• About
  • Advertise
  • Contact
Sunday, October 26, 2025
No Result
View All Result
NEWSLETTER
iotwashington
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotwashington
No Result
View All Result
Home Networking

RFID fact and fiction

in Networking
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

In an effort to dispel some of the privacy concerns surrounding radio frequency identification technology (RFID), the Information Technology Association of America has issued a white paper covering what the technology is and is not capable of.

The report “RFID Myths and Urban Legends,” available from the ITAA Web site, cites some of the benefits of the technology, including identity management, supply-chain efficiency, pharmaceutical tracking, food safety/recall, security, and stock control. RFID has the potential to have profound impact on industry.

As you know, RFID is an automated data-capture technology. The technology consists of RFID tags, RFID readers, and a data collection and management system. Because RFID can be used for personal identification, there are privacy and security concerns regarding the technology. The ITAA white paper is a useful resource to counter some of these concerns in your company by correcting misinformation:

* Companies and governments plan to track you using RFID. Not true because an RFID tag has no awareness of geographical data. An RFID tag must be within 10 to 30 feet of a reader – outside of that range, tags don’t emit a signal. “Big Brother” type surveillance would require billions of readers and antennas within that range.

* RFID creates a database in the sky. When it’s so difficult for companies to integrate their disparate sources of data, is it really realistic to believe there will be a single database that tracks all your purchases? RFID doesn’t change the way information is used or stored.

* RFID will spur drive-by reads. RFID requires direct line of sight within the 10- to 30-foot range. It does not work through walls, so it’s highly unlikely someone could park at the curb to find out what’s in your medicine cabinet unless your lawn was dotted with readers.

* RFID can lead to identity theft. The tags do not usually contain personally identifiable information. Rather, they transmit unique identifiers that function like license plates. You’d need access to a database that should be secured with encryption and all the other usual standard forms of protection.

Learn more about this topic

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2008 IDG Communications, Inc.

Download Best WordPress Themes Free Download
Download WordPress Themes Free
Download WordPress Themes
Premium WordPress Themes Download
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
download xiomi firmware
Premium WordPress Themes Download
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
Tags: RFID fact and fiction
Next Post

HP secures data center assets with RFID tags

Recommended

Ford wants to keep drivers alert on the long road to autonomous cars

ForeScout simplifies IoT security

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Washington USA

© 2024 iotwashington.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotwashington.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In