SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Privacy in the Workplace
                                   Case Studies on the Use of Radio Frequency Identification
                                   in Access Cards




                                   P
          RAND RESEARCH AREAS
                                            roposed retail uses of Radio Frequency
                   CHILD POLICY

                   CIVIL JUSTICE
                                            Identification (RFID) tags have generated            Abstract
                    EDUCATION               privacy concerns, which, in turn, have
                                                                                                Companies use RFID workplace access cards
     ENERGY AND ENVIRONMENT
                                            spurred legislative proposals to limit their
       HEALTH AND HEALTH CARE                                                                   to do more than just open doors (e.g., for
                                   use in six states. Such concerns center around uses
         INTERNATIONAL AFFAIRS
                                                                                                enforcing rules governing workplace con-
             NATIONAL SECURITY     of RFID tags where an individual does not know
                                                                                                duct). Explicit, written policies about how
       POPULATION AND AGING        that he or she has been associated with the tag
                  PUBLIC SAFETY                                                                 such cards are used generally do not exist,
                                   or who may be reading the data gathered and for
     SCIENCE AND TECHNOLOGY                                                                     and employees are not told about whatever
              SUBSTANCE ABUSE
                                   what purpose.
                                                                                                policies are being followed. Using such sys-
              TERRORISM AND            Although such “noncooperative” uses of RFID
           HOMELAND SECURITY                                                                    tems has modified the traditional balance of
          TRANSPORTATION AND
                                   technology have yet to be deployed, let alone
               INFRASTRUCTURE                                                                   personal convenience, workplace safety and
                                   understood, cooperative uses of RFID are wide-
                                                                                                security, and individual privacy, leading to
                                   spread in workplace access cards, credit cards, and
                                                                                                the loss of “practical obscurity.” Such systems
                                   toll tags. What can we learn from that experience
                                                                                                also raise challenges for the meaning and
                                   that is applicable to the current debate?
                                                                                                implementation of fair information practices.
                                       RAND Corporation researchers sought to
                                   answer this question by undertaking a replicated
                                   case study of six private-sector companies with           cal security feature under the control of the system;
                                   1,500 employees or more to understand their poli-         network integration of the distributed electronics;
                                   cies for collecting, retaining, and using records         and a centralized database that records the details
                                   obtained by sensing RFID-based access cards.              of the use of access cards. After scanning an access
                                                                                             card, the system determines whether the individual
                                   How Do RFID Access Control                                is authorized to enter (or exit) and unlocks the bar-
                                   Cards Work?                                               rier (if authorized to do so). A record of the trans-
    This product is part of the
 RAND Corporation research
                                   The figure shows the typical elements of an RFID           action is (optionally) captured in the database.
 brief series. RAND research       access control system. Each system comprises a
briefs present policy-oriented
      summaries of individual      number of antennas used to interrogate RFID               Access Cards: More Than Just
    published, peer-reviewed
   documents or of a body of
                                   tags embedded in access cards; electronics for data       Opening Doors
               published work.     acquisition and control; a lock or some other physi-      While RFID access cards are primarily used to
  Corporate Headquarters                                                                     open doors, five of the six companies interviewed
           1776 Main Street                                                                  said the records collected were used in both a per-
              P.O. Box 2138                        Embedded RFID Tag           Access Card
   Santa Monica, California                                                                  sonally identifiable form (i.e., to understand the
                90407-2138                                                                   movements of an individual) and in aggregate form
          TEL 310.393.0411
         FAX 310.393.4818
                                                               Air Interface                 (i.e., to describe the behavior of many individuals
                                                                                             without identifying any of them).
               © RAND 2005
                                   Database of
                                                          Data
                                                                                Antenna
                                                                                                 Personal identifiable uses included investigating
                                                       Acquisition
                                   Transactions
                                                       and Control                           allegations of work rule violations (e.g., misreport-
                                                                                             ing time spent working) and, in one case, monitor-
                                                                                             ing all former employees of an acquired company
                                                                                  Lock       to ensure they adopted enterprise norms for work
               www.rand.org                                                                  hours.
Aggregates of records were used in logistics and cost analyses                                     Policies Are Not Communicated to Employees
(e.g., refining building evacuation plans) and to generate required                                     While the policies being followed raise some concerns, none of the
government reports (e.g., an air quality report characterizing the                                     companies communicates to their employees that data collected
number of employees at the workplace).                                                                 with access cards are used for more than simply controlling locks.
                                                                                                          To the extent that we understand applicable workplace laws,
Lack of Explicit Policies Raises
                                                                                                       monitoring and recording employees’ use of access cards to enter
Concerns
                                                                                                       and/or leave facilities seems to be well within the rights of private-
As shown in the table, only one of the companies interviewed has
                                                                                                       sector companies. But nothing prevents them from making their
explicit, written policies governing the use of RFID in the work-
                                                                                                       policies known, and fair information practices codes would encour-
place, and that one (D) provided them only to the security func-
                                                                                                       age them to do so. The RAND study suggests that policies about
tion in the organization, not the whole company.
                                                                                                       access control records are invisible to most employees but are other-
    Also, none of the companies has a limited data retention policy;
                                                                                                       wise similar to email or phone monitoring policies. Surveys suggest
they keep the records indefinitely. And although most companies
                                                                                                       that most such systems have explicit policies and that those policies
do audit their system records, only one conducts an external audit.
                                                                                                       are communicated to employees.
Moreover, none of the companies regarded the policy for access
control system data retention and use to be a company-wide one                                         Implications
that should be managed and overseen by a corporate officer. In all                                       Access cards clearly have benefits for both individuals and for
cases, the policymaker is either the security or facilities department.                                security and public safety. They are certainly easier to use than a
    Finally, in all cases, records were linked to other company data-                                  conventional key, particularly if individual areas or rooms within a
bases (mostly to personnel records in human resources, HR), which                                      facility remain locked and require separate keys.
is inevitable since individual employees are generally assigned                                            However, the use of RFIDs in access control systems is an
uniquely identified cards. In one case (F), the company linked                                          example of how technology has led to the loss of “practical obscu-
the database to medical records to allow first responders to scan                                       rity.” Prior to access control systems, anonymous movement in
an employee’s badge to call up relevant medical records during an                                      the workplace was nearly guaranteed. RFID tags and fine-grained
emergency. In two cases (C and F), the linkage is fully automated.                                     access controls within a building make it possible to observe the
                                                                                                       movements of any employee all the time.
                                                                              Other                        Moreover, the use of such systems has modified the traditional
                    Explicit                                                  Database                 balance of personal convenience, workplace safety and security,
 Company            Policies?   Data Control             Policymaker          Links                    and individual privacy. These case studies suggest that security and
       A              No        Stored                   Corporate            Manually                 public safety trump personal privacy—that securing the workplace,
                                indefinitely;             security             to HR
                                no audits
                                                                                                       investigating instances of theft or misconduct, accounting for
                                                                                                       employees after emergencies, and providing effective responses to
       B              No        Stored                   Corporate            Manually
                                indefinitely;             security             to HR                    medical problems are the priorities favored in designing and operat-
                                self-audit                                                             ing the systems. Employer policies also trump personal privacy: We
       C              No        Stored                   Corporate            HR                       found that the organizations studied used such collected data to
                                indefinitely;             facilities/                                   enforce rules governing employee conduct (A, B, C, D, and F) and
                                external audit           security
                                                                                                       to monitor collective behavior (C).
       D              Yes       Stored                   Corporate            Manually
                                indefinitely;             security             to HR                        In addition, while fair information practices argue that employ-
                                self-audit                                                             ees should be informed about uses of access control system records
       E              No        Stored                   Corporate            Manually                 and should have the right to inspect and correct records about their
                                indefinitely;             security             to HR                    activities, implementing such practices would be impractical for
                                no audits
                                                                                                       some situations, such as an employee’s ability to correct an errone-
       F              No        Stored                   Facility             Medical
                                indefinitely;             operations           records/
                                                                                                       ous record. After the passage of time, could an employee recon-
                                self-audit                                    HR                       struct the details of daily movements to challenge an automated
A and B = nonprofits; C and D = high-tech manufacturing;                                                system? Based on these issues with RFID and given other emerging
E and F = media services.                                                                              sensor technologies that enable the collection and analysis of fine-
                                                                                                       grained details about an individual’s behavior, the authors see the
                                                                                                       need to rethink elements of fair information practices.

This research brief describes work done for RAND Infrastructure, Safety, and Environment and documented in 9 to 5: Do You Know If Your Boss Knows Where You Are? Case Studies
of Radio Frequency Identification Usage in the Workplace by Edward Balkovich, Tora K. Bikson, and Gordon Bitko, TR-197-RC (available at http://www.rand.org/publications/TR/
TR197), 2005, 36 pp., $12, ISBN: 0-8330-3719-6. TR-197-RC is also available from RAND Distribution Services (phone: 310.451.7002; toll free 877.584.8642; or email: order@rand.
org). The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors
around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark.

RAND Offices Santa Monica          •   Washington   •   Pittsburgh   •   New York   •   Doha   •   Berlin   •   Cambridge   •   Leiden


RB-9107-RC (2005)
I N F R AS T R U CTURE, S AFETY,
                             AN D EN VI R ONMENT


            CHILD POLICY       This PDF document was made available from www.rand.org as a public
             CIVIL JUSTICE     service of the RAND Corporation.
              EDUCATION

ENERGY AND ENVIRONMENT
                               This product is part of the RAND Corporation
  HEALTH AND HEALTH CARE

   INTERNATIONAL AFFAIRS
                               research brief series. RAND research briefs present
       NATIONAL SECURITY       policy-oriented summaries of individual published, peer-
  POPULATION AND AGING         reviewed documents or of a body of published work.
            PUBLIC SAFETY

SCIENCE AND TECHNOLOGY

        SUBSTANCE ABUSE
                               The RAND Corporation is a nonprofit research
        TERRORISM AND          organization providing objective analysis and effective
     HOMELAND SECURITY

    TRANSPORTATION AND
                               solutions that address the challenges facing the public
         INFRASTRUCTURE
                               and private sectors around the world.



                                   Support RAND
                                            Browse Books & Publications
                                            Make a charitable contribution


                                   For More Information
                                            Visit RAND at www.rand.org
                                            Explore RAND Infrastructure, Safety, and Environment
                                            View document details




                                   Limited Electronic Distribution Rights
                                   This document and trademark(s) contained herein are protected by law as indicated in a notice
                                   appearing later in this work. This electronic representation of RAND intellectual property is provided
                                   for non-commercial use only. Permission is required from RAND to reproduce, or reuse in another
                                   form, any of our research documents for commercial use.

Más contenido relacionado

La actualidad más candente

Techno info solutions titles list
Techno info solutions titles listTechno info solutions titles list
Techno info solutions titles listjanani technoinfo
 
Glonetex Biometrics Proposal
Glonetex Biometrics ProposalGlonetex Biometrics Proposal
Glonetex Biometrics ProposalCarleton Bedell
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...pharmaindexing
 
Network security dotnet
Network security   dotnetNetwork security   dotnet
Network security dotnetDhamu Mca
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET Journal
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsMartina Naughton
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsIRJET Journal
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
 

La actualidad más candente (18)

575 579
575 579575 579
575 579
 
Techno info solutions titles list
Techno info solutions titles listTechno info solutions titles list
Techno info solutions titles list
 
Glonetex Biometrics Proposal
Glonetex Biometrics ProposalGlonetex Biometrics Proposal
Glonetex Biometrics Proposal
 
35 38
35 3835 38
35 38
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
 
INSIGHT REPORT RFID
INSIGHT REPORT RFIDINSIGHT REPORT RFID
INSIGHT REPORT RFID
 
Network security dotnet
Network security   dotnetNetwork security   dotnet
Network security dotnet
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 

Destacado

Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methodscmilliken09
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
QLD EILS Seminar: Emerging Issues in Workplace Privacy
QLD EILS Seminar: Emerging Issues in Workplace PrivacyQLD EILS Seminar: Emerging Issues in Workplace Privacy
QLD EILS Seminar: Emerging Issues in Workplace PrivacyMaurice Blackburn Lawyers
 
Desjardins5e ppt ch6
Desjardins5e ppt ch6Desjardins5e ppt ch6
Desjardins5e ppt ch6oudesign
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Internet privacy
Internet privacyInternet privacy
Internet privacyhafsan
 

Destacado (13)

Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
QLD EILS Seminar: Emerging Issues in Workplace Privacy
QLD EILS Seminar: Emerging Issues in Workplace PrivacyQLD EILS Seminar: Emerging Issues in Workplace Privacy
QLD EILS Seminar: Emerging Issues in Workplace Privacy
 
Desjardins5e ppt ch6
Desjardins5e ppt ch6Desjardins5e ppt ch6
Desjardins5e ppt ch6
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 

Similar a Privacy in the Work Place

A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectA Singh
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFIDijtsrd
 
RFID Taxonomy
RFID TaxonomyRFID Taxonomy
RFID Taxonomyshassant2
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmAlexander Decker
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesServiceWave 2010
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
Wt Whitepaper 0308
Wt Whitepaper 0308Wt Whitepaper 0308
Wt Whitepaper 0308Bonita Read
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) inventionjournals
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 

Similar a Privacy in the Work Place (20)

A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_Project
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFID
 
RFID Taxonomy
RFID TaxonomyRFID Taxonomy
RFID Taxonomy
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resources
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Wt Whitepaper 0308
Wt Whitepaper 0308Wt Whitepaper 0308
Wt Whitepaper 0308
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 

Más de Andres Baytelman

Fraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyFraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyAndres Baytelman
 
Fraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresFraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresAndres Baytelman
 
Cohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanCohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanAndres Baytelman
 
Muestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanMuestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanAndres Baytelman
 
Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Andres Baytelman
 
Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Andres Baytelman
 
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaFraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaAndres Baytelman
 
Fraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasFraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasAndres Baytelman
 
Fraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesFraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesAndres Baytelman
 
Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Andres Baytelman
 
Fraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónFraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónAndres Baytelman
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Andres Baytelman
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Andres Baytelman
 
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Andres Baytelman
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFEAndres Baytelman
 
Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Andres Baytelman
 
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Andres Baytelman
 
Embajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesEmbajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesAndres Baytelman
 
FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)Andres Baytelman
 
México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas Andres Baytelman
 

Más de Andres Baytelman (20)

Fraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyFraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la ley
 
Fraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresFraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadores
 
Cohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanCohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelman
 
Muestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanMuestras de prensa Andrés Baytelman
Muestras de prensa Andrés Baytelman
 
Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)
 
Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11
 
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaFraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
 
Fraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasFraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticias
 
Fraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesFraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymes
 
Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)
 
Fraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónFraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturación
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
 
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFE
 
Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012
 
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
 
Embajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesEmbajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientes
 
FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)
 
México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas
 

Último

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 

Último (20)

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 

Privacy in the Work Place

  • 1. Privacy in the Workplace Case Studies on the Use of Radio Frequency Identification in Access Cards P RAND RESEARCH AREAS roposed retail uses of Radio Frequency CHILD POLICY CIVIL JUSTICE Identification (RFID) tags have generated Abstract EDUCATION privacy concerns, which, in turn, have Companies use RFID workplace access cards ENERGY AND ENVIRONMENT spurred legislative proposals to limit their HEALTH AND HEALTH CARE to do more than just open doors (e.g., for use in six states. Such concerns center around uses INTERNATIONAL AFFAIRS enforcing rules governing workplace con- NATIONAL SECURITY of RFID tags where an individual does not know duct). Explicit, written policies about how POPULATION AND AGING that he or she has been associated with the tag PUBLIC SAFETY such cards are used generally do not exist, or who may be reading the data gathered and for SCIENCE AND TECHNOLOGY and employees are not told about whatever SUBSTANCE ABUSE what purpose. policies are being followed. Using such sys- TERRORISM AND Although such “noncooperative” uses of RFID HOMELAND SECURITY tems has modified the traditional balance of TRANSPORTATION AND technology have yet to be deployed, let alone INFRASTRUCTURE personal convenience, workplace safety and understood, cooperative uses of RFID are wide- security, and individual privacy, leading to spread in workplace access cards, credit cards, and the loss of “practical obscurity.” Such systems toll tags. What can we learn from that experience also raise challenges for the meaning and that is applicable to the current debate? implementation of fair information practices. RAND Corporation researchers sought to answer this question by undertaking a replicated case study of six private-sector companies with cal security feature under the control of the system; 1,500 employees or more to understand their poli- network integration of the distributed electronics; cies for collecting, retaining, and using records and a centralized database that records the details obtained by sensing RFID-based access cards. of the use of access cards. After scanning an access card, the system determines whether the individual How Do RFID Access Control is authorized to enter (or exit) and unlocks the bar- Cards Work? rier (if authorized to do so). A record of the trans- This product is part of the RAND Corporation research The figure shows the typical elements of an RFID action is (optionally) captured in the database. brief series. RAND research access control system. Each system comprises a briefs present policy-oriented summaries of individual number of antennas used to interrogate RFID Access Cards: More Than Just published, peer-reviewed documents or of a body of tags embedded in access cards; electronics for data Opening Doors published work. acquisition and control; a lock or some other physi- While RFID access cards are primarily used to Corporate Headquarters open doors, five of the six companies interviewed 1776 Main Street said the records collected were used in both a per- P.O. Box 2138 Embedded RFID Tag Access Card Santa Monica, California sonally identifiable form (i.e., to understand the 90407-2138 movements of an individual) and in aggregate form TEL 310.393.0411 FAX 310.393.4818 Air Interface (i.e., to describe the behavior of many individuals without identifying any of them). © RAND 2005 Database of Data Antenna Personal identifiable uses included investigating Acquisition Transactions and Control allegations of work rule violations (e.g., misreport- ing time spent working) and, in one case, monitor- ing all former employees of an acquired company Lock to ensure they adopted enterprise norms for work www.rand.org hours.
  • 2. Aggregates of records were used in logistics and cost analyses Policies Are Not Communicated to Employees (e.g., refining building evacuation plans) and to generate required While the policies being followed raise some concerns, none of the government reports (e.g., an air quality report characterizing the companies communicates to their employees that data collected number of employees at the workplace). with access cards are used for more than simply controlling locks. To the extent that we understand applicable workplace laws, Lack of Explicit Policies Raises monitoring and recording employees’ use of access cards to enter Concerns and/or leave facilities seems to be well within the rights of private- As shown in the table, only one of the companies interviewed has sector companies. But nothing prevents them from making their explicit, written policies governing the use of RFID in the work- policies known, and fair information practices codes would encour- place, and that one (D) provided them only to the security func- age them to do so. The RAND study suggests that policies about tion in the organization, not the whole company. access control records are invisible to most employees but are other- Also, none of the companies has a limited data retention policy; wise similar to email or phone monitoring policies. Surveys suggest they keep the records indefinitely. And although most companies that most such systems have explicit policies and that those policies do audit their system records, only one conducts an external audit. are communicated to employees. Moreover, none of the companies regarded the policy for access control system data retention and use to be a company-wide one Implications that should be managed and overseen by a corporate officer. In all Access cards clearly have benefits for both individuals and for cases, the policymaker is either the security or facilities department. security and public safety. They are certainly easier to use than a Finally, in all cases, records were linked to other company data- conventional key, particularly if individual areas or rooms within a bases (mostly to personnel records in human resources, HR), which facility remain locked and require separate keys. is inevitable since individual employees are generally assigned However, the use of RFIDs in access control systems is an uniquely identified cards. In one case (F), the company linked example of how technology has led to the loss of “practical obscu- the database to medical records to allow first responders to scan rity.” Prior to access control systems, anonymous movement in an employee’s badge to call up relevant medical records during an the workplace was nearly guaranteed. RFID tags and fine-grained emergency. In two cases (C and F), the linkage is fully automated. access controls within a building make it possible to observe the movements of any employee all the time. Other Moreover, the use of such systems has modified the traditional Explicit Database balance of personal convenience, workplace safety and security, Company Policies? Data Control Policymaker Links and individual privacy. These case studies suggest that security and A No Stored Corporate Manually public safety trump personal privacy—that securing the workplace, indefinitely; security to HR no audits investigating instances of theft or misconduct, accounting for employees after emergencies, and providing effective responses to B No Stored Corporate Manually indefinitely; security to HR medical problems are the priorities favored in designing and operat- self-audit ing the systems. Employer policies also trump personal privacy: We C No Stored Corporate HR found that the organizations studied used such collected data to indefinitely; facilities/ enforce rules governing employee conduct (A, B, C, D, and F) and external audit security to monitor collective behavior (C). D Yes Stored Corporate Manually indefinitely; security to HR In addition, while fair information practices argue that employ- self-audit ees should be informed about uses of access control system records E No Stored Corporate Manually and should have the right to inspect and correct records about their indefinitely; security to HR activities, implementing such practices would be impractical for no audits some situations, such as an employee’s ability to correct an errone- F No Stored Facility Medical indefinitely; operations records/ ous record. After the passage of time, could an employee recon- self-audit HR struct the details of daily movements to challenge an automated A and B = nonprofits; C and D = high-tech manufacturing; system? Based on these issues with RFID and given other emerging E and F = media services. sensor technologies that enable the collection and analysis of fine- grained details about an individual’s behavior, the authors see the need to rethink elements of fair information practices. This research brief describes work done for RAND Infrastructure, Safety, and Environment and documented in 9 to 5: Do You Know If Your Boss Knows Where You Are? Case Studies of Radio Frequency Identification Usage in the Workplace by Edward Balkovich, Tora K. Bikson, and Gordon Bitko, TR-197-RC (available at http://www.rand.org/publications/TR/ TR197), 2005, 36 pp., $12, ISBN: 0-8330-3719-6. TR-197-RC is also available from RAND Distribution Services (phone: 310.451.7002; toll free 877.584.8642; or email: order@rand. org). The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. RAND Offices Santa Monica • Washington • Pittsburgh • New York • Doha • Berlin • Cambridge • Leiden RB-9107-RC (2005)
  • 3. I N F R AS T R U CTURE, S AFETY, AN D EN VI R ONMENT CHILD POLICY This PDF document was made available from www.rand.org as a public CIVIL JUSTICE service of the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT This product is part of the RAND Corporation HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS research brief series. RAND research briefs present NATIONAL SECURITY policy-oriented summaries of individual published, peer- POPULATION AND AGING reviewed documents or of a body of published work. PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE The RAND Corporation is a nonprofit research TERRORISM AND organization providing objective analysis and effective HOMELAND SECURITY TRANSPORTATION AND solutions that address the challenges facing the public INFRASTRUCTURE and private sectors around the world. Support RAND Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Infrastructure, Safety, and Environment View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use.