{"id":12248,"date":"2020-05-14T09:00:29","date_gmt":"2020-05-14T09:00:29","guid":{"rendered":"https:\/\/rfid4u.com\/?page_id=12248"},"modified":"2024-11-06T11:58:36","modified_gmt":"2024-11-06T11:58:36","slug":"cheat-sheet-rfid-safety-security","status":"publish","type":"page","link":"https:\/\/rfid4u.com\/cheat-sheet-rfid-safety-security\/","title":{"rendered":"Cheat Sheet \u2013 RFID Privacy, Safety &#038; Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589438219221{background-image: url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/background.png?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Preparation for RFID Certification Exam&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Cheat Sheet \u2013 RFID Privacy, Safety &amp; Security&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row gap=&#8221;30&#8243; el_class=&#8221;default-list&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;MAIN OBJECTIVES&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<\/p>\n<ul>\n<li>What are the potential privacy issues that may arise in a RFID implementation?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Why is it important to protect\u00a0data\u00a0that can identify a person?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>What are the potential safety issues that can arise from the use of RFID equipment?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Could data exchanged between a reader and a\u00a0tag\u00a0be intercepted?<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>What are the potential problems of intercepted data?<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1589440356193{border-left-width: 3px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 0px !important;padding-left: 20px !important;background-color: #f6f6f6 !important;border-left-color: #ff871c !important;border-left-style: solid !important;border-radius: 5px !important;}&#8221;][vc_column_inner][vc_custom_heading text=&#8221;Download the Cheat Sheet in PDF&#8221; font_container=&#8221;tag:p|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;Download&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ff871c&#8221; custom_text=&#8221;#ffffff&#8221; link=&#8221;url:%2Fwp-content%2Fuploads%2F2016%2F06%2F3-Cheat-Sheet-RFID-Safety-Security.pdf&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row gap=&#8221;30&#8243; el_class=&#8221;default-list&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;POTENTIAL RFID PRIVACY ISSUES&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<\/p>\n<div class=\"wpb_wrapper\">\n<p>RFID is the exchange of data between an\u00a0item\u00a0and a reader which then hands off that data to another system for processing. That data may be used to identify an individual person directly (e.g. an employee badge) or to indirectly derive a person\u2019s identity (e.g. a credit card number which leads to the person). Such data needs to be carefully managed in order to comply with any regulatory requirements and also to respect the individual\u2019s right to privacy.<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;WHY IT IS IMPORTANT TO PROTECT DATA THAT CAN IDENTIFY A PERSON&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Privacy laws<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Possibility of identity theft<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Possibility of data theft and misuse (stolen credit card number and unauthorized use of funds, unauthorized access to buildings, unauthorized access to information, and liability derived from these acts, etc.)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=&#8221;30&#8243;][vc_column][vc_custom_heading text=&#8221;POTENTIAL SAFETY ISSUES AND RELATED REGULATIONS&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]RFID equipment uses electric current to operate and radiates energy when seeking tags of exchanging data, so it is important that all RFID equipment is operated safely, in line with health and safety regulations and without any adverse impact on the surrounding environment.<\/p>\n<p>To ensure that your installed system is safe, make sure that:<\/p>\n<div class=\"su-list\">\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>All hardware is installed and operated in accordance with manufacturer\u2019s specifications.<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Hardware using electrical current is grounded.<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>You follow safety requirements of the location.<\/li>\n<\/ul>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space][vc_custom_heading text=&#8221;There are many regulations and standards related to operation of electric and wireless technologies, below are the main ones:&#8221; font_container=&#8221;tag:h5|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_row_inner gap=&#8221;30&#8243; el_class=&#8221;default-list&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>FCC\u00a0<\/strong>\u2013\u00a0<strong>Part 15.247-i<\/strong>\u00a0Limits of exposure to radio\u00a0frequency\u00a0energy levels<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>ICNIRP<\/strong>\u00a0\u2013 The International Commission on Non-Ionizing Radiation Protection (allied to WHO)\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>Frequencies under 10 MHz can have effects on\u00a0<strong>central nervous system<\/strong>\u00a0due to electric current flow in the human body. The exposure to low frequencies cannot be time-averaged.<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Frequencies above 100 kHz can have a\u00a0<strong>warming effect<\/strong>\u00a0on the human body. Can be time averaged.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>Military specs<\/strong>\u00a0(complying with ANSI\/IEEE)\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>Safe dosimetric parameter for exposure to RF fields is\u00a0<strong>4 W\/kg<\/strong>\u00a0for controlled exposure and\u00a0<strong>0.08 W\/kg<\/strong>\u00a0for uncontrolled exposure. This ensures at least the safety factor of 10 below the body specific absorption rate, which is 4 watts per kilogram (W\/kg).<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Example: 200 pound (90 kg) person \u2013 7.2 W safe exposure, 110 pound (50 kg) person \u2013 4 W safe exposure,\u00a0Safe distance from\u00a0UHF\u00a0antenna\u00a0\u2013 9 inches<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>ATEX \u2013\u00a0<\/strong>The\u00a0ATEX Directive\u00a0consists of two\u00a0EU\u00a0directives\u00a0describing what equipment and work environment is allowed in an environment with an\u00a0explosive\u00a0atmosphere.\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>ATEX derives its name from the\u00a0French\u00a0title of the 94\/9\/EC directive:\u00a0<em>Appareils destin\u00e9s \u00e0 \u00eatre utilis\u00e9s en\u00a0ATmosph\u00e8res\u00a0Explosibles<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>\n<ul>\n<li>US equivalent of ATEX are<strong>\u00a0Explosion Proof (Class 1 Div 1) and Intrinsically Safe\u00a0<\/strong>ratings for devices operating in defined areas:\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>C1D1 \u2013\u00a0<strong>Class 1, Division 1<\/strong>\u00a0\u2013 An area where ignitable concentrations of flammable gases, vapors or liquids can exist all of the time or some of the time under normal operating conditions.<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>C1D2 \u2013\u00a0<strong>Class 1, Division 2<\/strong>\u00a0\u2013 An area where ignitable concentrations of flammable gases, vapors or liquids are not likely to exist under normal operating conditions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>IEC-EX<\/strong>\u00a0\u2013 International Electrotechnical Commission sets standards for equipment operating in Explosive Environment<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>HERO<\/strong>\u00a0\u2013 Hazards of Electromagnetic Radiation to Ordnance (HERO)<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>TEMPEST<\/strong>\u00a0\u2013\u00a0<strong>A<\/strong>\u00a0National Security Agency\u00a0specification and a\u00a0NATO\u00a0certification\u00a0referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>IP \u2013 INGRESS PROTECTION<\/strong>\u00a0(protection of equipment) \u2013 The IP number is composed of two numbers, the first referring to the protection against solid objects and the second against liquids. The higher the number, the better the protection. For instance: IP67 (6 = Total protection against dust, 7 = Protected against the effect of immersion between 15cm and 1m).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner gap=&#8221;30&#8243; el_class=&#8221;default-list&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;DATA INTERCEPTION&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>FCC\u00a0<\/strong>\u2013\u00a0<strong>Part 15.247-i<\/strong>\u00a0Limits of exposure to radio\u00a0frequency\u00a0energy levels<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>ICNIRP<\/strong>\u00a0\u2013 The International Commission on Non-Ionizing Radiation Protection (allied to WHO)\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>Frequencies under 10 MHz can have effects on\u00a0<strong>central nervous system<\/strong>\u00a0due to electric current flow in the human body. The exposure to low frequencies cannot be time-averaged.<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Frequencies above 100 kHz can have a\u00a0<strong>warming effect<\/strong>\u00a0on the human body. Can be time averaged.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>Military specs<\/strong>\u00a0(complying with ANSI\/IEEE)\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>Safe dosimetric parameter for exposure to RF fields is\u00a0<strong>4 W\/kg<\/strong>\u00a0for controlled exposure and\u00a0<strong>0.08 W\/kg<\/strong>\u00a0for uncontrolled exposure. This ensures at least the safety factor of 10 below the body specific absorption rate, which is 4 watts per kilogram (W\/kg).<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i>Example: 200 pound (90 kg) person \u2013 7.2 W safe exposure, 110 pound (50 kg) person \u2013 4 W safe exposure,\u00a0Safe distance from\u00a0UHF\u00a0antenna\u00a0\u2013 9 inches<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>ATEX \u2013\u00a0<\/strong>The\u00a0ATEX Directive\u00a0consists of two\u00a0EU\u00a0directives\u00a0describing what equipment and work environment is allowed in an environment with an\u00a0explosive\u00a0atmosphere.\n<ul>\n<li><i class=\"sui sui-caret-right\"><\/i>ATEX derives its name from the\u00a0French\u00a0title of the 94\/9\/EC directive:\u00a0<em>Appareils destin\u00e9s \u00e0 \u00eatre utilis\u00e9s en\u00a0ATmosph\u00e8res\u00a0Explosibles<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;DATA INTERCEPTION PROBLEMS&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Data replication<\/strong> \u2013 used for counterfeiting of products<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>Data theft and identity theft<\/strong> \u2013 used for financial theft, personal\u00a0gain\u00a0or to damage person\u2019s private life or business<\/li>\n<li><i class=\"sui sui-caret-right\"><\/i><strong>Data change<\/strong> \u2013 re-pricing products, changing identification of products, changing expiration dates on drugs, changing audit data (if housed on the tag).<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589438219221{background-image: url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/background.png?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Preparation for RFID Certification Exam&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Cheat Sheet \u2013 RFID Privacy, Safety &amp; Security&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row gap=&#8221;30&#8243; el_class=&#8221;default-list&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;MAIN OBJECTIVES&#8221; font_container=&#8221;tag:h3|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text] What are the potential privacy issues that may arise in a RFID implementation? Why is it important to protect\u00a0data\u00a0that can [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-12248","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/12248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/comments?post=12248"}],"version-history":[{"count":2,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/12248\/revisions"}],"predecessor-version":[{"id":19435,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/12248\/revisions\/19435"}],"wp:attachment":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/media?parent=12248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}