RFID and Privacy Dan White RFID Technical Evangelist Engineering & Development Retail Solutions Division.

Slides:



Advertisements
Similar presentations
The Hidden Costs of Identity Theft on American Business.
Advertisements

Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Identity Theft What you need to know Betty White, April 2010.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
 Prepared by: Noor Elfi Aziani Bt Noor Azmi Noor Shafika Bt Mohamad Nazer e-safety.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
E-Passports Threatens Your Privacy Nathan Sweet CSCE 390 Dr. Valtorta
Privacy. Historically, have consumers been concerned about their privacy?  millions of consumers choose to have their phones listed in their last name.
Working group discussion 1 Cyber Risk Security, Privacy ?
Electronic Transaction Use & Risk of Identity Theft.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Protecting Your Identity While Attending College.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Scams & Schemes Common Sense Media.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Get Safe Online Expert advice for everyone In association with.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Identity Theft By: Michael Jones and Sarah Trent.
Identity Theft How it happens and how to avoid it.
Cyber Safety Jamie Salazar.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Identity Theft It’s a crime!
Combating Identity Fraud In A Virtual World
Online Shopping With the development of the Internet and the popularization of computer , shopping online has become a commonplace in our life . We can.
Done by… Hanoof Al-Khaldi Information Assurance
Module 3 Consumer Privacy.
Cyber Security Awareness Workshop
Future Developments in ICT
Rogers customer service Rogers support number
McAfee Customer Support Number
Norton Customer Support Number.
Who Uses Encryption? Module 7 Section 3.
Protecting Your Identity
Identity Theft Scenarios What do you recommend?
“Credit score vocabulary”
Getting the Green Light on the Red Flags Rule
Presentation transcript:

RFID and Privacy Dan White RFID Technical Evangelist Engineering & Development Retail Solutions Division

RFID Workshop NCR Confidential 2 Agenda Fears Facts Future

RFID Workshop NCR Confidential 3 What is the reason for privacy concerns and RFID? Of abuse Of the unknown

RFID Workshop NCR Confidential 4 Fear of Abuse Hollywood

RFID Workshop NCR Confidential 5 Fear of Abuse Biblical Prophesy

RFID Workshop NCR Confidential 6 Fear of Abuse Invasive Advertising - Telemarketers - Profiling Over 50 million subscribers

RFID Workshop NCR Confidential 7 Fear of Abuse 27.3 million victims in last 5 years 9.9 million in 2002 alone $5 billion in loss to individuals $48 billion in losses to industry Source: FTC Identity Theft

RFID Workshop NCR Confidential 8 Fear of Abuse SPAM ~9 million/day 30% of all Cost is over $10 Billion/year Source: CAUCE and Data Protection Commission

RFID Workshop NCR Confidential 9 Fear of Unknown What you don’t know, can’t hurt you …

RFID Workshop NCR Confidential 10 Facts - Technical Realities Must be very low cost Major issue with liquids/metals Read range of few feet Most interest today at pallet and case level

RFID Workshop NCR Confidential 11 Facts – Privacy Status Can someone effectively track you today with ePC RFID? Could they in the future? Should you be concerned?

RFID Workshop NCR Confidential 12 Facts – Privacy is a Personal Issue Bank account Social Security Number Driver’s license Credit Cards Cell Phone Internet Loyalty card

RFID Workshop NCR Confidential 13 Facts - Why do RFID? Cost More Selection/Availability Faster Checkout

RFID Workshop NCR Confidential 14 Future – Consumer Choice Industry –Retailers need customers Technology –NCR’s Tag Killer Kiosk Legislation –All ready great deal of privacy law that pertains to RFID