BSI PD CEN/TR 16684:2014
$167.15
Information technology. Notification of RFID. Additional information to be provided by operators
Published By | Publication Date | Number of Pages |
BSI | 2014 | 38 |
This Technical Report is to assist operators of applications in areas where radio frequency interrogators are deployed, to identify the types of information that are called for in the recommendation.
The Technical Report provides all the current information to assist operators to develop and publish a concise accurate and easy to understand information policy for each of their applications.
The policy should at least include:
-
the identity and address of the operators;
-
the purpose of the application;
-
what data are to be processed by the application, in particular if personal data will be processed, and whether the location of tags will be monitored;
-
a summary of the privacy and data protection impact assessment;
-
the likely privacy risks, if any, relating to the use of tags in the application and the measures that individuals can take to mitigate these risks.
PDF Catalog
PDF Pages | PDF Title |
---|---|
5 | Foreword |
6 | 0 Introduction 0.1 General 0.2 Overview |
9 | 1 Scope 2 Terms and definitions 3 CCTV as an Exemplar |
10 | Figure 1 — CCTV logo, Bus Station Northern Ireland |
11 | Figure 2 — CCTV logo, Filling Station in Scotland Figure 3 — Speed Safety Camera signs |
12 | Figure 4 — Speed Safety Camera signs 4 The RFID European Emblem 4.1 General Figure 5 — RFID Emblem |
13 | 4.2 Guidelines on the use of the Common European RFID emblem 4.3 Definition of the Common European RFID Notification Sign |
14 | 4.4 Placement of signs 4.4.1 General 4.4.2 Presence of Readers 4.4.3 Placement of signs notifying the presence of readers 4.4.3.1 General 4.4.3.2 Multiple Applications 4.4.3.3 Multiple Operators 4.4.4 Presence of tags 4.4.4.1 General |
15 | 4.4.4.2 Use of Emblem on tagged items 4.4.4.3 Purpose of application declaration on tagged items 4.4.4.4 Contact Point 4.5 Who should place signage on tagged items |
16 | 4.6 Size of emblem 5 Guidelines on additional information 5.1 General |
17 | 5.2 Name of the operator of the application 5.2.1 Name 5.2.2 Contact point 5.3 Purpose of the application |
18 | 5.4 Data processed 5.5 Summary of the privacy impact assessment 5.5.1 PIA report date 5.5.2 RFID application operator 5.5.3 RFID application overview |
19 | 5.5.4 Data on the RFID tag 5.6 Likely privacy risks 5.7 Measures to mitigate the risks |
20 | Table 1 — PIA Summary of the PIA Process 5.8 Privacy information policy for RFID 5.8.1 General 5.8.2 Consumer and members of the public choice information – promotional material |
21 | 5.8.3 Consumer and members of the public choice information – sales material and pre-contract information 5.8.4 Consumer and members of the public choice information – means of conveying the information 5.8.5 Consumer and members of the public privacy information accessibility |
22 | 5.8.6 Privacy related contractual and privacy policy information 5.8.7 Consumer and members of the public post sale user privacy information |
23 | 5.8.8 Consumer and members of the public information – means of conveying the post sale user privacy information 5.9 Consumer and public information – non application operator RFID privacy information |
24 | Annex A (informative) RFID applications in retail |
27 | Annex B (informative) RFID applications in library |
28 | Annex C (informative) RFID applications in transportation |
29 | Figure C.1 — Card IFM Project Figure C.2 — Card RMV Figure C.3 — Card MOBIB |
30 | Figure C.4 — Card OneSchotland Figure C.5 — Card NaviGO |
31 | Figure C.6 — Card IFM Project |
32 | Figure C.7 — ISO 24014:— IFM operational and management entities |
33 | Annex D (informative) RFID applications in banking Figure D.1 — MasterCard paypass |
34 | Figure D.2 — Visa payWave Figure D.3 — MasterCard paypass Watch |
35 | Figure D.4 — Visa Key Chain Figure D.5 — Contactlesss Terminal |
36 | Bibliography |