rsa-security-usa_en - March 31, 2005 Mr. Peter Schaar...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
March 31, 2005 Mr. Peter Schaar Chairman, Article 29 Data Protection Working Party Dear Mr. Schaar, I am writing to submit RSA Security’s comments on the “Working document on data protection issues related to RFID technology” (hereafter referred to as “the working document”), adopted by your Working Party on January 19 th . RSA Security, Inc. is a leader in helping organizations protect private information and manage the identities of the people and applications accessing and exchanging that information. RSA Security’s portfolio of solutions includes identity & access management, secure mobile & remote access, secure enterprise access, secure transactions and consumer identity protection. RSA Laboratories – the research centre of our company – has focused a major part of its activities in recent years on RFID technology, in particular to develop concepts and potential solutions that provide effective privacy and security safeguards. The present submission’s first section addresses general and fundamental technological issues related to privacy and security, while the second section comments on more detailed technological aspects. 1. Addressing privacy in the RFID context: now, not later RSA Security believes that RFID has the potential to become a profoundly transformational development: a ubiquitously RFID-tagged and networked world offers a revolutionary extension of the World Wide Web. It would become not just a World Wide Web of data , but also a World Wide Web of things . However, we also believe that, to allow RFID to fully deliver its promised benefits, we need to address security and privacy concerns. As a developer of RFID technological solutions, we agree with the working document’s assertion that “ while the deployers of an RFID application are ultimately responsible for the personal data gathered through the application in question, manufacturers of RFID technology and standardization bodies are responsible for ensuring that data protection/privacy compliant RFID technology is available for those who deploy the technology ” (p.12, section 5.)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
We believe that, because we are still at an early stage of the development and deployment of RFID technology, now is the best time for RFID manufacturers and deployers to start embedding privacy and security solutions in RFID standards and architectures. This would greatly facilitate acceptance of RFID by convincingly answering privacy concerns expressed notably in the working document. As a general rule, we believe that specific technological choices can only be
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/02/2011 for the course SECURITY 2354 taught by Professor Morganjones during the Spring '11 term at Ucla Venezuela.

Page1 / 4

rsa-security-usa_en - March 31, 2005 Mr. Peter Schaar...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online