<?php

include("eff_setup2.php");

$smarty = new EFFSmarty;

$smarty->assign('title','Position Statement on the Use of RFID on Consumer Products');

// if breadcrumb == true, then it fill in the right trail in the issue
// array
$smarty->assign('breadcrumb','false');

// example:
//$issue = array("Issues" => "/issues/", "Privacy" => "/issues/privacy/", "TIA" => "/issues/privacy/tia/");

//Creative Commons - If you need to turn OFF the CC license, set cc = false
//$smarty->assign('cc',"false");

$smarty->assign('issue',$issue);

$content  = '
<div id="featuretext">

<h1>Position Statement on the Use of RFID on Consumer Products</h1>
<h2><a href="RFID_Position_Statement.pdf">Download PDF</a> (128k)</h2>

<div>
  <p align=center style=\'text-align:center\'><b>Position Statement <br />
on the Use of RFID on Consumer Products</b></p>
  <p align=center style=\'text-align:center\'>November 14, 2003<br />
Available at <a href="http://www.spychips.org/">www.spychips.com</a> and <a
href="http://www.privacyrights.org">www.privacyrights.org</a></p>
<hr size="1" />
  <p align=center style=\'text-align:center\'><b>Issued by:</b></p>
  <p align=center style=\'text-align:center\'>Consumers Against
    Supermarket Privacy Invasion and Numbering (CASPIAN)</p>
  <p align=center style=\'text-align:center\'>Privacy Rights Clearinghouse</p>
</div>
<table border="0" align="center" cellpadding="4" width="100%">
  <tr>
    <td width="50%"><p>American Civil Liberties Union (ACLU)<br />
      Electronic Frontier Foundation
        (EFF)<br />
        Electronic Privacy Information Center (EPIC)</p>
    </td>
    <td width="50%"><p>Junkbusters<br />
      Meyda Online<br />
      PrivacyActivism</p>
    </td>
  </tr>
</table>
<div>
<div>
  <p align=center style=\'text-align:center\'><b>Endorsed by:</b></p>
</div>
<table border="0" align="center" cellpadding="4" width="100%">
  <tr>
    <td width="50%">American Council on Consumer Awareness, Inc.<br />
      Center for Democracy and
        Technology (CDT)<br />
        Consumer Action<br />
      Consumer Project on Technology<br />
        Simson Garfinkel, Author, <u>Database Nation<br />
        </u>Edward Hasbrouck, Author, <u>The Practical Nomad<br />
        </u>Massachusetts Consumers\' Coalition
    </td>
    <td width="50%">National Association of Consumer Agency Associates
        (NACAA)<br />
        Privacy Times<br />
        Private Citizen, Inc.<br />
        Virginia Rezmierski, Ph.D.<br />
        World Privacy Forum
    </td>
  </tr>
</table>
<br clear=ALL />
<div>
  <p><b>INTRODUCTION</b></p>
  <p>Radio Frequency Identification (RFID) is an item-tagging
    technology with profound societal implications. Used improperly, RFID has
    the potential to jeopardize consumer privacy, reduce or eliminate purchasing
    anonymity, and threaten civil liberties. </p>
  <p>As organizations and individuals committed to the protection
    of privacy and civil liberties, we have come together to issue this statement
    on the deployment of RFID in the consumer environment. In the following pages,
    we describe the technology and its uses, define the risks, and discuss potential
    public policy approaches to mitigate the problems we raise. </p>
  <p>RFID tags are tiny computer chips connected to miniature
    antennae that can be affixed to physical objects. In the most commonly touted
    applications of RFID, the microchip contains an Electronic Product Code (EPC)
    with sufficient capacity to provide unique identifiers for all items produced
    worldwide. When an RFID reader emits a radio signal, tags in the vicinity
    respond by transmitting their stored data to the reader. With passive (battery-less)
    RFID tags, read-range can vary from less than an inch to 20-30 feet, while
    active (self-powered) tags can have a much longer read range. Typically,
    the data is sent to a distributed computing system involved in, perhaps,
    supply chain management or inventory control.</p>
  <p><b>THREATS TO PRIVACY AND CIVIL LIBERTIES</b></p>
  <p>While there are beneficial uses of RFID, some attributes
    of the technology could be deployed in ways that threaten privacy and civil
    liberties: </p>
  <ul>
  <li><b>Hidden placement of tags. </b>RFID
    tags can be embedded into/onto objects and documents without the knowledge
    of the individual who obtains those items. As radio waves travel easily and
    silently through fabric, plastic, and other materials, it is possible to
    read RFID tags sewn into clothing or affixed to objects contained in purses,
    shopping bags, suitcases, and more.</li>
  <li><b>Unique identifiers for
        all objects worldwide. </b>The Electronic Product Code potentially enables
        every object on earth to have its own unique ID. The use of unique ID
        numbers could lead to the creation of a global item registration system
        in which
        every physical object is identified and linked to its purchaser or owner
    at the point of sale or transfer.</li>
  <li><b>Massive data aggregation. </b>RFID
      deployment requires the creation of massive databases containing unique
    tag data. These records could be linked with personal identifying data, especially
    as computer memory and processing capacities expand.</li>
  <li><b>Hidden readers. </b>Tags
    can be read from a distance, not restricted to line of sight, by readers
    that can be incorporated invisibly into nearly any environment where human
    beings or items congregate. RFID readers have already been experimentally
    embedded into floor tiles, woven into carpeting and floor mats, hidden in
    doorways, and seamlessly incorporated into retail shelving and counters,
    making it virtually impossible for a consumer to know when or if he or she
    was being &quot;scanned.&quot;</li>
  <li><b>Individual tracking and
        profiling. </b> If personal identity were linked with unique RFID tag
        numbers, individuals could be profiled and tracked without their knowledge
        or consent.
        For example, a tag embedded in a shoe could serve as a de facto identifier
        for the person wearing it. Even if item-level information remains generic,
        identifying items people wear or carry could associate them with, for
        example, particular events like political rallies. </li>
</ul>		
  <p><b>FRAMEWORK OF RFID RIGHTS AND RESPONSIBILITIES </b></p>
  <p>This framework respects businesses\' interest in tracking
    products in the supply chain, but emphasizes individuals\' rights to not be
    tracked within stores and after products are purchased. To mitigate the potential
    harmful consequences of RFID to individuals and to society, we recommend
    a three-part framework. First, RFID must undergo a formal technology assessment,
    and RFID tags should not be affixed to individual consumer products until
    such assessment takes place. Second, RFID implementation must be guided by
    Principles of Fair Information Practice. Third, certain uses of RFID should
    be flatly prohibited.</p>
  <p><b>Technology assessment. </b>RFID must be subject to a formal
    technology assessment process, sponsored by a neutral entity, perhaps similar
    to the model established by the now defunct Congressional Office of Technology
    Assessment. The process must be multi-disciplinary, involving all stakeholders,
    including consumers. </p>
  <p><b>Principles of Fair Information Practice.</b> RFID technology
    and its implementation must be guided by strong principles of fair information
    practices (FIPs). The eight-part Privacy Guidelines of the Organisation for
    Economic Co-operation and Development (OECD) provides a useful model (<a href="http://www.oecd.org/">www.oecd.org</a>).
    We agree that the following minimum guidelines, based in part on these principles,
    must be adhered to while the larger assessment of RFID\'s societal implications
    takes place:</p>
<ul>
	<li><b>Openness, or transparency.</b> RFID users must make public their policies and practices involving the use and maintenance of RFID systems, and there should be no secret databases. Individuals have a right to know when products or items in the retail environment contain RFID tags or readers. They also have the right to know the technical specifications of those devices. Labeling must be clearly displayed and easily understood.  Any tag reading that occurs in the retail environment must be transparent to all parties. There should be no tag<s>-</s>reading in secret.</li>
	<li><b>Purpose specification.</b> RFID users must give notice of the purposes for which tags and readers are used. </li>
	<li><b>Collection limitation.</b> The collection of information should be limited to that which is necessary for the purpose at hand. </li>
	<li><b>Accountability.</b> RFID users are responsible for implementation of this technology and the associated data. RFID users should be legally responsible for complying with the principles.  An accountability mechanism must be established. There must be entities in both industry and government to whom individuals can complain when these provisions have been violated</li>
	<li><b>Security Safeguards. </b>There must be security and integrity in transmission, databases, and system access.  These should be verified by outside, third-party, publicly disclosed assessment.</li>
</ul>

  <p><b>RFID Practices that Should be Flatly Prohibited:</b></p>
<ul>
	<li>Merchants must be prohibited from forcing or coercing customers into accepting live or dormant RFID tags in the products they buy. </li>
	<li>There should be no prohibition on individuals to detect RFID tags and readers and disable tags on items in their possession.</li>
	<li>RFID must not be used to track individuals absent informed and written consent of the data subject.  Human tracking is inappropriate, either directly or indirectly, through clothing, consumer goods, or other items.</li>
	<li>RFID should never be employed in a fashion to eliminate or reduce anonymity. For instance, RFID should not be incorporated into currency. </li>
</ul>

  <p><b>ACCEPTABLE USES OF RFID</b></p>
  <p>We have identified several examples of &quot;acceptable&quot; uses
    of RFID in which consumer-citizens are not subjected to &quot;live&quot; RFID
    tags and their attendant risks.</p>
<ul>
	<li><b>Tracking of pharmaceuticals</b> from the point of manufacture to the point of dispensing. RFID tags could help insure that these critical goods are not counterfeit, that they are handled properly, and that they are dispensed appropriately. RFID tags contained on or in the pharmaceutical containers should be physically removed or permanently disabled before being sold to consumers.</li>
	<li><b>Tracking of manufactured goods</b> from the point of manufacture to the location where they will be shelved for sale. RFID tags could help insure that products are not lost or stolen as they move through the supply chain. The tags could also assure the goods are handled appropriately. Tags should be confined to the outside of product packaging (not embedded in the packaging) and be permanently destroyed before consumers interact with them in the store.</li>
	<li><b>Detection of items containing toxic substances</b> when they are delivered to the landfill. For example, when a personal computer is brought to the landfill, a short-range RFID tag could communicate toxic content to a reader at the landfill. It is important to underscore that uses such as the landfill example do not require -- and should not entail -- item-level unique identifiers. The RFID tag would, rather, emit a generic recycling or waste disposal message. </li>
</ul>

  <p><b>CONCLUSIONS </b></p>
  <p>We are requesting manufacturers and retailers to agree to
    a voluntary moratorium on the item-level RFID tagging of consumer items until
    a formal technology assessment process involving all stakeholders, including
    consumers, can take place. Further, the development of this technology must
    be guided by a strong set of Principles of Fair Information Practice, ensuring
    that meaningful consumer control is built into the implementation of RFID.
    Finally, some uses of RFID technology are inappropriate in a free society,
    and should be flatly prohibited. Society should not wait for a crisis involving
    RFID before exerting oversight. </p>
  <p>Although not examined in this position paper, we must also
    grapple with the civil liberties implications of governmental adoption of
    RFID. The Department of Defense has issued an RFID mandate to its suppliers,
    schools and libraries in the have begun implementing RFID, the EU and the
    Japanese government have considered the use of RFID in currency, and British
    law enforcement has expressed an interest in using RFID as an investigative
    tool. As an open democratic society, we must adopt a strong policy framework
    based on Principles of Fair Information Practice to guide governmental implementation
    of RFID.</p>

    <div align="center"><p><strong>Signers</strong></p></div>


    <li>Katherine Albrecht, Director, CASPIAN, <a
href="http://www.spychips.org/">www.spychips.com</a><br />
    &nbsp;&nbsp;&nbsp;&nbsp; <b>Media Inquiries:</b> (877) 287-5854, <a href="mailto:kam@nocards.org">kma@nocards.org</a></li>

    <li>Liz McIntyre, Director of Communications, CASPIAN, <a href="http://www.nocards.org/">www.nocards.org</a><br />
    &nbsp;&nbsp;&nbsp;&nbsp <b>Media Inquiries:</b> (877) 287-5854, <a href="mailto:liz@nocards.org">liz@nocards.org</a></li>

    <li>Beth Givens, Director, Privacy Rights Clearinghouse, <a href="http://www.privacyrights.org">www.privacyrights.org</a><br />
    &nbsp;&nbsp;&nbsp;&nbsp; <b>Media Inquiries:</b> (619) 298-3396, <a href="mailto:bgivens@privacyrights.org">bgivens@privacyrights.org</a></li>

    <li>Lee Tien, Senior Staff Attorney, Electronic Frontier Foundation, <a href="http://www.eff.org/">www.eff.org</a><br />
    &nbsp;&nbsp;&nbsp;&nbsp; <b>Media Inquiries:</b> (415) 436-9333 x 102, <a href="mailto:tien&#64;&#101;&#102;&#102;&#46;&#111;&#114;&#103;">tien&#64;&#101;&#102;&#102;&#46;&#111;&#114;&#103;</a></li>

    <li>Barry Steinhardt, Director of the Technology and Liberty Program, American Civil Liberties Union (ACLU), <a href="http://www.aclu.org">www.aclu.org</a></li>
    <li>Kenneth J. Benner, President, American Council on Consumer Awareness, Inc., <a href="mailto:accaus@aol.com">accaus@aol.com</a></li>

    <li>Paula Bruening, Staff Counsel, Center for Democracy and Technology, <a href="http://www.cdt.org">www.cdt.org</a></li>

    <li>Ken McEldowney, Executive Director, Consumer Action, <a href="http://www.consumer-action.org">www.consumer-action.org</a></li>

    <li>James Love, Director, Consumer Project on Technology, <a href="http://www.cptech.org">www.cptech.org</a> </li>

    <li>Chris Hoofnagle, Associate Director, Electronic Privacy Information Center (EPIC), <a href="http://www.epic.org">www.epic.org</a></li>

    <li>Simson Garfinkel, Author, <u>Database Nation</u> </li>

    <li>Edward Hasbrouck, Author, <u>The Practical Nomad</u>, travel writer and consumer advocate <a href="http://hasbrouck.org/">www.hasbrouck.org</a></li>

    <li>Jason Catlett, President and Founder, Junkbusters Corp., <a href="http://www.junkbusters.com">www.junkbusters.com</a></li>

    <li>Paul J. Schlaver, Chair, Massachusetts Consumers\' Coalition, <a href="http://www.massconsumers.org/">www.massconsumers.org</a></li>

    <li>Jonathan D. Abolins, Author, &quot;Meyda Online: Info Security, Privacy, and Liberties Studies,&quot; <a href="http://www.meydaonline.com">www.meydaonline.com</a></li>

    <li>Kathleen Thuner, President, National Association of Consumer Agency Associates (NACAA), <a href="http://www.nacaanet.org/">www.nacaanet.org</a></li>

    <li>Deborah Pierce, Executive Director, PrivacyActivism, <a href="http://www.privacyactivism.org/">www.privacyactivism.org</a> </li>

    <li>Evan Hendricks, Editor, Privacy Times, <a href="http://www.privacytimes.com">www.privacytimes.com</a></li>

    <li>Robert Bulmash, President &amp; Founder, Private Citizen, Inc., <a href="http://privatecitizen.com/">www.privatecitizen.com</a></li>

    <li>Virginia Rezmierski, Ph.D., Ann Arbor, Michigan</li>

    <li>Pam Dixon, Executive Director, World Privacy Forum, <a
href="www.worldprivacyforum.org">www.worldprivacyforum.org</a> </li>
</ul>
<br />
<hr size="1" />
  <p><b>Attachment 1</b></p>
  <p>November 14, 2003</p>
  <h1>Limitations of RFID Technology : Myths Debunked</h1>
  <p>The following technological limitations have been proposed as reasons why
    consumers should not be concerned about RFID deployment at this time. We
    address each perceived limitation in turn, and explain why in themselves,
    these limitations cannot be relied upon as adequate consumer protection from
    the risks outlined above. </p>
  <p><b>1. Read-range distances are not sufficient to allow for consumer surveillance.</b></p>
  <p>RFID tags have varying read ranges depending on their antenna size, transmission
    frequency, and whether they are passive or active. Some passive RFID tags
    have read ranges of less than one inch. Other RFID tags can be read at distances
    of 20 feet or more. Active RFID tags theoretically have very long ranges.
    Currently, most RFID tags envisioned for consumer products are passive with
    read ranges of under 5 feet.</p>
  <p>Contrary to some assertions, tags with shorter read ranges are not necessarily
    less effective for tracking human beings or items associated with them. In
    fact, in some cases a shorter read range can be more powerful. For example,
    if there were an interest in tracking individuals through their shoes as
    they come within range of a floor reader, a two-inch read range would be
    preferable to a two-foot read range. Such a short range would help minimize
    interference with other tags in the vicinity, and help assure the capture
    of only the pertinent tag positioned directly on the reader.</p>
  <p><b>2. Reader devices not prevalent enough to enable seamless human tracking.</b></p>
  <p>The developers of RFID technology envision a world where RFID readers form
    a &quot;pervasive global network&quot; It does not take a ubiquitous reader
    network to track objects or the people associated with them. For example,
    automobiles traveling up and down Interstate 95 can be tracked without placing
    RFID readers every few feet. They need only be positioned at the entrance
    and exit ramps. Similarly, to track an individual\'s whereabouts in a given
    town, it is not necessary to position a reader device every ten feet in that
    town, as long as readers are present at strategic locations such as building
    entrances. </p>
  <p><b>3. Limited information contained on tags.</b></p>
  <p>Some RFID proponents defend the technology by pointing out that the tags
    associated with most consumer products will contain only a serial number.
    However, the number can actually be used as a reference number that corresponds
    to information contained on one or more Internet-connected databases. This
    means that the data associated with that number is theoretically unlimited,
    and can be augmented as new information is collected. </p>
  <p>For example, when a consumer purchases a product with an EPC-compliant RFID
    tag, information about the consumer who purchased it could be added to the
    database automatically. Additional information could be logged in the file
    as the consumer goes about her business: &quot;Entered the Atlanta courthouse
    at 12:32 PM,&quot; &quot;At Mobil Gas Station at 2:14 PM,&quot; etc. Such
    data could be accessed by anyone with access to such a database, whether
    authorized or not. </p>
  <p><b>4. </b><b>Passive tags cannot be tracked
      by satellite.</b></p>
  <p>The passive RFID tags envisioned for most consumer products do not have
    their own power, meaning they must be activated and queried by nearby reader
    devices. Thus, by themselves, passive tags do not have the ability to communicate
    via satellites.</p>
  <p>However, the information contained on passive RFID tags could be picked
    up by ambient reader devices which in turn transmit their presence and location
    to satellites. Such technology has already been used to track the real-time
    location of products being shipped on moving vehicles through the North American
    supply chain.</p>
  <p>In addition, active RFID tags with their own power source can be enabled
    with direct satellite transmitting capability. At the present time such tags
    are far too expensive to be used on most consumer products, but this use
    is not inconceivable as technology advances and prices fall.<br />
      <br />
</p>
  <p><b>5. High cost of tags make them prohibitive for wide-scale deployment.</b></p>
  <p>RFID developers point to the &quot;high cost&quot; of RFID tags as a way
    to assuage consumer fears about the power of such tags. However, as technology
    improves and prices fall, we predict that more and more consumer products
    will carry tags and that those tags will become smaller and more sophisticated.
    We predict that the trend will follow the trends of other technical products
    like computers and calculators. </p>

<hr size="1" />
  <br clear=ALL />
  <p><b>RFID Position Paper</b></p>
  <p><b>Attachment 2</b></p>
  <p>
  <p>A Critique
      of Proposed Industry Solutions</b></p>
  <p>The RFID industry has suggested a variety of solutions to address the dangers
    posed by RFID tagging of consumer products. Among them are killing the tags
    at point of sale, the use of &quot;blocker tags,&quot; and the &quot;closed
    system.&quot; We examine each strategy in turn.<br />
    <br />
    <b>KILLING TAGS AT POINT OF SALE</b><br />
    <br />
Some have proposed that the RFID tag problem could be solved by killing the tags
at the point of sale, rendering them inoperable. There are several reasons why
we do not believe this approach alone and without other protections will adequately
protect consumer privacy:</p>
  <p>Killing tags after purchase does not address in-store
      tracking of consumers.</i><br />
      <br />
</p>
  <p>To date, nearly all consumer privacy invasion associated
    with RFID tagging of consumer products has occurred within the retail environment,
    long before consumers reached the checkout counter where chips could be killed.
    Examples include:</p>
<ul>
	<li>Close-up photographs were taken of consumers as they picked up RFID-tagged packages of Gillette razor products from store shelves equipped with Auto-ID Center &quot;smart shelf&quot; technology.<a href="#_ftn1" name="_ftnref1" title="">[1]</a></li>
	<li>A video camera trained on a Wal-Mart cosmetics shelf in Oklahoma enabled distant Procter and Gamble executives to observe unknowing customers as they interacted with RFID-tagged lipsticks.<a href="#_ftn2" name="_ftnref2" title="">[2]</a> </li>
	<li>Plans are underway to tag books and magazines with RFID devices to allow detailed in-store observation of people browsing reading materials<a href="#_ftn3" name="_ftnref3" title="">[3]</a>. This potential was demonstrated recently at the Tokyo International Book Fair 2003. According to Japan\'s <i>Nikkei Electronic News</i>, "By placing tag readers on the shelves of bookstores, the new system allows booksellers to gain information such as the range of books a shopper has browsed, how many times a particular title was picked up and even the length of time spent flipping through each book."</li>
</ul>

  <p>We recognize the need for stores to control shoplifting
    and make general assessments to enhance operations. However, monitoring and
    recording the detailed behaviors of consumers without their consent, even
  if only within the store, violates Principles of Fair Information Practice.</p>
  <p>Tags can appear to be "killed" when they are really &quot;asleep&quot; and
      can be reactivated</i></p>
  <p>Some RFID tags have a "dormant" or "sleep" state that
    could be set, making it appear to the average consumer that the tag had been
    killed. It would be possible for retailers and others to claim to have killed
    a tag when in reality they had simply rendered it dormant. It would be possible
    to later reactivate and read such a "dormant" tag. </p>
  <p><i>The tag killing option could be easily halted by government directive.</i><br />
    <br />
</p>
  <p>It would take very little for a security threat or a change in governmental
    policies to remove the kill-tag option. If RFID tags are allowed to become
    ubiquitous in consumer products, removing the kill option could enable the
    instant creation of a surveillance society. <br />
    <br />
    <i>Retailers might offer incentives or disincentives to consumers to encourage
    them to leave tags active.</i></p>
  <p>Consumers wishing to kill tags could be required to perform
    additional steps or undergo burdensome procedures, such as waiting in line
    for a &quot;killer kiosk&quot;<a
href="#_ftn4" name="_ftnref4" title="">[4]</a> and then being required to kill
    the tags themselves. Consumers who choose to kill the tags might not enjoy
    the same discounts or benefits as other consumers, or might not be allowed
    the same return policies. In many areas of privacy law, this retailer incentive
    is recognized, and there are legislative prohibitions against inducing the
    consumer to waive their privacy rights.<a
href="#_ftn5" name="_ftnref5" title="">[5]</a> <br />
      <br />
</p>
  <p><i>The creation of two classes of consumers.</i></p>
  <p>If killing tags requires conscious effort on the part
    of consumers, many will fail to do so out of fear, ignorance, or lack of
    time. Many will choose <i>not</i> to kill the tags if doing so is inconvenient.
    (The current "killer kiosk" requires loading one item at a time, a lengthy
    and time consuming process.) This would create two classes of consumers:
    those who "care enough" to kill the RFID tags in their products and those
    who don\'t. Being a member of either class could have negative ramifications.<br />
      <br />
      <b>BLOCKER TAGS</b><br />
      <br />
RFID blocker tags are electronic devices that should theoretically disrupt the
transmission of all or select information contained on RFID tags. The proposed
blocker tag might be embedded in a shopping bag, purse, or watch that is carried
or worn near tags with information consumers want blocked.<a
href="#_ftn6" name="_ftnref6" title="">[6]</a> </p>
  <p>
  <p>According to our understanding, the blocker tag does
    not yet exist. Until a blocker tag is built and tested, there is no way to
    know how effective it will be and whether it can be technically defeated.</p>
  <p>
  <p>The blocker tag might encourage the proliferation of
    RFID devices by giving consumers a false sense of security. While the proposed
    invention is an ingenious idea, it\'s one that could be banned or be underutilized
    if consumers become complacent. It\'s also possible that such an electronic
    device could be technically defeated either purposefully or because it stops
    functioning naturally.</p>
  <p>The blocker tag could be banned by government directive
      or store policy.</i></p>
  <p>Consumers could lose the right to use blocker tag devices
    if the government deems that knowing what people are wearing or carrying
    is necessary for national security. They might disallow the devices altogether
    or name selective spaces in which blocker tags would be disallowed. It is
    not inconceivable to imagine a ban on such devices in airports or public
    buildings, for example.</p>
  <p>Retail stores might ban blocker tags if they believe
    the tags might be used to circumvent security measures or if they believe
    knowing details about consumers is valuable in their marketing efforts.</p>
  <p>Once RFID tags and readers are ubiquitous in the environment,
    a full or partial ban on a privacy device like the blocker tag would leave
    consumers exposed and vulnerable to privacy invasion.</p>
  <p>
  <p>A blocker tag shifts the burden of protecting privacy
    away from the manufacturers and retailers and places it on the shoulders
    of consumers. In addition, busy consumers might forget to carry blocker devices
    or forget to implement them, especially if additional steps are required
    to make them effective.</p>
  <p>Fails to protect consumers once products are separated
      from the blocker tag.</i></p>
  <p>Blocker tags theoretically work only when they are close
    to the items they are designed to "conceal" from RFID reader devices. Once
    items are out of the range of the blocking device, consumers would be exposed
    and vulnerable to privacy invasion. For example, a consumer might buy a sweater
    and feel that the information on the embedded RFID tag is unexposed because
    she is carrying it home in a bag impregnated with a blocker device. However,
    once she removes that sweater from the bag and wears it in range of a reader
    device, information from that tag could be gleaned.</p>
  <p><i>The creation of two classes of consumers.</i></p>
  <p>Like the kill tag feature, blocker tags will also likely
    create two classes of consumers, those who block tags and those who do not.</p>
  <p>
    <b>CLOSED SYSTEM</b></p>
  <p>Industry proponents argue that when RFID applications
    are confined to closed systems, the data is only accessible to those within
    the system and those with a government mandate (perhaps via legislation such
    as the Communications Access to Law Enforcement Act (CALEA)). Therefore they
    argue, society-wide profiling and tracking are not likely. An example of
    a current closed application is RFID in libraries. <i>The Grapes of Wrath</i> in
    Library X has a different code than the same book in Library Y.<br />
      <br />
Whereas today RFID applications are confined to closed systems, there will be
great incentives to standardize product level tagging. Publishers, for example,
may someday ship books to libraries and bookstores with writable tags. Each copy
of <i>The Grapes of Wrath</i> will contain a portion of its EPC code that is
the same as every other copy. The library will be able to customize the remainder
of the code to suit its own inventory control purposes.</p>
  <p>Even if closed systems remain closed, their lack of transparency
    makes them troubling from a privacy perspective. Because details about closed
    systems might not be readily available, consumers could have difficulty obtaining
    the information necessary to assess privacy risks and protect themselves.</p>
  <p>
  <p>We appreciate that industry proponents are making an
    effort to address consumer privacy and civil liberties concerns associated
    with RFID technology. However, while we believe the proposed solutions are
    offered in the proper spirit, they provide inadequate protection. Until appropriate
    solutions are developed and agreed upon, we believe it is improper to subject
    consumers to the dangers of RFID technology through item-level consumer product
    tagging.</p>
  <p>
</div>
<br clear=all>
<hr size=1 />
<div id=ftn1><a name="_ftn1" href="#_ftnref1">[1]</a>Alorie Gilbert, "Cutting edge \'smart shelf\' test ends." CNET News, August 22, 2003.  Available online at <a href="http://news.com.com/2100-1008_3-5067253.html">http://news.com.com/2100-1008_3-5067253.html</a>
</div>
<div id=ftn2>
<a name="_ftn2" href="#_ftnref2">[2]</a> Howard Wolinsky, "P&amp;G, Wal-Mart store did secret test of RFID." The Chicago Sun Times, November 10, 2003. Available online at <a href="http://www.suntimes.com/output/lifestyles/cst-nws-spy09.html">http://www.suntimes.com/output/lifestyles/cst-nws-spy09.html</a>
</div>
<div id=ftn3>
<a name="_ftn3" href="#_ftnref3">[3]</a> Winston Chai, "Tags track Japanese shoppers." CNET News, May 8, 2003. Available online at <a href="http://news.zdnet.co.uk/business/0,39020645,2134438,00.htm">http://news.zdnet.co.uk/business/0,39020645,2134438,00.htm</a>
</div>
<div id=ftn4>
<a name="_ftn4" href="#_ftnref4">[4]</a> NCR prototype kiosk kills RFID tags." RFID Journal, September 25, 2003.  Available online at
<a href="http://www.rfidjournal.com/article/articleview/585/1/1/">http://www.rfidjournal.com/article/articleview/585/1/1/</a>
</div>
<div id=ftn5>
<a name="_ftn5" href="#_ftnref5">[5]</a> See e.g., California SB 27, codified at 1798.84 (a).
</div>
<div id=ftn6>
<a name="_ftn6" href="#_ftnref6">[6]</a> RFID blocker tags developed." Silicon.com, August 28, 2003.  Available online at <a href="http://www.silicon.com/software/applications/0,39024653,10005771,00.htm">http://www.silicon.com/software/applications/0,39024653,10005771,00.htm</a>
</div>
</div>
';

global $REQUEST_URI;
$smarty->assign('content',$content);
$smarty->display('generic.tpl',$REQUEST_URI);

?>
