The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Radio Frequency Identification Technologies: A Workshop Summary
The so-called “internet of things” enabled by RFID systems conceptually “make[s] it possible for computers to identify any object anywhere in the world instantly.”4 Such a vision holds tremendous promise in contexts such as inventory management and shipping and handling, as well as in hospital care, education, and safety monitoring. But, clearly, the promise is burdened by equally tremendous possibilities for misuse. The RFID Position Statement mentioned above (see footnote 2) lists five potential threats to privacy and civil liberties from the large-scale deployment of RFID technologies: hidden placement of tags, unique identifiers for all objects, massive data aggregation, hidden readers, and individual tracking and profiling.
As described previously, “Big Brother” scenarios in which commercial interests or government can track an individual’s every purchase and move by compiling vast quantities of minute data from electronic product codes within RFID tags are some time away from being realized. But possibilities for immediate misuse remain. Workshop participants argued that addressing social, ethical, legal, and cultural concerns is crucial for RFID technologies at every stage, including technological design and the development of industry standards, policy and regulation, and specific applications. Developing policy to incorporate social norms in emerging technologies is often a discouragingly long process in an industry that seems to move at lightning speed, almost always ahead of the policy discussions as well as ahead of the purview of government regulators. For that reason, this chapter on the societal and privacy concerns associated with RFID technologies necessarily takes a long view of the technology and its potential implications.
Particularly in the realms of social norms, ethics, and policy, RFID technologies confound simple discussion in a number of ways. First, the differences in the speed at which policy and technology develop forces policy into what would seem to be the realm of science fiction. If policy discussions are forced to make assumptions about future technological developments, policy may fail to fit appropriately with societal interests as they evolve along with the technology. Second, because of what is often referred to as “function creep,” technologies designed for one task are often adapted to accomplish another. Thus the stated purpose of any new system will be an incomplete description of that system’s eventual use. Third, two primary means exist for incorporating social goals (be they privacy, security, manageability, reliability, or usability) into a system. The two means are regulation and design. Each is very differently motivated into action. Fourth and finally, thus far the most articulate discussion of social goals related to RFID technologies centers on notions of privacy. Privacy, however, is not universally defined, nor is it a flexible enough concept to encompass all of the issues that must be taken into consideration as RFID-incorporating systems become prevalent.5 And, of course, privacy is far from a homogeneous or single-dimension concept.6 Not only must the complexity of privacy as a concept be recognized, but other (sometimes related) concerns should be explicitly articulated as well.
Now is a good time for a thoughtful consideration of societal, cultural, and ethical issues related to RFID systems. A brief workshop cannot do justice to the complexity of all these
One thing that makes “privacy” particularly challenging is that it has a weak feedback loop—it is not always immediately obvious when privacy has been affected or violated.
Individual thresholds vary with respect to privacy—what one person might consider deeply private, another might casually disclose. Moreover, some argue that privacy encompasses more than merely the concealment or revelation of information, also being connected to autonomy and trust. Privacy is also deeply tied to context—behavior in one circumstance may be considered much more acceptable from a privacy standpoint than that same behavior in another situation.