RFID Human Implants May Not Be Ethical
|
|
|
- Tyler Kelley
- 9 years ago
- Views:
Transcription
1 RFID Human Implants May Not Be Ethical RFID Technology, 2009 Kenneth R. Foster is a bioengineering professor at the University of Pennsylvania in Philadelphia and fellow at the Institute of Electrical and Electronics Engineers. Jan Jaeger is a former emergency room nurse and teaches at the University of Pennsylvania's School of Nursing. Radio-frequency identification (RFID) implants for medical purposes would be beneficial to patients with Alzheimer's, certain mental illnesses, and other special needs. But their use among the general population could open the door to unethical chipping practices. Some companies encourage or require employees to be implanted with RFID, and several government officials have discussed chipping guest workers in the United States. These scenarios depict the unethical use of RFID human implants, blurring the line between "voluntary" and coerced implantation and eroding bodily rights. Other harms include the dangers to privacy and the risk of identity theft. The alternative to human RFID implants, biometric scanners, are less ethically suspect and may be the ultimate solution. Wanted: Power-systems engineer with experience in high-power (5-100-kW) motor-controller design. Must be U.S. citizen and have valid ISO1443-compatible access-control RFID implant. Sound farfetched? Today, yes. A decade from now, maybe not. With the proliferation of radio-frequency identification technology and the recent, but increasing, use of implantable RFID chips in humans, we may already be on a path that would make such an ad commonplace in a 2017 issue of IEEE Spectrum. The benefits would be undeniable an implantable RFID chip, which is durable and about the size of a grain of rice, can hold or link to information about the identity, physiological characteristics, health, nationality, and security clearances of the person it's embedded in. The proximity of your hand could start your car or unlock your front door or let an emergency room physician know you are a diabetic even if you are unconscious. Once implanted, the chip and the information it contains are always with you you'd never lose your keys again. Do you really want to be required to have a foreign object implanted in your arm just to get or keep a job? A Darker Side But there is a darker side, namely the erosion of our privacy and our right to bodily integrity. After all, do you really want to be required to have a foreign object implanted in your arm just to get or keep a job? And once you have it, do you really want your employer to know whenever you leave the office? And do you want every RFID reader-equipped supermarket checkout counter to note your presence and your purchases? Until a couple of years ago, chipping humans was largely the domain of cybernetics provocateurs like
2 Kevin Warwick or hobbyists like Amal Graafstra... Then, in 2004, the U.S. Food and Drug Administration, which regulates medical devices in the United States, approved an RFID tag for implantation in humans as a means of accessing a person's health records. This tag, called VeriChip, is a short-range transponder that relies on the signal from a reader unit for its power supply. When exposed to a varying magnetic field from the reader, the chip powers itself up and repeatedly transmits a 16-digit code that is unique to the tag. According to the company, 2000 people have already had tags implanted. The VeriChip tag is part of a health information system called VeriMed. The code contained in the implanted chip points to a record in a database identifying the patient and containing that patient's health records. By scanning a person's chip, caregivers can retrieve an identification code that enables them to access the medical history of people who cannot otherwise communicate their identities speeding up their treatment and possibly saving their lives. VeriChip Corp., a subsidiary of Applied Digital Solutions, headquartered in Delray, Fla., is also promoting its device as a security measure. It has six clients around the world, five of which use the implant as a secondary source of authentication, says Keith Bolton, vice president of government and international affairs for VeriChip. The highest-profile example of this application came in 2004 when the attorney general of Mexico and 18 of his staff had chips implanted to allow them to gain access to certain high-security areas. The tag is also finding use as a kind of implanted credit card. In trendy nightclubs in the Netherlands, Scotland, Spain, and the United States, patrons can get "chipped" at a cost of about US $165 in one establishment. In future visits, "by the time you walk through the door to the bar," one proprietor told Britain's Daily Telegraph, "your favorite drink is waiting for you, and the bar staff can greet you by name." And the list of proposed applications could grow quickly. VeriChip is advancing a scheme to "chip" soldiers, as a replacement for a soldier's traditional dog tag, and a VeriChip officer has proposed chipping guest workers entering the United States. VeriChip Corp.'s well-meaning attempt to improve personal health care may serve as a beachhead to wider use. The Real Dangers Before too many of those suggestions become realities, we need to examine carefully the very real dangers that RFID implants could pose to our privacy and our freedom. If we don't figure out the risks and come up with ways to mitigate them, someone answering that ad for a power engineer may live in a world with considerably less privacy and feel compelled to have an implant just to be able to get a job.
3 The VeriChip tag's main use, as a means of identifying patients who might be unable to communicate with caregivers and of accessing their medical records, could clearly be lifesaving in emergency situations. As long as the patient has provided informed consent and the privacy of the patient's medical records is adequately protected, there are few ethical concerns with the technology. But VeriChip Corp.'s well-meaning attempt to improve personal health care may serve as a beachhead for wider use, and that expansion could create urgent ethical issues, particularly if an element of coercion enters into the process. Consider, for example, a proposal by Scott Silverman, CEO of VeriChip. In an interview on 16 May 2006 on Fox News Channel (a U.S. television network), he proposed implanting chips in immigrants and guest workers to assist the government in later identifying them. Shortly afterward, the Associated Press quoted President Álvaro Uribe of Colombia as telling a U.S. senator that he would agree to require Colombian citizens to be implanted with RFID chips before they could gain entry into the United States for seasonal work. Guest workers might ostensibly consent to having chips implanted. But would chipping them be truly voluntary? Such "voluntary" actions may determine a person's ability to earn a living, and the worker might not view the implantation as something he or she could refuse. What person facing poverty at home and given the prospect of a job in a different country would be in a position to argue? At a practical level, when chips are implanted in guest laborers, who pays for the cost of purchasing, implanting, and monitoring the chips in hundreds or thousands of poor migrants? If someone has an adverse reaction to the chip so that it has to be removed or replaced, who bears that cost? And who pays if the chips become obsolete or compromised by rampant cloning the illicit duplication of the supposedly unique device and have to be replaced? Affluent patrons of a trendy club might gladly pay to be chipped, but the situation would certainly be different for those pursuing temporary minimum-wage jobs in a foreign country. Silverman made his proposal, that immigrants and guest workers be implanted with RFID chips, amid a national debate in the United States about illegal immigration, focusing on impoverished Latin Americans in search of work. But might Silverman's proposition apply as well to electrical engineers or doctors, or other high-status individuals coming into the country for work? Who decides? Mandating guest workers to have RFID chips implanted in their bodies for identification purposes strikes us as coercive and opportunistic. That approach makes the RFID chip a branding device similar to what a cowboy uses when he sears the haunches of his cattle or the tattoos that the Nazis forced on their victims in concentration camps. It goes against the widely held belief in basic human rights and might even be interpreted as a violation of Article 3 of the United Nations' Universal Declaration of Human Rights, which affirms everybody's right to "life, liberty, and security of person." Social researchers are just beginning to study people's attitudes to implanted RFID. Christine Perakslis and Robert Wolk at Bridgewater State University, in Massachusetts, questioned 141 college students on their feelings about implanted RFID. Respondents were asked if they would be willing to have an implant to prevent ID theft, to combat terrorism, for other national security reasons, as a lifesaving device, or to ensure the safety of themselves and their families. About a third of the
4 respondents were willing to be implanted, while less than half of them were not. Wolk and Perakslis's subjects were the least comfortable with chipping as a cure for ID theft. The reasons that garnered the most support for getting chipped were to save their lives or to ensure the safety of their family. Another small survey in 2003 by Starr Roxanne Hiltz, professor of information systems at the New Jersey Institute of Technology, in Newark, and her colleagues found that 18 out of 23 people questioned objected to the idea of implantable chips as identification. Changing Yourself Some of the resistance has to do with feelings about modification to one's body. "If they are putting something inside of you," one respondent replied, "it's like you're changing yourself. It's not right." As the wide variety of acceptable and unacceptable piercings and tattoos found around the world attests, people of different backgrounds vary in their attitudes toward "changing yourself." Tattoos, an ID technology that is at least 4000 years old, share some key qualities with implanted RFID tags. Both could be used for the same purposes and are intended to be permanent they can be removed, but only with some difficulty and not without assistance. The only differences are that, compared with a tattoo, an RFID chip is invisible, may be easier to read surreptitiously, and is a little more difficult to duplicate. Yet we suspect most people, regardless of their feelings toward being chipped, would balk at the idea of accepting a machine-readable tattoo as a means of identification, even if such an indelible marking had some personal or societal benefit. There is no clear medical or business justification for chipping large populations of healthy people. If there were a societal benefit, could a government require individuals to modify their bodies? For public health purposes, the answer is yes. In the United States, for example, students must have certain immunizations before attending public school. But this example is the only instance we can think of. Could a health care-related implant such as the VeriChip tag become a public health imperative? Would that use lead down a slippery slope toward universal chipping? It seems unlikely. VeriChip Corp. does not, in fact, advocate universal chipping for medical purposes. The company's vice president of medical applications, Richard Seelig, estimates a U.S. market for VeriMed of 43 million to 45 million people less than one-sixth of the population. This group is made up of people who are more likely than others to wind up in the emergency room. These include cancer patients undergoing chemotherapy; people with pacemakers or other medical implants; and those who might be suffering some sort of cognitive impairment or loss of consciousness due to epilepsy, diabetes, or Alzheimer's disease. We believe that even Seelig's estimates of the potential size of the market for patient identification are grossly exaggerated. "For certain subpopulations Alzheimer's patients, the mentally ill, people with communication difficulties having an implanted identifier makes great sense," says John Halamka, a former emergency physician and now CIO at Beth Israel Deaconess Medical Center, in Boston. "Others can just carry a card in their wallet, a medic-alert bracelet, or a USB drive with their personal
5 health records. There is no clear medical or business justification for chipping large populations of healthy people." In fact, so far there is no clear evidence that the VeriChip will help patients facing medical emergencies. The first study designed to determine whether patients, physicians, and insurers benefit at all from VeriChip began only last fall, in New Jersey. Other nonimplanted technologies based on RFIDs may soon provide some of the benefits to the patient VeriChip hopes for. For instance, nonprofit health care informatics organization MedicAlert is researching RFID-enabled bracelets that would link to a personal health care record. However, as with VeriChip, a key question is how to ensure the privacy of the information in the databases, while at the same time providing easy access to the database by caregivers in emergency situations. Privacy Is at the Heart A right to privacy is at the heart of some of the questions raised by implanted RFID tags. In agreeing to be chipped for medical purposes, the patient gives up a measure of privacy for his or her own potential benefit. But when chipping is used for other reasons, difficult confidentiality issues can arise. When a business gives an identity card to a newly hired worker, for example, the company retains ownership of the card. But will the employer also own the chip inside an employee's body? A test case may be on the horizon: the first U.S. company to implant employees with VeriChip, CityWatcher.com, in Cincinnati, recently closed its doors. Its CEO, Sean Darks, himself an implantee, did not return repeated phone calls inquiring whether employees kept their implants after the company folded. VeriChip itself makes no recommendation about whether former employees should be "dechipped," says the company's Bolton. But he says removal is a quick and easy procedure. "I've had many [chips] in and out of my body," he says. Perhaps just as important a question as who owns the chip is that of who owns the data on the chip. Can the tag be read and its data used without the consent of the person who has it implanted? Fears that some individuals have expressed about being tracked through an implanted chip are probably unrealistic. The VeriChip and most other passive RFID devices, those that derive their power from the reader, provide only an identification number and can be probed only from very short distances. The VeriChip is readable only at 10 centimeters or less using its handheld scanner. This distance can be increased, however, using more efficient antennas. Digital Angel Corp., in St. Paul, Minn., also owned by VeriChip's parent company, Applied Digital Solutions, is developing a "walk-through" scanner with greater range. Nevertheless, the prospects of a "drive-by" theft of a person's identity seem remote, and even more remote is the possibility that the government or some other organization might track an individual moving about in ordinary life. Still, if the computer age has one lesson, it is that systems and data are invariably less secure than their proponents claim. Particularly troubling for a device that is being marketed for access control, the VeriChip lacks modern cryptographic and other protections and is prey to simple attacks. In a
6 recently published article in the Journal of the American Medical Informatics Association, Beth Israel's Halamka and colleagues showed how easily a simple-to-build device can scan the chip and replay the radio signal to fool a VeriChip reader. This flaw may be insignificant when the chip is being used for identification purposes for example, with an Alzheimer's patient. But Halamka and his coauthors argue forcefully that the chip should not be used for authentication purposes to control access to sensitive areas or information. Though for now they store nothing more than a number, inevitably, implanted RFID chips will store more data and databases will be created that link information on implanted chips to other facts about a person. It is easy to foresee situations in which even a simple identification number might lead to harm consider the millions of dollars lost to identity theft in the United States because of the disclosure of Social Security numbers and similar data. We have all already been issued our fingerprints. What Can We Do? So what can we do about implanted RFID's impending problems? Using legislation to restrict their use is an obvious measure; in fact, laws are already in the works. Faced with widespread public concerns about this technology, more than 10 U.S. states have enacted laws limiting implants. In May 2006, for example, Wisconsin passed a bill that would prohibit requiring anybody to have a microchip implanted. But laws might be difficult to enforce if implanted chips, like drivers' licenses, remain voluntary but become de facto requirements for many kinds of employment or services. And the Wisconsin law does nothing to allay worries about the loss of privacy. Governments may need to make the unauthorized reading of an implanted RFID tag illegal as well. Some of the ethical concerns can be addressed with better technology. Ari Juels, head of RSA Laboratories, the R&D arm of RSA Security, in Bedford, Mass., believes that, with proper encryption methods, a person's privacy can be preserved without decreasing the usefulness of the implant. Juels says that the ease with which a thief can steal a VeriChip radio signal makes the tag a poor security tool, but that it eliminates a thief's incentive to kidnap or carve someone up. So together with Halamka and others, he developed a technique that still lets a thief copy the chip's radio signal but at the same time keeps the actual ID number it represents safe. Lest you think criminals would not go to such extremes, in 2005 BBC News reported that thieves stole a car protected by a fingerprint-reading lock by chopping off the owner's finger. Halamka's solution, by the way, would make it impossible to track an implanted individual by noting which RFID readers at stores, doors, gas pumps picked up his or her radio signature. Crucial to Juels's technology is that the chip's radio signature changes unpredictably each time it's read, even though the bits it encodes remain the same.
7 But maybe the ultimate solution, to allow accurate identification of individuals without some of the ethical issues raised by implanted radio chips, might require a different technology completely biometric scanners. Although such devices are more costly than RFID-chip readers, they will inevitably become more affordable with time. And the "tags" are always going to be more competitive: after all, we have all already been issued our fingerprints. Further Readings Books Katherine Albrecht and Liz McIntyreThe Spychips Threat: Why Christians Should Resist RFID and Electronic Surveillance. Nashville, TN: Nelson Current, Jerry Banks, David Hanny, Manuel A. Pachano, and Les G. ThompsonRFID Applied. Hoboken, NJ: Wiley, Collin J. Bennett and David LyonPlaying the Identity Card: Surveillance, Security, and Identification in Global Perspective. New York: Routledge, Daniel M. DobkinThe RF in RFID: Passive UHF RFID in Practice. Boston: Elsevier/Newnes, Simson Garfinkel and Beth Rosenberg, Eds.RFID: Applications, Security, and Privacy. Upper Saddle River, NJ: Addison-Wesley, Bill Glover and Himanshu BhattRFID Essentials. Sebastopol, CA: O'Reilly, George RoussosUbiquitous and Pervasive Commerce: New Frontiers for Electronic Business. London: Springer, Periodicals Anna Bahney "High Tech, Under the Skin," New York Times, February 2, Sunil Chopra and Manmohan S. Sodhi "In Search of RFID's Sweet Spot," Wall Street Journal, March 3, David Coursey "Medical RFID Tagging Could Save Lives," eweek, October 15, Mark David "Identity Theft: RFID Muscles into Consumer Market," Electronic Design, February 15, Economist "Radio Silence," June 15, Michael Gardner "State Looks at Limiting Scanning Technology," San Diego Union-Tribune, August 19, Terry Gardner "RFID: A Technology to Help Bring Your Bag Home," Los Angeles Times, October 14, Amal Graafstra "Hands On," IEEE Spectrum, March William Norman Grigg "Terrorists Chip In," American Conservative, February 12, Jonathan Krim "Embedding Their Hopes in RFID," Washington Post, June 23, Bill Mongelluzzo "RFID's Big Bang: Use of the Technology Has Grown Since Wal-Mart's Directive, " Journal of Commerce, November, 7, Siobhan Morrissey "Are Microchip Tags Safe?" Time, October 18, Roy Want "The Magic of RFID," ACM Queue, October 2004.
8 Alec Wilkinson "Taggers," New Yorker, March 20, Lorrie Willey "RFID and Consumer Privacy: Let the Buyer Beware!" Journal of Legal, Ethical, and Regulatory Issues, July Full Text: COPYRIGHT 2009 Greenhaven Press, a part of Gale, Cengage Learning. Source Citation Foster, Kenneth R., and Jan Jaeger. "RFID Human Implants May Not Be Ethical." RFI D Technology. Ed. Roman Espejo. Detroit: Greenhaven Press, At Issue. Rpt. from "RFID Inside." IEEE Spectrum (Mar. 2007). Opposing Viewpoints in Context. Web. 4 Oct Document URL ilovertype=&query=&prodid=ovic&windowstate=normal&contentmodules =&display-query=&mode=view&displaygroupname=viewpoints&dviselect edpage=&limiter=&currpage=&disablehighlighting=&displaygroups=&a mp;sortby=&zid=&search_within_results=&p=ovic&action=e&catid =&activitytype=&scanid=&documentid=gale%7cej &source=bo okmark&u=cclc_reed&jsid=5a321064c4fdef49bcfcf874c404507c Gale Document Number: GALE EJ
9 Text: "ts for medical purposes would be beneficial to patients with Alzheimer's, certain mental illnesses, and other special needs. But their use among the general population could open the door to unethical chipping practices. Some companies encourage or require employees to be implanted with RFID, and several government officials have discussed chipping guest workers in the United States. These scenarios depict the unethical use of RFID human implants, blurring the line between "voluntary" and coerced implantation and eroding bodily rights. Other harms include the dangers to privacy and the risk of identity theft. The alternative to human RFID implants, biometric scanners, are less ethically suspect and may be the ultimate solution.wanted: Power-systems engineer with experience in high-power (5-100-kW) motor-controller design. Must be U.S. citizen and have valid ISO1443-compatible access-control RFID implant.sound farfetched? Today, yes. A decade from now, maybe not."
The murky ethics of implanted chips
biomedical RFID The murky ethics of implanted chips by Kenneth R. Foster & Jan Jaeger 24 IEEE Spectrum March 2007 NA www.spectrum.ieee.org gusto images Anatomy of an RFID Tag as an antenna and uses an
Small Tech, Big Issues
Small Tech, Big Issues How It Works Advantages of RFID History of the RFID Proposed Uses Identification Medical Records Immigration Security Authentication Ethical Issues Purchase tracking Lack of encryption
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)
DOC NO. INTERNET-31-05 DATE ISSUED: APRIL, 2005 RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID) Introduction The Trans Atlantic Consumer Dialogue (TACD) believes action is urgently needed to address
CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL
CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL Andrew S. Jensen Department of Computer Science College of Computing and Informatics University
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
AGING AND LOSS OF INDEPENDENCE
AGING AND LOSS OF INDEPENDENCE I can t do as many things as I used to do, but I m now learning to enjoy what I can do. Helen, 78 year-old grandmother Losses occur at every stage in life, particularly in
Copyfights: The Future of Intellectual Property in the Information Age
Copyfights: The Future of Intellectual Property in the Information Age Edited by Adam Thierer and Clyde Wayne Crews Jr., Washington, D.C.: Cato Institute, 2002, ISBN 1-930865-24-4, $10.95, pp. 295. Reviewed
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
Identity Theft. The Identity Theft Conundrum
Identity Theft The Identity Theft Conundrum Identity theft presents an inherent conundrum: The very attributes of modern commerce that consumers value and expect rapid, easy, 24-hour access to a wide variety
Micro-Chip Implant: Would you get one?
Micro-Chip Implant: Would you get one? Arslan Afzaal MAY 24, 2013 DE MONTFORT UNIVERSITY Leicester, UK Abstract Microchip implant is the process of implanting a chip into a human. The frequently used chip
10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
TechTarget Enterprise Applications Media. Pocket E-Guide
TechTarget Enterprise Applications Media Pocket E-Guide Data Breach Dangers: Learn to How to Protect Data and Lower Security Spending While most organizations today acknowledge the importance of information
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Using RFID Technology to Stop Counterfeiting
Using RFID Technology to Stop Counterfeiting By Eustace Asanghanwa, Crypto & RF Memory Applications Summary RFID technology is well known for providing labeling solutions to automate inventory control.
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery
Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery By Michael J. Wilson M.Sc. ehealth Candidate McMaster University Canadian Bioethics Society Conference
Data Protection Technical Guidance Radio Frequency Identification
Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology
HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION
WHITE PAPER HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION The goal of this white paper is to highlight the aspect of HIPAA that pertains to patient privacy and authentication and the technologies that
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
MULTICARE ASSOCIATES OF THE TWIN CITIES, P.A. NOTICE OF PRIVACY PRACTICES
MULTICARE ASSOCIATES OF THE TWIN CITIES, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
Understanding Grief Distinguishing between Primary and Secondary Loss
Understanding Grief Distinguishing between Primary and Secondary Loss Have you ever seen thousands of dominos fall over? Someone spends many hours setting up a complex series of dominos: round and round,
Employment Rights Under the Americans with Disabilities Act
DEVELOPED BY EQUIP FOR EQUALITY UNDER A GRANT PROVIDED BY THE ILLINOIS DEPARTMENT ON AGING DISCRIMINATION Employment Rights Under the Americans with Disabilities Act People with disabilities, including
Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
SOURCE ID RFID Technologies and Data Capture Solutions
SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology
Advance decisions, advance statements and living wills
Advance decisions, advance statements and living wills About this factsheet Advance decisions (sometimes referred to as living wills ) and advance statements are two ways to make sure others, including
Employment & Support Allowance. Physical Health Grounds
Employment & Support Allowance claims on Physical Health Grounds A guide to the Work Capability Assessment (Full January 2013 Changes) May 2013 Authors: Steve Donnison & Holiday Whitehead (Barrister) INDEX
Identity Theft Prevention and Security Breach Notification Policy. Purpose:
Identity Theft Prevention and Security Breach Notification Policy Purpose: Lahey Clinic is committed to protecting the privacy of the Personal Health Information ( PHI ) of our patients and the Personal
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document
Reproductive Medicine Associates of New Jersey, LLC
NOTICE OF PRIVACY PRACTICES Effective Date: September 20, 2013 Last Modified: May 12, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO
Why Disruptive Innovations Matter in Laboratory Diagnostics
Article: S. Nam.. Clin Chem 2015;61:935-937. http://www.clinchem.org/content/61/7/935.extract Guest: Spencer Nam is a Research Fellow specializing in healthcare at the Clayton Christensen Institute for
Policy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
RF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
Cardio-Pulmonary Resuscitation (CPR): A Decision Aid For. KGH Patients And Their Families
Cardio-Pulmonary Resuscitation (CPR): A Decision Aid For KGH Patients And Their Families The goal of this pamphlet is to provide information about cardiopulmonary resuscitation (CPR) so you can be adequately
Ethical Implications of Implantable Radiofrequency Identification (RFID) Tags in Humans
The American Journal of Bioethics, 8(8): 44 48, 2008 Copyright c Taylor & Francis Group, LLC ISSN: 1526-5161 print / 1536-0075 online DOI: 10.1080/15265160802317966 Target Article Ethical Implications
Long-Term Care: Frequently Asked Questions About Long- Term Care Insurance
FACT SHEET LTC: FAQ s About Long-Term Care Insurance (H-003) p. 1 of 5 Long-Term Care: Frequently Asked Questions About Long- Term Care Insurance Long-Term Care (LTC) insurance only pays for long-term
It s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
Privacy Implications of RFID Tags by Paul Stamatiou. CS4001, Georgia Institute of Technology November 8 th, 2007
Privacy Implications of RFID Tags by Paul Stamatiou CS4001, Georgia Institute of Technology November 8 th, 2007 Radio Frequency Identification (RFID) is a maturing wireless technology with widespread uses,
HIPAA RULES AND REGULATIONS
HIPAA RULES AND REGULATIONS INTRODUCTION Everyone who works in or around health care has heard about the HIPAA, the Health Insurance Portability and Accountability Act. And certainly, everyone who is in
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
LOS ANGELES COUNTY SHERIFF'S DEPARTMENT CIVILIAN VOLUNTEER APPLICATION -OFFICE USE ONLY
VOLUNTEER APPLICATION CHECK LIST NAME: ADDRESS: PHONE HOME: CDL: _EXP DATE: _ CELL: E-MAIL: DATE OF BIRTH: _/ / CITIZENSHIP: -OFFICE USE ONLY ACCEPTED/REJECTED: REASON: VOLUNTEER APPLICATION DATE: HIRE
I thank them for their openness, transparency, and willingness to work with WHO to address this newly emerging infection.
I N F L U E N Z A - L I K E I L L N E S S O U T B R E A K I N T H E U S A N D M E X I C O T r a n s c r i p t o f G L O B AL T E L E P H O N E N E W S C O N F E R E N C E w i t h D r M a r g a r e t C
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
Cash Flow Exclusive / September 2015
Ralf Bieler Co-Founder, President, CEO Cash Flow Exclusive, LLC My 2 Cents on The Best Zero-Cost Strategy to Improve Your Business To achieve better business results you don t necessarily need to have
JW Marriott Hotel Kuala Lumpur
JW Marriott Hotel Kuala Lumpur An exclusive report to be distributed with THE INDEPENDENT Transcript of the interview with: Mr Mahmoud Skaf General Manager WORLD REPORT: In your opinion, what is it about
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 3.24
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 3.24 Issued Date: 12-18-14 Effective Date: 12-18-14 Updated Date: SUBJECT: HUMAN TRAFFICKING PLEAC 4.5.1b,d 1. POLICY A. Human trafficking is a multi-billion dollar
THE READING HOSPITAL SPEAKERS BUREAU. Permit No. 203. Non-Profit Org. U.S. Postage PAID. Reading, PA
Non-Profit Org. U.S. Postage PAID Reading, PA Permit No. 203 THE READING HOSPITAL SPEAKERS BUREAU Knowledge can be a powerful tool in maintaining your health. We re committed to improving the health of
A Guide to Living Trusts How to avoid probate costs and protect your family s future with smart estate planning.
SECURE ESTATE SERVICES, LLC A Guide to Living Trusts How to avoid probate costs and protect your family s future with smart estate planning. Why it Pays to Avoid Probate Court How Does a Living Trust Work
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA
David W. Lincicum (California Bar No. 223566) Burke W. Kappler (D.C. Bar No. 471936) Federal Trade Commission 600 Pennsylvania Avenue, N.W. Mail Stop NJ-8122 Washington, D.C. 20580 [email protected] [email protected]
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
Code of Practice: Mental Health Act 1983
Code of Practice: Mental Health Act 1983 Easy Read version What is in this booklet About this booklet About the Mental Health Act About the Code of Practice Why the Code of Practice needs to change How
The Alliance Roundtable with U.S. Rep. Tammy Baldwin An Insider s View of Congressional Efforts to Reform Health Care
The Alliance Roundtable with U.S. Rep. Tammy Baldwin An Insider s View of Congressional Efforts to Reform Health Care The Alliance hosted a roundtable discussion on November 13 with U.S. Rep. Tammy Baldwin,
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Workplace Privacy Lesson Plan and Class Activity
Workplace Privacy Lesson Plan and Class Activity 2009 Consumer Action Seminar Purpose: Workplace Privacy Seminar To provide workshop participants with an awareness of when and how employers can monitor
The Prudential Insurance Company of America. Long-Term Care Insurance. Questions. concerning long-term care insurance 0163472-00002-00
The Prudential Insurance Company of America Long-Term Care Insurance 20 Questions concerning long-term care insurance 0163472 0163472-00002-00 1WHAT IS LONG-TERM CARE? Long-term care covers a wide range
Filing a Form I-751 Waiver of the Joint Filing Requirement of the Petition to Remove Conditions on Residence
Filing a Form I-751 Waiver of the Joint Filing Requirement of the Petition to Remove Conditions on Residence Prepared by: Northwest Immigrant Rights Project http://www.nwirp.org 615 Second Avenue, Suite
RECOMMENDATIONS COMMISSION
16.5.2009 Official Journal of the European Union L 122/47 RECOMMENDATIONS COMMISSION COMMISSION RECOMMENDATION of 12 May 2009 on the implementation of privacy and data protection principles in applications
RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005
RFID Security and Privacy Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005 1 RFID: The Industry s Vision. Distribution Center Consumer Docks
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
1. General Information About The Mitochondrial Disease Biobank
Name and Clinic Number IRB # 09-002265 00 Consent form approved November 6, 2013; This consent valid through August 6, 2014; 1. General Information About The Mitochondrial Disease Biobank Study Title:
JHSPH HUMAN SUBJECTS RESEARCH ETHICS FIELD TRAINING GUIDE
JHSPH HUMAN SUBJECTS RESEARCH ETHICS FIELD TRAINING GUIDE This guide is intended to be used as a tool for training individuals who will be engaged in some aspect of a human subject research interaction
Why and how to have end-of-life discussions with your patients:
Why and how to have end-of-life discussions with your patients: A guide with a suggested script and some basic questions to use The medical literature consistently shows that physicians can enhance end-of-life
(http://www.forbes.com/sites/louiscolumbus/2012/08/04/hype-cycle-for-cloud-computing-showsenterprises-finding-value-in-big-data-virtualization/)
5 Near Future Cloud Computing Trends Cloud computing has been around in one form or another for decades, but the idea has only started to take off in the last five to ten years. Like any newly popular
SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
The Conjectural November 2015 Transcript 1 of 5
The Conjectural November 2015 Transcript 1 of 5 Hello and welcome to The Conjectural an experiment to figure out a better way to decide what science news is and how we should talk about science. The data
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd
Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS
MCLE ON THE WEB. Netiquette Versus Cyber Ethics
cbjmcle46 4/7/05 3:34 PM Page 1 MCLE ON THE WEB ($20 PER CREDIT HOUR) TEST # 46 1 HOUR CREDIT LEGAL ETHICS To earn one hour of MCLE credit, read the substantive material, then download the test, answer
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
Harris County - Texas HIPAA Notice of Privacy Practices
Harris County - Texas HIPAA Notice of Privacy Practices Effective Date: September 23, 2013. THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS
