{"id":12244,"date":"2020-05-14T08:48:11","date_gmt":"2020-05-14T08:48:11","guid":{"rendered":"https:\/\/rfid4u.com\/?page_id=12244"},"modified":"2020-07-21T11:57:12","modified_gmt":"2020-07-21T11:57:12","slug":"mod-3-rfid-privacy-safety-security-what-is-tested","status":"publish","type":"page","link":"https:\/\/rfid4u.com\/mod-3-rfid-privacy-safety-security-what-is-tested\/","title":{"rendered":"Mod 3 \u2013 RFID Privacy, Safety &#038; Security \u2013 What is tested"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589438219221{background-image: url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/background.png?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Preparation for RFID Certification Exam&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Mod 3 \u2013 RFID Privacy, Safety &amp; Security \u2013 What is tested&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;default-list&#8221;][vc_row el_class=&#8221;commonshadow&#8221; css=&#8221;.vc_custom_1595332236521{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-radius: 10px !important;}&#8221;][vc_column][vc_single_image image=&#8221;15007&#8243; el_class=&#8221;myiconsize&#8221;][vc_empty_space][vc_custom_heading text=&#8221;SCOPE&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;15px&#8221;][vc_column_text]RFID is the exchange of\u00a0data\u00a0between an\u00a0item\u00a0and a reader which then hands off that data to another system for processing. That data may be used to identify an individual person directly (e.g. an employee badge) or to indirectly derive a person\u2019s identity (e.g. a credit card number which leads to the person). Such data needs to be carefully managed in order to comply with any regulatory requirements and also to respect the individual\u2019s right to privacy.<\/p>\n<p>RFID equipment uses electric current to operate and radiates energy when seeking tags of exchanging data, so it is important that all RFID equipment is operated safely, in line with health and safety regulations and without any adverse impact on the surrounding environment.<\/p>\n<p>The exchange of RFID data by radio transmission could be subject to unauthorized interception of the transmission and capture of the data being exchanged. While this would require sophisticated equipment and techniques, it must still be guarded against.[\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=&#8221;35&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_row_inner el_class=&#8221;commonshadow&#8221; css=&#8221;.vc_custom_1595332260274{padding: 30px !important;border-radius: 10px !important;}&#8221;][vc_column_inner][vc_single_image image=&#8221;15008&#8243; el_class=&#8221;myiconsize&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;WHAT YOU ARE EXPECTED TO KNOW&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;15px&#8221;][vc_column_text el_class=&#8221;liststyledisk&#8221;]<\/p>\n<div class=\"su-list\">\n<ul>\n<li>What are the potential privacy issues that may arise in a RFID implementation?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Why is it important to protect data that can identify a person?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>What are the potential safety issues that can arise from the use of RFID equipment?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Could data exchanged between a reader and a\u00a0tag\u00a0be intercepted?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>What are the potential problems of intercepted data?<\/li>\n<\/ul>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_row_inner el_class=&#8221;commonshadow&#8221; css=&#8221;.vc_custom_1595332260274{padding: 30px !important;border-radius: 10px !important;}&#8221;][vc_column_inner][vc_single_image image=&#8221;15009&#8243; el_class=&#8221;myiconsize&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;WHAT YOU ARE NOT EXPECTED TO KNOW&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;15px&#8221;][vc_column_text el_class=&#8221;liststyledisk&#8221;]<\/p>\n<div class=\"su-list\">\n<ul>\n<li>Specific privacy regulations for a country or region<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Specific safety regulations for a country or region<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Methods by which RFID data could be intercepted<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Methods by which RFID data could be protected during transmission<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Methods by which RFID data could be encrypted<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>How to interpret encrypted data<\/li>\n<\/ul>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589438219221{background-image: url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/background.png?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Preparation for RFID Certification Exam&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Mod 3 \u2013 RFID Privacy, Safety &amp; Security \u2013 What is tested&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;default-list&#8221;][vc_row el_class=&#8221;commonshadow&#8221; css=&#8221;.vc_custom_1595332236521{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-radius: 10px !important;}&#8221;][vc_column][vc_single_image image=&#8221;15007&#8243; el_class=&#8221;myiconsize&#8221;][vc_empty_space][vc_custom_heading text=&#8221;SCOPE&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;15px&#8221;][vc_column_text]RFID is the exchange of\u00a0data\u00a0between [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-12244","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/12244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/comments?post=12244"}],"version-history":[{"count":0,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/12244\/revisions"}],"wp:attachment":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/media?parent=12244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}