• About
  • Advertise
  • Contact
Monday, October 13, 2025
No Result
View All Result
NEWSLETTER
iotindiana
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotindiana
No Result
View All Result
Home Networking

RFID fact and fiction

in Networking
0
SHARES
8
VIEWS
Share on FacebookShare on Twitter

In an effort to dispel some of the privacy concerns surrounding radio frequency identification technology (RFID), the Information Technology Association of America has issued a white paper covering what the technology is and is not capable of.

The report “RFID Myths and Urban Legends,” available from the ITAA Web site, cites some of the benefits of the technology, including identity management, supply-chain efficiency, pharmaceutical tracking, food safety/recall, security, and stock control. RFID has the potential to have profound impact on industry.

As you know, RFID is an automated data-capture technology. The technology consists of RFID tags, RFID readers, and a data collection and management system. Because RFID can be used for personal identification, there are privacy and security concerns regarding the technology. The ITAA white paper is a useful resource to counter some of these concerns in your company by correcting misinformation:

* Companies and governments plan to track you using RFID. Not true because an RFID tag has no awareness of geographical data. An RFID tag must be within 10 to 30 feet of a reader – outside of that range, tags don’t emit a signal. “Big Brother” type surveillance would require billions of readers and antennas within that range.

* RFID creates a database in the sky. When it’s so difficult for companies to integrate their disparate sources of data, is it really realistic to believe there will be a single database that tracks all your purchases? RFID doesn’t change the way information is used or stored.

* RFID will spur drive-by reads. RFID requires direct line of sight within the 10- to 30-foot range. It does not work through walls, so it’s highly unlikely someone could park at the curb to find out what’s in your medicine cabinet unless your lawn was dotted with readers.

* RFID can lead to identity theft. The tags do not usually contain personally identifiable information. Rather, they transmit unique identifiers that function like license plates. You’d need access to a database that should be secured with encryption and all the other usual standard forms of protection.

Learn more about this topic

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2008 IDG Communications, Inc.

Premium WordPress Themes Download
Download Premium WordPress Themes Free
Free Download WordPress Themes
Download Premium WordPress Themes Free
udemy free download
download intex firmware
Download Premium WordPress Themes Free
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
Tags: RFID fact and fiction
Next Post

IT hits the highway: Big rigs go high tech

Recommended

What’s in a Raspberry Pi name? How to rename your RPi under Raspbian

IoT security threats and how to handle them

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Indiana USA

© 2024 iotindiana.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotindiana.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In