RFID Technology

RFID Technology
Introduction
Radio Frequency Identification (RFID) is a subset of a group of technologies, often referred to as automatic
identification, that are used to help machines identify objects, and which include bar codes and smart
cards. RFID refers to the subset of automatic identification that uses radio waves to automatically identify
bulk or individual items.
RFID has been around for a long time, one of its original uses being the identification of aircraft during the
Second World War. Until recently it was viewed as being too expensive and too limited in functionality for
many commercial applications. Advances in technology have both reduced the cost of individual system
components and provided increased capabilities, to the point where numerous organizations are either using
or considering using RFID technology. In fact, some organizations, notably Wal-Mart and the US Defense
Department, have mandated the use of RFID by their business partners.
While RFID technology offers numerous benefits for manufacturers, for instance, certain characteristics of the
technology also raise a number of privacy concerns.
What is Radio Frequency Identification Technology?
An RFID system consists of three components: a tag (or multiple tags), a reader or interrogator and the
necessary supporting infrastructure (both hardware and software).
An RFID reader, or interrogator, is a device to communicate with the RFID tag. It broadcasts a radio signal,
which is received by the tag. The tag then transmits its information back to the reader. Readers can either be
portable handheld terminals or fixed devices that can be positioned in strategic places such as loading bays in
shipping and receiving facilities, or the doors in transport trucks.
RFID tags, also known as transponders, are usually small pieces of material, typically comprising three
components: an antenna, a microchip unit containing memory storage and an encapsulating material. Tags
can be either read-only or read-write tags. These terms refer to whether or not the information stored on the
tag can be changed or erased. A Read-only Tag is a form of RFID tag that has an identification code (more
specifically, an Electronic Product Code) recorded at the time of manufacture or when the tag is allocated to
an object. Once programmed, the data on the tag cannot be modified or appended but it may be read
multiple times. A Read-Write Tag is a tag that can have its memory changed, or written to, many
times. Because their ID codes can be changed, they offer greater functionality albeit at higher price.
While commonly seen as a replacement for the Universal Product Code (UPC), or bar code, RFID tags differ
from bar codes in several ways. More than one tag can be read at a time. Tags do not require a direct line of
________________________________________________________________________________________________________
30 Victoria Street – 1st Floor, Gatineau, QC K1A 1H3 • Toll-free: 1-800-282-1376 • Fax: (819) 994-5424 • TDD (819) 994-6591
www.priv.gc.ca • Follow us on Twitter: @privacyprivee
1
sight for reading and may be read through hard material such as book covers or other packaging
material. Each tag can uniquely identify the object to which it is attached, even if that object is one of a
multitude of identical items. It is these latter characteristics that are the cause of many of the privacy
concerns associated with the use of RFID technology.
In addition to the tags and readers, an RFID system also includes other software and hardware. The most
important component is the RFID-specific software that translates the raw data from the tag into information
about the goods and orders that are represented by the tags. This information can then be fed into other
databases and applications (e.g., inventory management) for further processing. In the case of read-write
tags, software is also required to control whether data can be written to the tag, which tag should contain the
data and to initiate the process of adding data to, or changing data in the tag.
Potential Uses of RFID Technology
Many public and private sector organizations are either using or planning to use RFID technology. Because the
technology basically turns an inert object into one capable of communicating, the potential for use is
enormous and limited only by our imagination and the capabilities of the technology involved. Potential uses
include:
1. Supply Chain Management (monitoring and controlling the flow of goods from raw materials through
to finished product, from manufacturer to consumer);
2. Product Integrity (ensuring that products (e.g., pharmaceuticals) are authentic and have not been
altered in any way);
3. Warranty Services (marking durable goods with a tag incorporating a product registration code to
facilitate warranty services);
4. ID, Travel, and Ticketing (providing a means to verify the identity of the traveler and to ensure that the
documents are genuine);
5. Baggage Tracking (monitoring and controlling the movement of baggage from check-in to loading on
an airplane); and
6. Patient Care and Management (providing a means to rapidly and accurately verify information
concerning patient allergies, prescription history, etc. to prevent surgical errors).
Privacy Concerns
Notwithstanding the current state of RFID technology or current practices, certain aspects of the technology –
notably the small size of the tags and the ability to uniquely identify an object – pose potential threats to
individual privacy. These include, but are not necessarily limited to the following:
a) Surreptitious collection of information. RFID tags are small and can be embedded into/onto objects
and documents without the knowledge of the individual who obtains those items. As radio waves
travel easily and silently through fabric, plastic, and other materials and are not restricted to line of
sight, it is possible to read RFID tags sewn into clothing or affixed to objects contained in purses,
shopping bags, suitcases, and more. Tags can be read from a distance, by readers that can be
incorporated invisibly into nearly any environment where human beings or items congregate. It may
not, therefore, be readily apparent that RFID technology is in use, making it virtually impossible for a
consumer to know when or if he or she is being "scanned”;
b) Tracking an individual’s movements. If RFID tags are embedded in clothing or vehicles, for example,
and if there is a sufficiently dense network of readers in place, it becomes possible to track those tags
________________________________________________________________________________________________________
30 Victoria Street – 1st Floor, Gatineau, QC K1A 1H3 • Toll-free: 1-800-282-1376 • Fax: (819) 994-5424 • TDD (819) 994-6591
www.priv.gc.ca • Follow us on Twitter: @privacyprivee
2
in time and space. Applications to do just this, using a combination of RFID and Global Positioning
System technology, are being proposed by RFID vendors. If the tags can then be associated with an
individual, then by that association the individual’s movements can be tracked. For example, a tag
embedded in an article of clothing could serve as a de facto identifier for the person wearing it. Even
if information about the tagged item remains generic, identifying items people wear or carry could
associate them with, for example, particular events like political rallies or protests;
c) Profiling of individuals. When using bar codes, one bottle of water has the same barcode as all other
bottles of water of that particular brand. RFID technology potentially enables every object on earth to
have its own unique ID (i.e., each bottle of water would have a unique identifier). The use of unique
ID numbers could lead to the creation of a global item registration system in which every physical
object is identified and linked to its purchaser or owner at the point of sale or transfer. If these unique
identifiers are associated with an individual (by linking through a credit card number, for example),
then a profile of that individual’s purchasing habits can easily be created;
d) Secondary use (particularly in the sense of limiting or controlling such use). The creation of profiles
and the tracking of movement can reveal a great deal of additional information. For example, the
revelation of personal information such as medical prescription or personal health histories could have
an impact on the availability of insurance or employment; and
e) Massive data aggregation. RFID deployment requires the creation of massive databases containing
unique tag data. These records could be linked with personal identifying data, especially as computer
memory and processing capacities expand. This, in turn, could facilitate any of the practices listed
above.
Application of Fair Information Practices to RFID Technology
The ten principles of the CSA Standard, attached as schedule I of the Personal Information Protection and
Electronic Documents Act, provide the basis for a privacy management framework that can be applied to RFID
technology. It is important to clarify to what the principles would apply. In the context of RFID technology,
this means that:
1. If the chip has had the personal information of the individual written to it, then it is a repository of
personal information;
2. If the tag is unique, and can be associated with an individual, it becomes a unique identifier or
proxy for that individual; and
3. Information about possessions or purchases which can be manipulated or processed to form a
profile is personal information, whether gathered through multiple visits to a facility or
organization, or through access to the data base of RFID purchase information.
________________________________________________________________________________________________________
30 Victoria Street – 1st Floor, Gatineau, QC K1A 1H3 • Toll-free: 1-800-282-1376 • Fax: (819) 994-5424 • TDD (819) 994-6591
www.priv.gc.ca • Follow us on Twitter: @privacyprivee
3