to steal an item Modification of security information to steal an item Permanent locking of security bits or AFIs Permanent locking of security bits or AFIs Modification of tag contents as vandalism Modification of tag contents as vandalism Modification of tag contents to steal an item Modification of tag contents to steal an item Permanent locking of other fields after modification Permanent locking of other fields after modification RFID Viruses RFID Viruses Physical defacing or removal of the tag Physical defacing or removal of the tag

Visionary Technology in Library Solutions Responses to Vandalism There are several sources of potential help with the various attacks available to vandals. Criminal penalties against the perpetrators of vandalism, if they can be identified and prosecuted. Criminal penalties against the perpetrators of vandalism, if they can be identified and prosecuted. Password protection schemes on data which must remain changeable during the life of the item Password protection schemes on data which must remain changeable during the life of the item Simple locking on static data Simple locking on static data

Visionary Technology in Library Solutions Perspective on Vandalism Responses to vandalism are likely to hinder interoperability, and place the library only a few steps ahead of increasingly sophisticated vandals. Responses to vandalism are likely to hinder interoperability, and place the library only a few steps ahead of increasingly sophisticated vandals. Libraries must ultimately choose whether the impediments presented to vandals outweigh the detrimental impacts of the protections Different libraries are likely to find the balance point in different positions on this issue, and there is really no right or wrong choice that every library will adopt. For many libraries, the least expensive solution may be to accept the basic risks associated with RFID as an incremental difference over the exposure they encounter just by maintaining their collections with open doors.

Visionary Technology in Library Solutions Interoperability Interoperability (from Whatis.com) Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions.

Visionary Technology in Library Solutions Interoperability Level 1 Level 1: Within the Library Tags: The fear that the tags purchased may not be useful or available in the future requiring expensive and time consuming retagging operations. Suggested solutions Standardization of tags. Standardization of the data on the tag Tags purchased from other manufacturers should interoperate with the existing standardized tags Existing hardware and software be used with the new tags without any (or major) re-engineering?

Visionary Technology in Library Solutions Interoperability Level 1 Level 1: Within the Library Hardware interoperability: If the library purchases additional hardware like new gates or new self check units from a manufacturer different from the original supplier, then can this new hardware interoperate with existing tags and existing hardware? Software interoperability : Can the library swap out software with different or better functionality without changing the tags or hardware? This level of interoperability will allow libraries to purchase the best systems to match their needs, choosing components from different suppliers when this makes the best sense. Expanded options for replacement equipment will become available if compatibility with an existing installed base of tags can be accomplished through standardization.

Visionary Technology in Library Solutions Interoperability Level 2 Level 2: Within the community It is very desirable that library tags do not set off alarms in book stores and grocery stores. The reverse is true too. Librarians would not like grocery store items to set off alarms in the libraries. Solution: The AFI (Application Family Identifier -- discussed in the security section) is a perfect mechanism to control this aspect of operations. The committee strongly recommends that only tags based on AFI technology be used in libraries.

Visionary Technology in Library Solutions Interoperability Level 3 Level 3: ILL purposes A tag from library A should be able to service the circulation needs of library B. Solution: Use of standards based tags Use of standard data model (discussed later) for the tags

Visionary Technology in Library Solutions Interoperability Level 4 Level 2: Supply Chain Place tags on books as high in the supply chain as possible and use these tags for internal operations Manufacturer Distributor Book jobber Library Book jobbers would like to standardize on the methodologies for programming customer tags and hopefully use one set of hardware and one set of procedures to do this task for all libraries they service. The AFI codes for the tags will have to be programmable in the supply chain and the data on the tag would have to have different content at different stages of the supply chain.

Visionary Technology in Library Solutions RFID Security and Interoperability Three security methods used today  AFI (Application Family Identifier) based security  EAS (Electronic Article Surveillance) bit  Database lookup NISO RFID Committee recommendation?  Allow all three methods to be used  Insist on Interoperability Requirements (AFI etc.)  Leave security as a place of differentiation among vendors

Visionary Technology in Library Solutions AFI (Application Family Identifier)? AFI is a hardware feature designed into the silicon chip on ISO RFID tags. The purpose of AFI is to prevent tags from different industry applications from interfering with each other in the open environment. AFI is a special purpose register in a dedicated portion of the memory of an RFID tag. Programming of an ISO compliant tag with a particular AFI code dictates that the tag will respond only when an interrogating reader system requests a response from tags with that AFI code. This facilitates both separation of applications and security implementations.

Visionary Technology in Library Solutions Security – AFI and Interoperability Requirements for interoperability  Standard AFI Code for library applications for books checked out  Keep the AFI code unlocked  Standard AFI Code for library applications for books checked in (checked in books can use a local – but standard – AFI code) Required whether AFI is used for security or not. Systems which use AFI for security should use both of the assigned codes Systems which use EAS or database lookup for security should use the Library Industry code to avoid interference with other applications of RFID.

Visionary Technology in Library Solutions Joint Application for AFI Code EDItEUR, NISO and Danish National Library filed a joint application to JTC1/SC31 WG4 for the assignment and registration for a library specific AFI code to be used for books that are checked out. EDItEUR, NISO and Danish National Library filed a joint application to JTC1/SC31 WG4 for the assignment and registration for a library specific AFI code to be used for books that are checked out. The code has been assigned!!

Visionary Technology in Library Solutions ISO Standards Part 1 – Generic Parameters for the Air Interface for Globally Accepted Frequencies Part 2 – Parameters for Air Interface Communications below 135 kHz Part 3 – Parameters for Air Interface Communications at MHz Part 4 – Parameters for Air Interface Communications at 2.45 GHz Part 5 – Parameters for Air Interface Communications at 5.8 GHz (Withdrawn) Part 6 – Parameters for Air Interface Communications at 860 to 930 MHz Part 7 – Parameters for Air Interface Communications at 433 MHz

Visionary Technology in Library Solutions Scope of ISO “ The scope of the ISO standard is to provide Physical Layer, Collision management System and Protocol Values for RFID Systems for Item Identification operating at MHz in accordance with the requirements of ISO ” Some library vendors say they are ISO or ISO compliant instead of the more specific ISO compliant, but they mean the same thing. NISO Committee: Endorses this standard

Visionary Technology in Library Solutions ISO The ISO specification has three main parts: Physical characteristics Signal Interface and Transmission Protocol It holds the promise of interoperability ISO is not to be confused with ISO which is used for RFID for Item Management - Unique Identification of RF Tag (also read & 15962) NISO Committee: Endorses this standard

Visionary Technology in Library Solutions NISO Data Model for RFID Tags There was considerable debate on how much data should be placed or even permitted on the tag. Two opposing views: The minimalist approach … only a primary ID The other extreme … as much on the tag as space and cost considerations would allow so that the system could function with minimum interaction with the ILS. The NISO committee... flexibility while maintaining a fair degree of interoperability.

Visionary Technology in Library Solutions NISO Three Part Strategy NISO preliminary recommendation – has 3 parts Part 1: Content of the tag itself – Data Model Part 2: Encoding scheme using relative OIDs Part 3: Logging requirements for multiuse tags

Visionary Technology in Library Solutions Part 1: Data Model Originally three attributes were defined as mandatory (as reported in January 21, 2007 ALA Seattle) 1. Primary ID 2. Use (of the tag) – stage in life cycle of tag codes – 16 Manufacturer; 32 Distributor; 48 Jobber; 64 Library 3. Content Map The content map is a 8 bit field indicating if a specific optional group of attributes exists on the tag or not

Visionary Technology in Library Solutions Part 1: Latest Data ModelData Model The data model has only two mandatory attributes 1. Primary ID The primary item ID (or Unique Item Identifier) is the identifier that is used to uniquely identify an item within a particular library. Most typically this is the barcode on the item. 2. Tag Content Key A 24 bit binary key indicating which of the (UP TO 24) optional attributes are actually present on the tag. If the key is all zeroes then the Primary ID is the only data on the tag. If the key is missing then again the primary ID is the only data on the tag.

Visionary Technology in Library Solutions Part 1: Latest Data Model (1 of 3) Attributes (21 in all) 1. Primary Item ID (unique item identifier) 2. Tag Content Key 2. Tag Content Key 3. Owner Library/Institution 4. Owner Postal Code 5. Set Info (number of parts; ordinal part number) 6. Media Format 7. Type of Usage -- Circulating? reference? 8. Shelf Location 9. Sort Bin Number

Visionary Technology in Library Solutions Part 1: Latest Data Model (2 of 3) Attributes (21 in all) 10, ILL Borrowing Institution 11. ILL Return Date 12. Title 13. Supply Chain Stage 14. Local Data 15. ISBN 16. LC Call Number 17. Dewey Decimal

Visionary Technology in Library Solutions Part 1: Latest Data Model (2 of 3) Attributes (21 in all) 18. Supplier Identification Data 19. Order Number 20. Invoice Number 21. Supplier Item ID (Alternate Item ID)

Visionary Technology in Library Solutions Part 1: Expected Data Model (1 of 2) Attributes (19 in all) 1. Primary Item ID (unique item identifier) 2. Tag Content Key 2. Tag Content Key 3. Owner Library/Institution 4. Set Info (number of parts; ordinal part number) 5. Media Format 6. Type of Usage -- Circulating? reference? 7. Shelf Location (Local shelving OR Dewey OR LC Call Number) 8. ILL Borrowing Institution 9. ISBN 10. Title

Visionary Technology in Library Solutions Part 1: Expected Data Model (2 of 2) Attributes (19 in all) 11. Supply Chain Stage 12. Supplier Item ID (Alternate Item ID) 13. Local Data Local Data Owner Postal Code 16. ILL Return Date 17. Supplier Identification Data 18. Order Number 19. Invoice Number It is possible that only the top 14 will survive

Visionary Technology in Library Solutions Part 2: Encoding Scheme The Committee is still working on this section. The encoding scheme will conform with the ISO standards and This level of technical detail will be in the Appendix of the report.

Visionary Technology in Library Solutions Part 3: Logging Logging is recommended (but not required) as a system requirement. It promotes interoperability and some protection against vandalism. The library changing the supply chain attribute of the tag should maintain a log record of the full before and after image of the content of the tag along with the unique item identifier (UID) of the tag. UID is the ID placed on the tag by the manufacturer and uniquely identifies the tag itself. It remains permanently on the tag. The Log record should be maintained throughout the life cycle of the tag. Such a log record will permit the recreation of the data on the tag if the data were compromised by malfunction or by vandalism.

Visionary Technology in Library Solutions Migrating to Standards Based Systems Process will be daunting; careful planning can help Most important issue is dealing with tags Are your tags reprogrammable? Were they locked after being programmed? Can your systems run in “ dual ” mode? Handle old and new tags at the same time? Can your equipment be upgraded to do so?

Visionary Technology in Library Solutions Migration Recommendations Good Citizenship Be compliant with ISO standards USE officially assigned AFI code Awareness Standards are public documents Interoperability also means greater exposure to vandalism Labor and other costs Where? In what priority order? On the fly? At Checkin At Sortation system At ILL delivery At checkout

Visionary Technology in Library Solutions Migration Recommendations Role of your vendor Monitor standards activity Plan, develop and offer standards based solutions Offer migration path with “ dual ” tag handling capability For circulation stations For self checkouts For sortation systems For security gates For inventory systems Comply with data content on the tag Program the AFI tag and leave it unlocked

Visionary Technology in Library Solutions The International Scene The Danish Data Model The Dutch Data Model The Australian Data Model Copy of the data models available on the internet International Standardization Activity Two Meetings in Copenhagen; Next in UK National Reps from several European countries (Denmark, Germany, Netherlands, UK, Finland) Australia and USA. Ongoing discussion of standards and data model Surprised at our concern over privacy

Visionary Technology in Library Solutions The Timetable Draft #6B is the current draft. Draft #7 will be sent soon to selected people for comments Final Report for general distribution expected in August 2007.

Visionary Technology in Library Solutions VTLS RFID library management software is now RFID hardware and tag supplier independent. Visit Booth 3533 in Washington

Visionary Technology in Library Solutions Thanks To ALA/NISO for inviting us here To libraries and companies that have devoted their time to this NISO activity. To all of you for your interest in this important topic. Questions?