SlideShare a Scribd company logo
Regulation models
addressing data protection
issues in the EU concerning
RFID technology

             Ioannis Iglezakis
  Assistant Professor in Computers & Law
   Faculty of Law, Aristotle University of
                Thessaloniki
RFID
 Radio frequency identification (RFID) is a
  new technology which uses radio waves
  for the automatic identification of individual
  items and thus, it allows the processing of
  data over short distances
 RFID systems are considered the next
  generation of bar codes
                4TH INTERNATIONAL CONFERENCE
                      ON INFORMATION LAW
                 THESSALONIKI –MAY 20-21, 2011   2
RFID Infrastructure
   Tags




   The tag consists of an electronic circuit that
    stores data and an antenna which transmits the
    data

                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011     3
RFID Infrastructure
   RFID reader




   It has an antenna which receives the data and a
    demodulator.
   The RFID reader sends and receives back signals from
    the tags via one or more antennas and transmits the
    data to databases or software applications.


                    4TH INTERNATIONAL CONFERENCE
                          ON INFORMATION LAW
                     THESSALONIKI –MAY 20-21, 2011         4
Taxonomy of Tags
   passive tags have no own power supply
    and receive energy from the reader
    antenna




                4TH INTERNATIONAL CONFERENCE
                      ON INFORMATION LAW
                 THESSALONIKI –MAY 20-21, 2011   5
Taxonomy of Tags
   active tags have their
    own power supply.




                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   6
RFID systems applications
   Retail Sector
   Transportation
   Logistics
   Healthcare
   Security & access control
   Aviation
   Libraries
   Schools
   Leisure
                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   7
Risks of RFID systems to privacy

   RFID technology enables identification
    and profiling of a person; it may also lead
    to covert monitoring of individuals, which
    infringes informational privacy




                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   8
Risks of RFID systems to privacy
   where RFID systems are implemented in order
    to collect information directly or indirectly linked
    to personal data,
     so e.g., where products from a store are tagged with
      unique product codes which the retailer combines
      with customer names collected upon payment with
      credit cards and link them with the customer
      database.
     also, where personal data is stored in RFID
      tags, so, e.g. in transport ticketing

                    4TH INTERNATIONAL CONFERENCE
                          ON INFORMATION LAW
                     THESSALONIKI –MAY 20-21, 2011           9
Risks of RFID systems to privacy

   Even if the customer is not directly identified by means of
    the tagged card, he can be identified each time he visits
    the same shop as the holder of the card.
   Similarly, an individual can be tracked by shops which
    scan tagged products of customers.
   And further, third parties may use readers to detect
    tagged items of by passers, violating in that way their
    privacy


                      4TH INTERNATIONAL CONFERENCE
                            ON INFORMATION LAW
                       THESSALONIKI –MAY 20-21, 2011         10
Risks of RFID systems to privacy

   RFID tags can be read without line-of-sight
    and from a distance without being noticed
    and therefore, they are prone for
    application by retailers for customer
    profiling, as well as for monitoring for other
    purposes, e.g., for law enforcement
    purposes, etc.

                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011   11
Legal requirements of data protection
with regard to RFID
   Directive 1995/46
     Data  quality principles
     Legitimacy
     Right to information
     Right of Access
     Data Security



                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   12
Legal requirements of data protection
with regard to RFID
   Directive 2002/58 on privacy in
    electronic communications

   It applies “to the processing of
    personal data in connection with the
    provision of publicly available
    electronic communications services
    in public communications networks
    in the Community, including public
    communications networks
    supporting data collection and
    identification devices”.

                     4TH INTERNATIONAL CONFERENCE
                           ON INFORMATION LAW
                      THESSALONIKI –MAY 20-21, 2011   13
Legal requirements of data
protection with regard to RFID
   EU Commission
    Recommendation of May
    12, 2009on the
    implementation of privacy
    and data protection
    principles in applications
    supported by radio-
    frequency identification

                   4TH INTERNATIONAL CONFERENCE
                         ON INFORMATION LAW
                    THESSALONIKI –MAY 20-21, 2011   14
Regulation vs Self-Regulation
 The PIA Framework that was endorsed by
  the Article 29 Working Party is an
  important instrument
 However, the recommendation on which it
  was based is not mandatory, but it is
  drafted to provide guidance to EU Member
  States on the design and operation of
  RFID applications.
              4TH INTERNATIONAL CONFERENCE
                    ON INFORMATION LAW
               THESSALONIKI –MAY 20-21, 2011   15
Regulation vs Self-Regulation
   To effectively address the data protection
    issues posed by RFID technology requires
    making the PIA process
    mandatory, providing also for the
    notification of its results to the competent
    data protection authorities, which should
    have the right to prior checking of RFID
    systems posing significant privacy risks.
                 4TH INTERNATIONAL CONFERENCE
                       ON INFORMATION LAW
                  THESSALONIKI –MAY 20-21, 2011   16
Regulation vs Self-Regulation
   Alternatively, the data protection
    legislation could introduce specific rules
    for RFID systems and more
    particularly, rules establishing technical
    solutions, since it is difficult to achieve
    privacy by design by self-regulation


                  4TH INTERNATIONAL CONFERENCE
                        ON INFORMATION LAW
                   THESSALONIKI –MAY 20-21, 2011   17

More Related Content

PDF
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
PPTX
PDF
Battery-free RFID sensors in the IoT
PPTX
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
PPT
Mobile_Security_En
DOCX
What is needed rfid
PPTX
Catching up, moving on
PPT
20110913 rfid in_libraries_ip_bib_jk
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
Battery-free RFID sensors in the IoT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
Mobile_Security_En
What is needed rfid
Catching up, moving on
20110913 rfid in_libraries_ip_bib_jk

What's hot (20)

PPS
LMS/RFID (Dis)integration: why standards matter
PDF
RFID Technology and Internet of Things
PPTX
Rfid Tag Manufacturer | Identis
PDF
Frid based final year report
PPTX
12212687
PDF
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
PDF
Rfid ppt
PPTX
15213897 pss7
PPTX
Internet of Things
PDF
Ug 3 1 r19 cse syllabus
PDF
K1103047173
PDF
Vicinity-Future Is RFID
PDF
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
PDF
International Journal of Computer Science Applications & Information Technolo...
PDF
Rfid Applications In Manufacturing Draft 7
PDF
Iaetsd e-passport
PDF
International Journal of Computer Science Applications & Information Technolo...
PDF
PPTX
13213164.pps7.ppt
PDF
Secured e-payment system based on automated authentication data and iterated ...
LMS/RFID (Dis)integration: why standards matter
RFID Technology and Internet of Things
Rfid Tag Manufacturer | Identis
Frid based final year report
12212687
Journée thématique "Évaluation d’Impact sur la Vie Privée des Applications RFID"
Rfid ppt
15213897 pss7
Internet of Things
Ug 3 1 r19 cse syllabus
K1103047173
Vicinity-Future Is RFID
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
International Journal of Computer Science Applications & Information Technolo...
Rfid Applications In Manufacturing Draft 7
Iaetsd e-passport
International Journal of Computer Science Applications & Information Technolo...
13213164.pps7.ppt
Secured e-payment system based on automated authentication data and iterated ...
Ad

Viewers also liked (7)

PPTX
E book competition
PDF
Casestudy Bersin Pfizer Red Hat[1]
PDF
Intro to-html-backbone-angular
PPT
Identitymanagment
PPT
Intro to-html-backbone
PPTX
Digital Libraries
PDF
Linkedin rekryteringslösningar lathund
E book competition
Casestudy Bersin Pfizer Red Hat[1]
Intro to-html-backbone-angular
Identitymanagment
Intro to-html-backbone
Digital Libraries
Linkedin rekryteringslösningar lathund
Ad

Similar to Papers 201 iglezakis-presentation-en-v001 (20)

PDF
Ifla 2011
PPT
Technology and Libraries:RFID vs. Barcodes
PDF
Http _www.emeraldinsight.com_insight_view_contentservlet_contenttype=article...
PDF
Rfid ass
PDF
Rfid+background+paper[1][1]
PDF
20EC702OE-RFID AND FLEXIABLE SENSOR,INTRODUCTION AND RFID ARCHITECTURE,UNIT 2...
PDF
20EC702OE-RFID AND FLEXIABLE SENSOR,INTRODUCTION AND RFID ARCHITECTURE,UNIT 2...
PPTX
UNIT PPT - 20EC7020E -RFID AND FLEXIBLE SENSORS
PDF
RFID Privacy & Security Issues
PPTX
Current Issues in Library RFID
PPT
Radio Frequency Identification
PPT
Chipping in – reflections and predictions for library rev
PPT
Mick Fortune - Reflections and Predictions for Library RFID
DOCX
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
PDF
Implementing radio frequency identification technology in libraries advantage...
PDF
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
PPTX
UK Library RFID Review
PPTX
Rfid technology
PPT
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
PDF
Review of the Introduction and Use of RFID
Ifla 2011
Technology and Libraries:RFID vs. Barcodes
Http _www.emeraldinsight.com_insight_view_contentservlet_contenttype=article...
Rfid ass
Rfid+background+paper[1][1]
20EC702OE-RFID AND FLEXIABLE SENSOR,INTRODUCTION AND RFID ARCHITECTURE,UNIT 2...
20EC702OE-RFID AND FLEXIABLE SENSOR,INTRODUCTION AND RFID ARCHITECTURE,UNIT 2...
UNIT PPT - 20EC7020E -RFID AND FLEXIBLE SENSORS
RFID Privacy & Security Issues
Current Issues in Library RFID
Radio Frequency Identification
Chipping in – reflections and predictions for library rev
Mick Fortune - Reflections and Predictions for Library RFID
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
Implementing radio frequency identification technology in libraries advantage...
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
UK Library RFID Review
Rfid technology
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
Review of the Introduction and Use of RFID

More from ioannis iglezakis (12)

PPTX
Protection of users mobile apps
PPTX
τεχνολογιες & ασφαλεια πληροφοριων
PPTX
Κανονισμος Προστασιας Δεδομενων
PPTX
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
PPTX
Όροι χρησης ηλεκτρονικου καταστηματος
PPTX
Δυσφήμηση ιατρών μέσω του διαδικτύου
PPT
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
PPT
Hate speech on the internet
PPTX
Intellectual property issues for start ups
PPTX
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
PPT
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
PPT
Elektronischer Geschäftsverkehr
Protection of users mobile apps
τεχνολογιες & ασφαλεια πληροφοριων
Κανονισμος Προστασιας Δεδομενων
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
Όροι χρησης ηλεκτρονικου καταστηματος
Δυσφήμηση ιατρών μέσω του διαδικτύου
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
Hate speech on the internet
Intellectual property issues for start ups
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Elektronischer Geschäftsverkehr

Recently uploaded (20)

PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
How to Get Approval for Business Funding
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
IFRS Notes in your pocket for study all the time
PPTX
operations management : demand supply ch
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
Cours de Système d'information about ERP.pdf
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
Slide gioi thieu VietinBank Quy 2 - 2025
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
NEW - FEES STRUCTURES (01-july-2024).pdf
Deliverable file - Regulatory guideline analysis.pdf
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
Lecture 3344;;,,(,(((((((((((((((((((((((
How to Get Approval for Business Funding
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
IFRS Notes in your pocket for study all the time
operations management : demand supply ch
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Ôn tập tiếng anh trong kinh doanh nâng cao
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Cours de Système d'information about ERP.pdf
Daniels 2024 Inclusive, Sustainable Development
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Solaris Resources Presentation - Corporate August 2025.pdf

Papers 201 iglezakis-presentation-en-v001

  • 1. Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty of Law, Aristotle University of Thessaloniki
  • 2. RFID  Radio frequency identification (RFID) is a new technology which uses radio waves for the automatic identification of individual items and thus, it allows the processing of data over short distances  RFID systems are considered the next generation of bar codes 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 2
  • 3. RFID Infrastructure  Tags  The tag consists of an electronic circuit that stores data and an antenna which transmits the data 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 3
  • 4. RFID Infrastructure  RFID reader  It has an antenna which receives the data and a demodulator.  The RFID reader sends and receives back signals from the tags via one or more antennas and transmits the data to databases or software applications. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 4
  • 5. Taxonomy of Tags  passive tags have no own power supply and receive energy from the reader antenna 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 5
  • 6. Taxonomy of Tags  active tags have their own power supply. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 6
  • 7. RFID systems applications  Retail Sector  Transportation  Logistics  Healthcare  Security & access control  Aviation  Libraries  Schools  Leisure 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 7
  • 8. Risks of RFID systems to privacy  RFID technology enables identification and profiling of a person; it may also lead to covert monitoring of individuals, which infringes informational privacy 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 8
  • 9. Risks of RFID systems to privacy  where RFID systems are implemented in order to collect information directly or indirectly linked to personal data,  so e.g., where products from a store are tagged with unique product codes which the retailer combines with customer names collected upon payment with credit cards and link them with the customer database.  also, where personal data is stored in RFID tags, so, e.g. in transport ticketing 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 9
  • 10. Risks of RFID systems to privacy  Even if the customer is not directly identified by means of the tagged card, he can be identified each time he visits the same shop as the holder of the card.  Similarly, an individual can be tracked by shops which scan tagged products of customers.  And further, third parties may use readers to detect tagged items of by passers, violating in that way their privacy 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 10
  • 11. Risks of RFID systems to privacy  RFID tags can be read without line-of-sight and from a distance without being noticed and therefore, they are prone for application by retailers for customer profiling, as well as for monitoring for other purposes, e.g., for law enforcement purposes, etc. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 11
  • 12. Legal requirements of data protection with regard to RFID  Directive 1995/46  Data quality principles  Legitimacy  Right to information  Right of Access  Data Security 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 12
  • 13. Legal requirements of data protection with regard to RFID  Directive 2002/58 on privacy in electronic communications  It applies “to the processing of personal data in connection with the provision of publicly available electronic communications services in public communications networks in the Community, including public communications networks supporting data collection and identification devices”. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 13
  • 14. Legal requirements of data protection with regard to RFID  EU Commission Recommendation of May 12, 2009on the implementation of privacy and data protection principles in applications supported by radio- frequency identification 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 14
  • 15. Regulation vs Self-Regulation  The PIA Framework that was endorsed by the Article 29 Working Party is an important instrument  However, the recommendation on which it was based is not mandatory, but it is drafted to provide guidance to EU Member States on the design and operation of RFID applications. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 15
  • 16. Regulation vs Self-Regulation  To effectively address the data protection issues posed by RFID technology requires making the PIA process mandatory, providing also for the notification of its results to the competent data protection authorities, which should have the right to prior checking of RFID systems posing significant privacy risks. 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 16
  • 17. Regulation vs Self-Regulation  Alternatively, the data protection legislation could introduce specific rules for RFID systems and more particularly, rules establishing technical solutions, since it is difficult to achieve privacy by design by self-regulation 4TH INTERNATIONAL CONFERENCE ON INFORMATION LAW THESSALONIKI –MAY 20-21, 2011 17