rfid and privacy

24
RFID and Privacy Guidance for Health-Care Providers

Upload: petersam67

Post on 18-May-2015

4.065 views

Category:

Business


2 download

TRANSCRIPT

Page 1: RFID and Privacy

RFID and PrivacyGuidance for Health-Care Providers

Page 2: RFID and Privacy

Table of contentsForeword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4What is Privacy? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Informational privacy defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5How privacy is regulated in the health-care sector in Ontario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Obligations of the health-care sector in relation to personal health information . . . . . . . . . . . . . . . . . . . . . . . 6Obligations of electronic services providers in relation to personal health information . . . . . . . . . . . . . . . . . . . 6

What is Radio Frequency Identification (RFID)? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6RFID technology fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6RFID technology vs bar codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

RFID and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10RFID implementation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Privacy-relevant properties of RFID systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10General approach and framework to building privacy in early . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

RFID Applications in the Health Sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Tagging things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Privacy Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Examples of RFID Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Tagging things linked to people . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Privacy Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Examples of RFID Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Tagging people . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Privacy Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Examples of RFID Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Professional and Ethical Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22RFID Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Page 3: RFID and Privacy

ForewordOver the past several years, new applications of RFIDtechnology have been recognized as having thecapability to enhance health-care delivery. Someexamples are the improvement of equipment and deviceavailability, the tracking of pharmaceutical prescriptionsand dosages, and the increase of patient safety andsecurity, such as identification bracelets for infants andpatients. However, as the benefits associated with theuse of RFID continue to be acknowledged, concerns arealso being raised about the potential privacyimplications associated with this technology, such astagging people or tagging things linked to people.

In the autumn of 2006, I was approached by VictorGarcia, Chief Technology Officer for Hewlett Packard(HP) Canada, seeking the expertise of my office inhow potential privacy issues could be identified andsafeguards developed and implemented into the usageof RFID technology. I was more than willing tocontribute my insight and expertise because, asCommissioner, part of my mandate includes reachingout to external organizations. In addition to being oneof my most important duties, I have also found itbeneficial to assist both public and privateorganizations working on emerging technologies, andto always be proactive whenever possible—to developeffective guidelines and codes of conduct before anyproblems arise. Further, I was also interested inworking with HP given that it is an organization thattakes the protection of privacy very seriously, having ahistory of working alongside legislative and standardsbodies, partners, customers, and NGOs to help drivethe adoption of privacy principles to protect consumerprivacy rights. Specifically regarding HP’s work withRFID, I was encouraged by its corporate values in thatindividuals should always be given notice about thepresence of RFID tags, and where possible, have thechoice to remove or deactivate RFID tags. HP productswith an RFID tag on the box are always accompaniedby an EPCglobal logo, which alerts the consumer tothe presence of the tag. Lastly, I was also impressed bythe fact that my colleagues at HP and I share the samebelief—that being visible about RFID use will breedconfidence in the technology, while being secretive willheighten the misconceptions.

My work with RFID began in 2003 when I releasedTag, You’re It: Privacy Implications of Radio FrequencyIdentification (RFID) Technology, and I first identified thepotential privacy concerns raised by RFID technology.Since then, I have gone on to work with a number oforganizations such as EPCglobal Canada, with withwhom I consulted when I wrote Privacy Guidelines forRFID Information Systems (RFID Guidelines). My officehas also helped to shape policy and ideas, from RFID

tags in Ontario’s public libraries to lectures on how toimplement privacy protections in RFID systems. Thispublication is a continuation of my ongoing work withRFID. For many months, IPC and HP staff worked hardto examine questions regarding RFID privacyprotections. The result is this co-authored document.

The essential purpose of this publication is to assist thehealth-care sector in understanding the current andpotential applications of RFID technology, its potentialbenefits, its privacy implications, and steps that can betaken to mitigate potential threats to privacy. I, and myco-author, Victor Garcia at Hewlett Packard, sincerelybelieve that this document will serve as a world-classbenchmark for considerations relevant to theapplication of, and the privacy issues associated with,RFID technology in health care.

During the time I was working toward making thePersonal Health Information Protection Act (PHIPA) areality, I repeatedly stated that, “I believe in thenecessity of PHIPA not only because I am theCommissioner, but also because I am a patient.” Ibelieve that the same sentiment also applies to thisdocument. While I, as a patient, would welcome theprospect of RFID technology improving my health-careservices, I, as Commissioner, also believe that we mustensure the deployment of this technology does notinfringe upon our privacy.

Ann Cavoukian, Ph.D.Information and Privacy Commissioner of Ontario

About the AuthorsInformation and Privacy Commissioner of Ontario (IPC)In her mandate and role in relation to personal healthinformation, the IPC has the authority to overseecompliance with the Personal Health InformationProtection Act (PHIPA). The Act authorizes the IPC toreview complaints about a person who has contravenedor is about to contravene PHIPA, and review complaintsrelated to the right of individual access and correction.It also authorizes the IPC to engage in or to commissionresearch into matters affecting PHIPA, conduct publiceducation programs, and provide information on PHIPAand its role there under.

Hewlett Packard (HP)One of the world’s largest IT companies, HewlettPackard (HP) is not only involved in the development ofinnovative RFID technologies and applications, it isalso committed to improving health care by focusingon: delivering solutions that allow health-care providersbetter access to patient information by integratingsystems, data, processes and people; providing staffand patients with secure access to information, dataand applications; and transforming business processesand IT to better serve the public interest.

3

The authors gratefully acknowledge the work of Fred Carter, Senior Policy & Technology Advisor, Office of the Information and Privacy Commissioner ofOntario, and the HP Canada emerging technologies team in the preparation of this paper.

Page 4: RFID and Privacy

IntroductionInformation and communications technologies (ICTs) aretransforming the world we live in through revolutionarydevelopments in bandwidth, storage, processing,mobility, wireless, and networking technologies.

The health-care sector has recognized the value of newtechnology in the delivery of health care. For example,globally, billions of dollars are now spent annually onadvanced diagnostic and treatment equipment. Untilrecently, however, ICTs were limited to administrativeand financial applications and played only a smallrole in direct care for patients. But we are beginning tosee an evolutionary—perhaps even revolutionary—change in how health care is delivered.

Health-care providers around the world areundergoing a digital transformation, harnessingcutting-edge IT to increase operational efficiencies andsave lives. For example, they are replacing expensive,hard-to-share and easily lost x-ray films with digitalimages that can be effortlessly and securely shared,stored, transmitted and accessed. They are alsomoving away from an environment dominated byhand-written notes and physician orders to one wherestaff use ICTs to document patient records and enterand process orders. Thanks to ICTs, the vision ofcomprehensive and instantly available electronichealth records is now within reach.

But the digital transformation is about much more thanjust software applications. It involves taking advantageof advanced technology such as RFID to imaginativelymeet a host of needs. Invented over 60 years ago,RFID is fundamentally a technology for automaticidentification that can be deployed in a nearlyunlimited number of ways. The technology is starting tohit its stride, finding a wealth of new uses andapplications related to automated identification, safetyand business process improvement.

Patient safety is one of the most critical issues in thehealth-care sector today. There is a mounting concernabout medical errors, such as from the administrationof incorrect medications or dosages, or from patientsbeing misidentified. A 1999 study of 1,116 hospitals bythe United States Institute of Medicine suggests that

more than 44,000 deaths occur each year in theUnited States as a result of in-hospital medicationerrors.1 Canadian estimates put the figure at 700deaths per year due to medication errors.2 A 2002study of medication errors at 14 acute care hospitals inOntario counted over 4,000 errors, only 800 of whichwere counted as adverse drug effects.3 A similar studyconducted at the Children’s Hospital of EasternOntario published in 2003 counted over 800medication errors during a six-year period.4 RFIDtechnologies may offer remedies for these patientsafety problems.

Operational inefficiencies, in some cases due to theinability to rapidly find and track medical equipment,are also a concern for the health-care sector. It hasbeen estimated that the theft of equipment andsupplies costs hospitals $4,000 per bed each yearand with over 975,000 staffed beds in the U.S., thisrepresents a potential loss of $3.9 billion annually.5

Considerable time and effort is spent searching forvaluable mobile medical assets, and in maintaining anaccurate and up-to-date inventory—human resourcesthat might otherwise be better dedicated to moreproductive ends. Once again, RFID technologies canhelp provide cost-effective solutions.

Increasingly, there is considerable interest in exploringthe uses of new technology to better understandprocesses, achieve greater operational efficiencies andimprove patient safety.

In the health-care sector, RFID technology is alreadybeing used to rapidly locate medical equipment anddevices, track surgical equipment, specimens andlaboratory results, identify and verify the authenticity ofpharmaceuticals (including for stock rotation andrecalls), and to ensure that the right medicine, in theright dosage is given to the right person at the righttime. Other applications include positively identifyingpatients, prescribing and checking drug interactions atthe point of care, quickly checking a patient’s bloodtype, matching newborn infants with their parents, andtriggering a lock-down after the unauthorized removalof an infant from a secured area. Finally, RFIDtechnology is being effectively used to help improvepatient registration and management processes at

4

1 Institute of Medicine, “To Err is Human: Building a Safer Health System,” Washington, D.C.: National Academy Press, 19992 David U, BSc Phm, MSc Phm., (President and CEO, Institute for Safe Medication Practices Canada ), Medication Error and Patient Safety, Longwoods

Publishing, Vol 2, No. 1, at www.longwoods.com/product.php?productid=164423 Joan A Marshman, David K U, Robert WK Lam, and Sylvia Hyland, Medication Error Events in Ontario Acute Care Hospitals, Can J Hosp Pharm

2006;59:243-50, at: www.ismp-canada.org/download/Medication_Error_Events_in_Ontario_Acute_Care_Hospitals.pdf4 W. James King, MSc, MD*,, Naomi Paice, MD*, Jagadish Rangrej, MMath,, Gregory J. Forestell, MHA|| and Ron Swartz, BScPharm, The Effect of

Computerized Physician Order Entry on Medication Errors and Adverse Drug Events in Pediatric Inpatients, in PEDIATRICS Vol. 112 No. 3 Sept 2003, pp.506-509, at: http://pediatrics.aappublications.org/cgi/content/abstract/112/3/506 See also: Health Canada, Look-alike Sound-alike Health Product Names, at: www.hc-sc.gc.ca/dhp-mps/alt_formats/hpfb-dgpsa/pdf/brgtherap/lasa-pspcs_factsheet-faitsaillant_e.pdf, and Institute for Safe Medication Practices Canada (ISMP Canada), Canada Safety Bulletin, Vol 6, Issue 4 (July 2006),Eliminate Use of Dangerous Abbreviations, Symbols, and Dose Designations, at: www.ismp-canada.org/download/ISMPCSB2006-04Abbr.pdf

5 “RFID: Coming to a Hospital near You,” Sun Microsystems press, April 2004

Page 5: RFID and Privacy

hospitals, leading to analysis of bottle necks,improvement in flow and reduction in wait times.

Pilot projects are underway in Canada. In January2006, Hamilton Health Sciences, in conjunction withthe RFID Applications Lab at McMaster University,launched a multi-phased multi-year RFID initiative toexplore and assist in development of better businessintelligence tools for healthcare. The initial effort wasfocused on exploring the economic and technicalfeasibility of using RFID to track valuable mobile assetsin real time. Expected efficiency benefits include laborsavings, reduced capital expenditure for equipment,equipment and item loss prevention, and processimprovements. Future phases of the project are aimedat looking at optimizing and improving processesrelated to daily operations such as asset managementas well as patient care by using evolving technology asan enabler. These may include using RFID for patientidentification and pandemic planning, depending onthe results of their planned privacy study.

Perhaps the most intensive use of RFID technology wouldbe in a contagion research facility, where all peopleand items - and the interactions among them - can beclosely tracked and monitored (some pandemicemergency scenarios also call for fine-grained location,tracking and audit capabilities). Perhaps the mostinnovative RFID technologies being developed today arebiosensors—specialized RFID chips implanted intobodies to monitor and transmit critical health conditions.

These publicized applications of RFID technology inCanada and around the world have highlighted thepotential for widespread use of this technology in thehealth-care sector. Factors prompting the publication ofthis document include:

• The increasing availability of RFID-based solutions forthe health-care sector;

• The growing interest in the use of this technology byhealth-care providers; and

• The concerns that have been raised about thepotential privacy implications associated with the useof RFID technology in the health-care sector.

This paper provides a balanced analysis of RFIDtechnology by examining a wide variety of RFIDapplications in the health-care sector from around theworld, and organizing them into three broad categories:

•RFID technology to track things;

• RFID technology to track things linked to people; and

• RFID technology to track people.

The paper also identifies the benefits and potentialprivacy issues associated with this technology and thesteps that may be taken to mitigate the threat to privacy.

What is Privacy?Informational privacy definedInformational privacy is the right of an individual toexercise control over the collection, use, disclosure andretention of his or her personal information, includinghis or her personal health information. Personalinformation (also known as personally-identifiableinformation or “PII”) is any information, recorded orotherwise, relating to an identifiable individual. Almostany information, if linked to an identifiable individual,can become personal in nature, be it biographical,biological, genealogical, historical, transactional,locational, relational, computational, vocational, orreputational. The definition of personal information isquite broad in scope. The challenges for privacy anddata protection are equally broad.

How privacy is regulated in thehealth-care sector in OntarioOn November 1, 2004, the Personal HealthInformation Protection Act (PHIPA6) came into effect inthe Province of Ontario. PHIPA provides individuals withcontrol over the collection, use and disclosure of theirpersonal health information by requiring persons andorganizations in the health sector, defined as healthinformation custodians, to collect, use and disclosepersonal health information only with the consent of theindividual to whom the information relates, subject tolimited exceptions. It also provides individuals with theright to access and require correction of their personalhealth records, subject to specific exceptions.

PHIPA defines “personal health information” asidentifying information about an individual that,among other things, relates to the physical or mentalhealth of the individual, relates to the provision ofhealth care to the individual, identifies a provider ofhealth care to the individual, identifies the substitutedecision-maker of the individual, or is the individual’shealth number.

It defines a “health information custodian” as a personor organization listed in PHIPA that has custody orcontrol of personal health information. Examples ofhealth information custodians include health-carepractitioners, hospitals, psychiatric facilities, long-termcare homes, pharmacies, laboratories, and ambulanceservices.

PHIPA reflects worldwide privacy criteria, such as theprinciples of fair information practices set forth in theCanadian Standards Association Model Code for theProtection of Personal Information7 and the GlobalPrivacy Standard, an effort of the international privacy

5

6 PHIPA text available at: www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.htm and IPC Guide to PHIPA available at:www.ipc.on.ca/images/Resources/hguide-e.pdf

7 Available at: www.csa.ca/standards/privacy/code/

Page 6: RFID and Privacy

and data protection commissioners, led by the IPC, toharmonize the various privacy codes and practicescurrently in use around the world.8

Obligations of the health-care sectorin relation to personal healthinformationHealth information custodians are required, underPHIPA, to collect, use and disclose personal healthinformation only with the consent of the individual towhom the personal health information relates, subjectto limited exceptions. They are also required to complywith the wishes of an individual who withholds orwithdraws consent, or who gives express instructionsthat the information must not be used or disclosed forhealth-care purposes in certain circumstances.

PHIPA also prohibits health information custodians fromcollecting, using or disclosing personal healthinformation if other information will serve the purposeand requires that only the information that is reasonablynecessary be collected, used, or disclosed. Custodiansare required to take reasonable steps to ensure thatpersonal health information is protected against theft,loss and unauthorized use or disclosure, ensure thatrecords are protected against unauthorized copying,modification and disposal, and retain, transfer, anddispose of health information in a secure manner.

In addition, PHIPA requires health informationcustodians to provide individuals with the right toaccess their records and have them corrected subjectto specific exceptions.

Obligations of electronic servicesproviders in relation to personalhealth informationSuppliers of electronic services (who are not agents)that enable the health information custodian to collect,use, modify, disclose, retain or dispose of personalhealth information are bound by certain obligations inPHIPA. These include not using personal healthinformation except as necessary in the course ofproviding services, not disclosing personal healthinformation, and not permitting employees or others

acting on the supplier’s behalf to have access topersonal health information unless they agree to bebound by these restrictions.

Further, if the supplier is a “health information networkprovider,” providing services to two or more healthinformation custodians primarily to enable them todisclose personal health information to one anotherelectronically, regardless of whether or not it is anagent, the “health information network provider” issubject to further obligations prescribed in regulation.

What is RadioFrequency Identification(RFID)?RFID technology fundamentalsRFID is a contactless technology that uses radiofrequency signals to transmit and receive datawirelessly, from a distance, from RFID tags ortransponders to RFID readers. RFID technology isgenerally used for automatic identification and totrigger processes that result in data collection orautomation of manual processes.

Key advantages of RFID-based systems for health-caredelivery include:

• Accurate identification without the need to touch (oreven see) the RFID tag;

• Sensors can be incorporated into RFID tags to recordtemperature or identify positioning;

• Data stored inside RFID tags can be encrypted,modified and rewritten on demand;

• Tags are recyclable and can be made difficult tocounterfeit;

• Special devices are required to read RFID tags,increasing privacy in some cases (e.g. in comparison to human-readable information).

The most common application types, groupedaccording to the purpose of identification, arepresented below:

6

Purpose of Identification Application Type

Determine the presence of, and identify, an item Asset management, safety

Determine the location of an item Tracking, emergency response

Determine the source of an item Authenticity verification

Ensure affiliated items are not separated Matching

Correlate information with the item for decision-making Process control, patient safety

Authenticate a person holding a tagged item Access control, ID verification

8 Available at www.ipc.on.ca/images/Resources/up-gps.pdf

Page 7: RFID and Privacy

Many RFID applications will often span multiplepurposes.

An RFID system is typically composed of:

1) RFID tags, which can be Passive, Active or Semi-Active, typically containing a unique identifyingdata string and potentially additional data;

2) RFID readers and writers, which can be wirelesshandheld or fixed reader/antenna devices;

3) An infrastructure, including middleware, that permitsRFID readers and writers to process data to andfrom the RFID tags, manage communications,access control and security, connect to back-officeapplications, and take actions on the basis of thatdata.

It is important to note that the RFID tag and reader areonly the up-front, visible part of an RFID system, whichoften connects through a wired or wireless network toa back-office application and one or more databasesor hospital information systems.

There are some important types and varieties of RFIDtags and associated RFID information technologies andsystems. These are outlined briefly below.

1. Passive vs. Active RFID tagsRFID tags can be Passive (non-battery powered), Active(battery-powered), or Battery-Assisted Passive (dualmode). Passive tags, which are by far the mostcommon, are the simplest and least expensive tomanufacture and use. They contain a chip andantenna on a substrate, typically attached to a label or

7

Figure 1. Typical Passive RFID system

Page 8: RFID and Privacy

Figure 2. Sample RFID System

bracelet, are typically classified within Low-Frequency,High-Frequency or Ultra-High Frequency groupingsand comply with standards such as ISO or ElectronicProduct Code (EPC). To transmit their data payload,passive tags use radio energy supplied by RFIDinterrogators or readers. Passive tags typically containsmall data payloads, can be read-only or read-write,and must be physically close to the reader tocommunicate effectively (Hi-Frequency tag read-rangescan vary from 3” to 30”, Ultra-High-Frequency tagscan be read up to 15’ to 20’ from the reader-antenna).The new generation of Battery-Assisted Passive tagscan contain larger amounts of data, and transmit overlonger distances.

Active RFID tags, or transponders, contain a batteryand can be configured to transmit their information atgiven time intervals or react to an awakening signal orevent. The tag’s battery life typically ranges from oneyear to over five years, depending on the frequencythat they transmit data. These tags are much moreexpensive than passive tags, but provide additionalfunctionality. The tags can be read at longer distances(e.g. 100 to 500 feet), can hold larger amounts ofdata and can contain integrated sensors (e.g.temperature, motion, tamper-detection, etc.). Someactive tags can provide two-way communications usingcustomizable buttons, LED lights or buzzers integratedinto the tag, similar to a pager. This technology is

8

Page 9: RFID and Privacy

typically used in high-value asset managementsolutions or real time medical equipment trackingsolutions, including detection of presence, zonecoverage or real time location services (RTLS). RTLSsystems function in a manner similar to GPS locationsystems, measuring the signal strength from the tagreceived by three or more readers and graphicallydisplaying the current or historical location of the tagon a map. Some RTLS systems use proprietaryantennas and readers and others can leverage anexisting WiFi infrastructure to communicate with thetags. The systems can be configured to providecustomized monitoring and alerting of events, such asbattery power status, a tag entering a restricted area,a tag falling to the floor, or a tag being removed froman object without authorization.

All of the described types of tags have importantimplications for privacy and security.

2. Referential vs. non-referential RFID systemsThe term “referential” is used for RFID systems usingtags that typically contain a unique “key” or semi-random data string, which allows retrieval of relevantinformation from an application or database.Referential RFID systems are the dominant type in usetoday. As suggested by Figure 1 above, the data onthe tags serves as a pointer or “reference” to acentralized storage and processing systems locatedelsewhere on the network. The information stored onthe tag allows retrieval of information from thedatabase, file, or document contained in the back-office system, or logic embedded inside a local orremote information system or process. For example, anRFID-enabled proximity card can contain a serialnumber that, when waved near an antenna connectedto a reader, triggers that reader to collect the data andsend it to a computer or server where the data iscompared against stored values. If there is a positivematch, an action is then performed, such as unlockingthe door to an office or opening a patient’s medicalrecord. If the network is down, the system may notfunction as desired, as the information contained in thetag may not be sufficient to trigger the desired action.

By contrast, “non-referential” RFID systems are able tostore all or some of the data needed for systemsoperation in the tag’s memory, and may contain logicrunning on mobile devices or the tag itself. Thisfunctionality allows decisions to be made based on theinformation stored in the tag, without any need forlinked networks and back-end databases to function,which can prove useful if the network is down, or thedata can not be accessed online. Non-referentialsystems contain functionality to synchronize theinformation between the tag and a back-office database or application and encryption is typically used toprotect against unauthorized access to the data.

Both types of RFID systems have implications forpersonal information and privacy.

3. Closed vs. Open Loop ApplicationsA closed-loop RFID application—the most commontype—is any RFID system that is deployed entirelywithin a single organization, rather than across severalorganizations. Closed-loop RFID information systemsmay involve the use of either standards-based orproprietary tags, encoding formats, transmissionprotocols, and processing middleware.

An open-loop RFID application, by contrast, isintended to function across organizational boundaries,requiring adoption of common standards andinformation-sharing protocols. RFID deployments forsupply-chain management, in which an item is trackedacross various organizations in a range of locations,are a classic example of open-loop RFID application.

Just as the authenticity of the RFID-enabled proximitycard is verified against a back-end database, theauthenticity of a pharmaceutical product may beverified to ensure that the product is not counterfeit. Arecord of access can be kept for billing purposes or torecord the time that someone entered a particularbuilding or room. The travels of an RFID-tagged itemcan be monitored and tracked across time anddistance through periodic reads of the tag andcorrelation of its unique identification in a database.This is what occurs when RFID-tagged supplies andinventory are shipped from a production facility to adistributor to a retailer, providing visibility andaccountability throughout the entire supply chain.

RFID technology vs bar codesBar code systems are commonly used in health-caresettings, but are known to have technical limitationssuch as inaccessibility when a patient covers the wristband with his or her body or the bar code is curvedaround a wrist band. In such cases, manual entry ofthe patient ID is required, or the patient must beawaken or touched to facilitate reading of the barcode, potentially increasing the risk of nosocomialinfections. Bar codes also have limited storage spacefor information and can wear out after protracted use.They do not facilitate modification and updating ofinformation (unless the bar code is reprinted). Theselimitations consume resources that could otherwise bespent on other tasks, increase the risk of human error,and increase operating costs.

Generally speaking, RFID represents a next-generationimprovement over traditional bar codes. Somedifferences between the two technologies are identifiedbelow.

9

Page 10: RFID and Privacy

RFID and PrivacyRFID implementation considerationsThere are five general implementation issuesassociated with deploying RFID technology:

1. Cost—The cost of the technology (tags, readers,middleware, consulting, operational process design,troubleshooting, training, etc.) will impact return oninvestment (ROI) and value.

2. Integration with hospital information or other back-office systems—Legacy information systems mayneed to be modified or re-engineered toaccommodate the RFID system, technology, andinformation.

3. Reliability—Depending on the operatingenvironment, the intended purposes, the technologycontemplated, and the deployment method beingconsidered, RFID technologies may not deliversufficient accuracy or performance results to besuitable for mission-critical applications and uses.

4. Security—RFID tags are susceptible to many of thesame data security concerns associated with anywireless device9. Passive tags in particular areconsidered to be “promiscuous” - automaticallyyielding their data to any device that queries the tag,raising concerns about skimming, interception,interference, hacking, cloning, and fraud, withpotentially profound implications for privacy. Whilea variety of security defenses exist, such as shielding,tag encryption, reader authentication, role-basedaccess control, and the addition of passwords, thesesolutions can raise complexity and costs.

5. Privacy—If RFID tags contain personal information,which could include health information, or datalinked to personally identifiable individuals, withoutthe proper security or integrity mechanisms in place,privacy interests become engaged. Personal healthinformation is among the most sensitive types ofinformation. As such, it requires stronger justificationsfor its collection, use and disclosure, rigorousprotections against theft, loss and unauthorized use

and disclosure, strong security around retention,transfer, and disposal, and stronger, moreaccountable governance mechanisms.

Privacy-relevant properties of RFIDsystemsThere are certain fundamental properties of all RFIDinformation systems that are particularly relevant toprivacy, regardless of the specific technology,application type, or deployment scenario.

1. Health-care providers must realize that RFID systemsare a key part of an overall information system.Consequently, a holistic systems approach toprivacy is warranted, rather than a strict focus onthe interaction between tag and reader.

2. RFID tags contain unique identifiers, indicating notonly the presence of an object, like an anti-theft tag,or a class of objects, like a product bar code, butalso an individualized serial number. The ability touniquely identify individual items has privacyimplications when those items can through inferenceautomatically be associated with people.

3. RFID tag data can be read (and sometimes written)at a distance, without ‘line-of-sight’ and throughmany camouflaging materials, potentially withoutthe knowledge or consent of the individual whomay be carrying the tag. This has potentimplications for informed consent.

4. RFID information systems can also capture time andlocation data, upon which item histories and profilescan be constructed, making accountability for datause critical. When such systems are applied topeople, it may be viewed as surveillance (or worse,depending on what is done with the data).

To first understand privacy and security risks, and thento mitigate these risks, we must always follow the(personal) data as it flows throughout the entireinformation system: what data is collected, how and forwhat purposes, where it is stored, how it is used, withwhom it is shared or potentially disclosed, under whatconditions, and so forth. This is referred to as the

10

Barcoding RFID

• Requires line of sight • Line of sight not required

• Scan one item at a time • Multiple items at a time

• Inexpensive • More expensive

• Widely used • Emerging application in health care

• Standards-based • Standards developing

• Read only • Digital, read-write capable

• Depends on external data store • Can store data or trigger access to external data

• Provides licence plate information only • Can store relevant data (Serial #, loc., status, etc.)

9 For a discussion about various forms of wireless technologies and the privacy and security considerations in their use, see IPC Fact Sheet #14 - WirelessCommunication Technologies: Safeguarding Privacy & Security (August 2007), available at www.ipc.on.ca/images/Resources/up-1fact_14_e.pdf

Page 11: RFID and Privacy

information life-cycle, and the disposition andgovernance of personal health information throughoutits life-cycle lies at the heart of most information privacyconcerns in the health care environment.

RFID systems are, fundamentally, information systemsput in place by organizations to automatically capture,transmit and process identifiable information.Informational privacy involves the right of individuals toexercise control over the collection, use, retention anddisclosure of personally identifiable information byothers. There are inherent tensions between the, attimes, competing interests of organizations andindividuals over the disposition of the information,especially over the undisclosed or unauthorizedrevelation of facts about individuals and the negativeeffects they may experience as a consequence.

As was described in a recent European study on themany uses of RFID technology, RFID informationtechnologies can exacerbate a power imbalancebetween the individual and the collecting organization.10

General approach and framework tobuilding privacy in earlyBuilding privacy into information systems andtechnologies, whether RFID-enabled or not, begins atthe top of the organizational decision ladder, and atthe early stages of project design and implementation.A comprehensive, multidisciplinary approach isrequired. The steps outlined here provide a high-levelapproach and general framework for building privacyinto information technologies and systems.

As a framework, it is useful for general orientation andplanning purposes, and may be used as a startingpoint for deeper analyses, according to the specificobjectives, operational characteristics, and otherparameters of the RFID proposal or project in question.

1. Clearly define, document and limit purposes forcollecting and using personal data, in order tominimize the potential for privacy invasion. Thepurposes identified should meet the tests ofnecessity, effectiveness, proportionality, and no-lessinvasive alternative.

2. Develop a comprehensive and realist projectmanagement plan, with the pivotal involvement of aknowledgeable privacy officer, with sufficientauthority and resources.

3. Identify all information security and privacy risksthroughout the data life-cycle, including risks frominside the organization as well as external sources.

4. Conduct a comprehensive privacy impactassessment (PIA) of the entire system at theconceptual, logical and physical stages of itsdevelopment, with a clear plan and timetable foraddressing identified risks.

5. Build privacy and security in at the outset. Thismeans incorporating the principles of fairinformation practices into the design and operationof an RFID information system, and the policies thatgovern its operation.11

6. Implement appropriate operational and systematiccontrols that can be measured and verified, ideallyby independent entities, if necessary.

7. Review the operation and effectiveness of the RFIDsystem, as well as related networking, data storage,wireless transmission, and data backup systems ona regular basis.

RFID systems may need to be highly customized tosupport the business processes they automate, and willdepend on the types of back-office systems, medicalinformation system, scheduling or similar supportsystems they must interface with. In many cases, a“one-size-fits-all” approach will not work across allhealth care implementations. Good privacy andsecurity practices, integrated with strong projectmanagement skills, can help health-care providersmanage RFID risks to an acceptable level.

The section that follows goes into more detail on theprivacy considerations specific to the RFID health-careapplication.

11

10 See RFID and Identity Management in Everyday Life: Striking the balance between convenience, choice and control, study by the (July 2007) EuropeanParliament Scientific Technology Options Assessment (STOA), IPOL/A/STOA/2006-22

11 See Information and Privacy Commissioner of Ontario, Privacy Guidelines for RFID Information Systems (June 2006), available at:www.ipc.on.ca/images/Resources/up-rfidgdlines.pdf and related materials at: www.ipc.on.ca/index.asp?navid=67&fid1=16

Page 12: RFID and Privacy

RFID Applications inthe Health SectorHealth-care providers around the world have beenusing or testing RFID technology in a variety ofcontexts for several years. For example, RFIDtechnology has successfully been used to tagpharmaceutical products to reduce the risk ofcounterfeit medications use in the United Kingdom.

RFID is also proving to be very useful in identifyingpatients, increasing safety and reducing incidents ofmistaken identity during critical surgery. It is beingsuccessfully used to locate patients needing extra care,such as the elderly, or patients suffering fromAlzheimer or memory loss.

Medical equipment is being more rapidly located andtracked within health-care facilities, leading to moreeffective use of resources. Waste management hasbeen improved through the use of RFID.

From a privacy point of view, the single most relevantconsideration is whether and to what extent the RFID-related data collected or generated from the tags maybe characterized as personally identifiable (health)information. To the extent that it is (or could be)personally identifiable data, then legal and regulatoryprivacy requirements are invoked.

For this reason, we have organized some of the knownRFID technology deployments into three broadcategories of increasing privacy relevance andconcern:

1. Tagging things,

2. Tagging things linked to people, and

3. Tagging people.

Tagging thingsRFID technologies have proven to be ideal foridentifying and locating things because they increasethe reading accuracy and visibility of tagged items farbeyond bar codes and other labels. The results caninclude greater efficiency for automating inventoryprocesses, finding misplaced items, and generallykeeping better track of things as they move throughtheir life-cycles.

Automatic identification remains the basis of all RFIDinformation systems, but specific applications may bevariously described as asset management, tracking,authenticity verification, matching, and process oraccess control, depending on the context andcircumstances. Application types are not mutuallyexclusive: an implementation or deployment can

combine elements of several application types. Forexample, RFID-based information systems that bothidentify and locate tagged items combine assetmanagement with tracking (real-time or otherwise).

All of these application types are currently being usedby health-care providers, many of which are largeinstitutions with complex asset management andlogistical requirements.

Sample RFID health-care deployment scenarios thatinvolve the tagging of things include:

• Bulk pharmaceuticals;

• Inventory and assets (e.g. trolleys, wheelchairs,medical supplies);

• Medical equipment and instruments (e.g. infusionpumps, wheelchairs);

• Electronic IT devices (e.g. computers, printers, PDAs);

• Surgical parts (e.g. prosthetics, sponges);

• Books, documents, dossiers and files;

• Waste and bio-hazards management.

One of the key reasons for introducing RFID-basedautomatic identification technologies and systems isoften to improve operational efficiency. The integrationof RFID technology with business intelligence andanalytics systems has proven the benefit of leveragingthis technology for business process improvement.

RFID-tagging and tracking of items has also beenshown to save valuable staff time and costs associatedwith manual data collection and input (especiallywhen it is routine and repetitive), and also withphysical searches for misplaced or lost items. Further,RFID-tagged assets and items can help reduce humanerrors and mistakes, as well as improving auditabilityand accountability, resulting in better quality health-care services.

Efficiency gains may also be realized from moreaccurate and up-to-date inventory accounting, andfrom reduced “shrinkage” of valuable assets.

Many pharmaceutical RFID tracking and tracinginitiatives are underway in the U.S., E.U., and Asia.Pharmaceutical “drug e-Pedigrees” have become thesubject of considerable attention by the health careand RFID industries, as well as by government healthregulatory and licensing agencies across NorthAmerica.

A drug pedigree is a statement of origin that identifieseach prior sale, purchase or trade of a drug product,including the date of these transactions and the nameand addresses of all parties to them.

12

Page 13: RFID and Privacy

The U.S. Food and Drug Administration (FDA)e-Pedigree requirements were outlined in a 1988 set ofFDA regulations enacted following the passage of thePrescription Drug Marketing Act (PDMA) of 1987,created to address problems of drug counterfeiting inthe pharmaceutical supply chain. Pharmaceuticals cantravel through many different points in the distributionchain from the factory to a pharmacy or hospital,creating a significant counterfeit drugs issue. Toaddress these issues and ascertain proper “chain ofcustody,” the FDA has been investigating the use ofRFID technology to increase supply chain security. Atthe time, the FDA anticipated that the e-Pedigree wouldbe achievable by 2007.

The broad intent is to provide a documented chain ofcustody for high-value pharmaceuticals, from theproduction plant through to the dispensary, as well asthe return and disposition of pharmaceutical items. Inaddition to automating the identification,documentation and pharmaceutical supply-chainmanagement processes, drug pedigrees are alsoexpected to help minimize incidence of counterfeitingand diversion, and to facilitate recalls.

Drug pedigree requirements can be fulfilled throughtraditional paper methods, but RFID technologies,combined with networked databases, offer a moreautomated, secure, and trusted way to establish such apedigree.

Privacy ConsiderationsGenerally speaking, the business of identifying andtracking inventory and objects does not involvecollection, use or retention of personally identifiableinformation. The uniquely identifying data stored onthe RFID tags, which are read by interrogators,transmitted across networks, processed by middleware,stored in logs, shared with third parties, and actedupon in the context of relevant business processes,refers exclusively to “things” in a manner analogous toa product serial number. Accordingly, if there is nopersonally-identifiable health information, then privacydoes not come into play.

In February 2004, the U.S. Food and DrugAdministration recognized the potential of RFIDinformation technologies to combat counterfeitpharmaceuticals and to provide more effectivefulfillment of U.S.-mandated drug pedigreerequirements.12 In November 2004, the FDA issued areport recommending that drug makers use RFID totrack bottles of the most commonly counterfeited drugs,with eventual extension to more drugs over time.13 The

FDA also published a guidance policy around the useof RFID in the pharmaceutical industry, which states,inter alia that:

• RFID tags are attached only to immediate containers,secondary packaging, shipping containers and/orpallets of drugs that are being placed intocommerce;

• Drugs involved will be limited to prescription or over-the-counter finished products;

• RFID will be used only for inventory control, trackingand tracing of products, verification of shipment andreceipt of such products, or finished productauthentication;

• The tags will not contain or transmit information forthe healthcare practitioner or the consumer;

• The tags will not contain or transmit advertisementsor information about product indications or off-labelproduct uses.

The scope of the FDA’s guidance makes clear thatpersonally-identifiable information is not involved in thepharmaceutical supply chain management, and hence,privacy issues, do not come into play.

Examples of RFID Uses The following examples provide a glimpse into thebroad range of uses for which RFID technologies maybe deployed by tagging things:

High Value Mobile Equipment: The ambulatory carecenter of a large Boston-area hospital is using RFID totrack and maintain more than 1,500 units of high-value mobile medical equipment, includingwheelchairs, gurneys, portable oxygen tanks,intravenous (IV) pumps and defibrillators. The prices ofthese assets range from a few hundred dollars apieceto several thousand, and many of them, such as IVpumps and wheelchairs, need to be maintained on aregular schedule.

Cardiology Devices: A Detroit Medical Center isinstalling an RFID deployment to track the institution’sgrowing number of medical devices. The RFID solutionwill be deployed for the cardiology group. FourteenRFID-enabled cabinets will be installed to storeimplantable stint devices. The goal is to streamline andautomate the management of these devices. Time lostto the current manual processes will be recaptured,and the documentation of device usage and expirationwill be made more accurate.

Infusion Pumps: A large health-care system in Georgiais deploying an RFID asset-tracking system to improve

13

12 COMBATING COUNTERFEIT DRUGS: A Report of the Food and Drug Administration (February 18, 2004) available at:http://www.fda.gov/oc/initiatives/counterfeit/report02_04.pdf

13 Radiofrequency Identification Feasibility Studies and Pilot Programs for Drugs, Guidance for FDA Staff and Industry, Compliance Policy Guides, Sec.400.210,Radiofrequency Identification Feasibility Studies and Pilot Programs for Drugs, November 2004, available at:http://www.fda.gov/oc/initiatives/counterfeit/rfid_cpg.html

Page 14: RFID and Privacy

management and utilization of thousands of taggedinfusion pumps and other high-value equipment.

Location Tracking: According to one RFID vendor, alarge, multi-hospital health-care provider is installing areal-time location system that uses hybrid RadioFrequency tags, combined with infrared (IR), topinpoint the exact room in which an asset is located.The health-care provider has performed a beta test ofthe RF-IR system in which each hospital room is fittedwith a Room Locator, an IR transmitter designed tosend a location-identifying code.

Surgical Sponges: An independent organization, “NoThing Left Behind,” is half-way through clinical trialstesting RFID-enabled sponges, interrogators andcompanion software, in surgical cases in five differentmedical centers across the United States. The No ThingLeft Behind project's overall objective is to helphospitals, surgeons, perioperative care nurses andpatients work together to ensure that surgical toolsused in an operation are never left inside a patient.Recent studies have estimated that cases of surgicalobjects left in patients occur in between one out ofevery 100 to one out of every 5,000 surgicalprocedures. Other studies have shown that two-thirdsof all retained foreign bodies are surgical sponges.

Medical Waste: Hospitals deal with hazardous wasteon a daily basis, so a comprehensive system isnecessary to manage and dispose of it safely andefficiently. Usually outsourced to service providers,waste management is a matter of concern to manyhospitals. They are unable to control the vendor’s workprocesses and can’t be certain if wastes will behandled in compliance with the work contract or locallegislation. One RFID solution for waste managementprovides proof-of-delivery and receipt, as well aslocation tracking and activity records to ensure theintegrity. Sealed waste containers are tagged withlocked RFID bands that keep track of the containermovements, ensuring that potentially hazardous wasteis not compromised en route to the waste managementplant from the hospital. At the destination plant, theRFID bands automatically transmit information such asthe arrival time, quantity and weight of waste back tothe hospital for accountability.

Robotic Hospital Helpers: A Pittsburgh company hasdeveloped a hospital robot to perform such mundanebut vital tasks as retrieving and delivering drugs andtest specimens. Now, six of the more than 34 hospitalsalready using the robots are testing an RFID-enabledversion, which carries an RFID interrogator used tolocate RFID-tagged assets as it moves around ahospital. The robot finds its way around a hospitalthrough the use of a facility map saved to its memory.

GuidanceGenerally speaking, where there is no personallyidentifiable information collected or used by an RFID-based information system, and little likelihood or riskof RFID-generated data becoming personallyidentifiable information, then there are no privacyissues and, in Ontario, the provisions of PHIPA do notcome into play.

In a similar manner, to the extent that pharmaceuticaltagging and e-pedigree programs remain strictly a(bulk) supply-chain management issue, ending at thedispensary, the privacy implications are minimal, whilethe benefits may be considerable. The application ofclear rules and guidance by regulatory agencies, suchas by the FDA,14 will help to provide additionalassurance and confidence that privacy interests are notengaged.

Tagging things linked to peopleThe next class of RFID technology uses involve RFIDtagging of items that are (or may be) linked toidentifiable individuals and to personal information,usually on a more prolonged basis (ranging from oneweek in the case of tagged garments, to several yearsor longer in the case of patient dossiers).

Some RFID deployment scenarios that involve taggingthings linked to people include:

• Medical equipment being used by patients, visitorsor staff;

• Readers, tablets, mobile and other IT devicesassigned to staff;

• Access cards assigned to staff or visitors;

• Smart cabinets;

• Devices, garments, or spaces (rooms) assigned topatients;

• Blood samples and other patient specimens;

• Patient files and dossiers; and

• Individual prescription vials.

In each usage scenario, the main purpose of thetagging is to identify and track objects, as before, butthe relative permanence of the tag, the nature andamount of the data collected, and the strength of thedata’s linkage to identifiable individuals may invokeprivacy issues and concerns.

Privacy ConsiderationsIncreasingly, RFID tags are being attached to items thatare, or may be, linked to individuals. Privacy interestsbecome progressively engaged with the strength andease of this linkage, along with the sensitivity of thelinked data. The same basic properties that make RFID

14

14 For more FDA info and guidance, see http://www.fda.gov/oc/initiatives/counterfeit/

Page 15: RFID and Privacy

information technologies and systems so useful forinventory control and supply management purposescan impact individual privacy when that tracking andcontrol extends to individuals, especially wheninformed consent is lacking.

There are asset identification, tracking andmanagement scenarios that could involve a link withpersonally identifiable information. For example: alltouch-points or interactions with tagged items (and thedata generated) by staff might be logged for audit andaccountability purposes, engaging employee privacyinterests. Tagged assets could also be temporarilyassigned to individuals (beds, rooms, equipment) and,if they are mobile items, can become a proxy fortracking people through inference. Even if the data onan RFID tag is encrypted or otherwise unintelligible,the tag can still be used as a basis for tracking and itshistory correlated with personally identifiableinformation from another system. This could happen,for example, when use of an RFID-enabled visitoraccess card is correlated with a video capture of thebearer, at access points or other chokepoints.

Some RFID tags are re-writable and re-usable. If dataabout an individual, such as a patient identifier ordrug prescription, is written locally to the tag, then it ispossible it may be read and used in an unauthorizedmanner if it is not properly secured or destroyed.

If the RFID-tagged item travels with the individual, thenextensive tracking and monitoring of the item istantamount to tracking and surveillance of thatindividual. In the case of access cards, the threatsand risks extend to hacking and cloning of theembedded RFID tags, allowing unauthorizedindividuals to effectively access secure spaces andto commit identity theft.

Unauthorized identification, tracking, surveillance, andprofiling of individuals are very serious privacy issues.In addition, security issues related to RFID tags,including skimming eavesdropping, interception,interference, tampering, cloning and misuse, can alsoimpact individual privacy (as well as the operations ofhealth-care providers).

As noted earlier (see “referential vs non-referentialsystems”), RFID tags do not always contain personallyidentifiable information, such as a person’s name. Inmost cases they encode some semi-random uniquealphanumeric string that can serve as a pointer, orindex key, to a person’s linked identifiable information,such as a medical or transaction record stored in anetworked database (perhaps even transmitted offsiteand controlled by third parties). RFID readers—oftenmobile—read tag data and use it to trigger an action,

such as to display and record the tag contents, or to“look up” and retrieve (and use) data corresponding tothe tag ID.

Readers themselves, or any RFID-enabled portablecomputing and communications device, may beassigned to health-care personnel to help them collectand transmit data stored on tags elsewhere. Usuallythis is intended to help staff accomplish their tasksfaster and more efficiently, but the data collected canthen be correlated with the personnel ID or role, andused to establish audit trails and to enhanceaccountability.

Generic (i.e., blank) RFID-embedded access cardsmany not serve as identity cards, yet their assignmentto staff and permissible uses are controlled centrally.Typically, there is some linkage with identifiedindividuals (i.e., the bearer), and all uses andattempted uses of the cards are routinely collected andretained in logs. This allows for the possibility ofdetailed profiles to be constructed.

Tagging patient specimens and other waste for properhandling or disposal may actually enhance privacy ifthe alternative involves labeling the item with human-readable personally-identifiable information or barcodes. As usual, much depends upon the strength ofthe linkage to the patient and the ease with whichparties may make that connection (e.g. databaseaccess). In general, however, any tagged file or itemthat must be linkable to an individual, yet be passedaround to multiple parties in a privacy-preservingmanner (e.g., admission slip, test results, surveyresults/feedback, files, etc.), could potentially benefitfrom the deployment of RFID technology.

While the concern here is with the privacy and securityissues related to RFID technologies, there will be veryjustifiable and defensible health care-related reasonsfor deploying such technologies even where there areinformational privacy implications. In thesecircumstances, it is important that the benefits bedemonstrable, the privacy risks identified and properlymitigated, and the entire system developed anddeployed in a transparent, and responsible manner.

Examples of RFID UsesThe following deployment examples provide a glimpseinto the broad range of uses for which RFIDtechnologies for tagging things linked to people maybe deployed:

Hand-washing compliance: To reduce the spread ofinfections, a new automated hand-sanitizing systemuses RFID to monitor how well health-care workerswash their hands. The wash cycle automatically startswhen the caregiver's hands are inserted into the

15

Page 16: RFID and Privacy

machine's cylindrical openings. Health-care-associatedinfections affect nearly 2 million individuals annually inthe U.S., and are responsible for approximately80,000 deaths each year, according to a guidepublished by the Centers for Disease Control andPrevention (CDC), in collaboration with the InfectiousDisease Society of America (IDSA) and the Society ofHealthcare Epidemiology of America (SHEA). Thetransmission of health-care-related pathogens mostoften occurs via the contaminated hands of health-careworkers. When washing hands, a caregiver wearingan RFID badge is identified by the machine's RFIDinterrogator. The device records the date and time, aswell as the beginning and end of the wash cycle, thencommunicates that information to the database. If acaregiver removes the hands before the 10-secondcycle finishes, the interrogator transmits thisinformation to the back-end database. Hospitaladministrators can then run departmental statistics andother compliance reports to determine whichcaregivers have completed the washing cycles.

Smart Cabinets: Texas University Medical Centerresearchers are using RFID to manage the supply ofchemicals and other materials used in biologyresearch. The Center has installed two storage cabinetsfitted with RFID interrogators. Items stored inside thecabinets are fitted with RFID tags. Every authorizedresearcher at the university has been issued a creditcard-sized RFID key card carrying a unique six-digit IDnumber that is used to release the lock. Theinterrogator reads the key card’s ID number and theitem tags in the cabinet before and after it has beenopened, enabling the software application to calculatewhat has been removed, and to update the onlineinventory data. This information is accessible via theWeb by university administrators, researchers andsuppliers, and generates e-mail messages to theschool’s accounts payable department and to theperson who removed the items. Besides recordingeach transaction, the system helps suppliers knowimmediately what supplies have been used, whatneeds to be paid for and what needs replacing.

Specimens: A well-known medical practice withdiagnosis and treatment facilities scattered across theU.S. piloted an RFID system to allow medicalpractitioners to better manage specimens of patienttissue. Deployed at endoscopy facilities, the tissuesamples are tagged and tracked from the moment theyare collected until they are delivered to the pathologylaboratory for analysis, a series of steps characterizedas “crucial.” The pilot lasted five months, and thedemonstrable benefits included accurate datacommunication and verification, as well as improved

efficiencies in specimen management. The plan now isto rapidly phase in an expansion of the pilot.

Blood bags: In Malaysia, the government and threemedical institutions are testing an RFID system fortracking blood bags, with the ultimate goal ofeventually equipping more than 300 other governmentand private hospitals and clinics. The system combinesblood bag tagging with smart cabinets to enableautomated, efficient track-and-trace visibility. Eventuallythe system could manage Malaysia’s entire bloodbank, which includes 500,000 transfusions annually.The expected benefits include improved blood bagidentification, inventorying, and logistics. Cross-matching, in which a recipient’s blood type is matchedto available donated blood, will be streamlined.Internal blood management processes will be mademore efficient. Blood stock will be better maintained.Errors, blood-type mismatches, and waiting times willbe reduced. Data management and access overall willimprove, including easy report generation forinventory, donation history, and donor/patient profiles.Registration and results screening during the blooddonation processes will be simplified. Lastly, the systemwill enable analytics for the entire blood bankmanagement process.

Medicine Dispensing: A Southeast Asian RFID systemsprovider has introduced RFID-enabled productsdesigned to help health-care providers trackpharmaceuticals and monitor drug administration, tomake sure that correct doses are given. The company’sintelligent medicine-dispensing system combines RFIDtags and readers, workflow software, electronicmedical records (EMRs) and a central database in anintegrated solution. This enables nurses and doctors toview patient records, update them in real time, anddouble-check prescription dosages at the moment theyadminister them. The system can also automaticallysend prescriptions to pharmacists.

Patient Files: An acute-care and teaching hospital inNew Jersey is implementing an RFID-enabled patientrecord management solution. Seeking both increasedefficiency and compliance with Health InsurancePortability and Accountability Act (HIPAA) (whichplaces heightened importance on patient informationmanagement), the hospital has targeted its SleepCenters, which provide comprehensive evaluation andtreatment for patients experiencing sleep-relatedproblems. The Centers manage 5,000 patient files.Each file is tagged with an RFID tag, allowing it to betracked from the moment it is created for a new patientuntil the file is retained in storage. RFID readers arepositioned in key locations around the center to enableautomatic tracking and encoding of the tags as they

16

Page 17: RFID and Privacy

are moved from one place to another. Reads andwrites to the tags are dynamically updated in thecentral database, ensuring real-time, accuratelocation data. The centers also have a series ofhandheld readers for routine inventory and locatingmisplaced files.

Handheld Devices to Verify Medications: The St. ClairHospital in Pittsburgh developed and implemented anRFID-based system to help protect patients frommedication errors and reduce health-care costs. Usingbar code and RFID technology and a wireless networkcombined with HP iPAQ Pocket PCs, the VeriScanmedication administration verification system confirmsthat a nurse has the correct patient, medication, time,dose and route each time a medication isadministered. The system has been in use for two yearsand is preventing more than 5,000 medication errorsyearly, according to the hospital’s chief operatingofficer. “With close to 1.3 million doses dispensedeach year from St. Clair Hospital’s pharmacy, we haveplenty of opportunities for medication errors.” The RFIDsystem helps the hospital nursing staff avoid most ofthose errors and the associated costs, with estimatedcosts savings of more than $500,000 annually. Whenit comes time to administer a medication, the nurseuses an HP iPAQ Pocket PC to scan bar codes on themedication package and RFID tags on the patient’swristband. The VeriScan software compares the twosets of patient and medication data and alerts thenurse to any discrepancies. New orders, changes toorders and discontinued orders are available in realtime so that the nurse is aware of medication changeswithout delay. Not only does patient information popup on the handheld display screen, but also a pictureof the patient, which was taken when the patient wasadmitted. The device records the date and time thetags and bar codes are read, then wirelessly sends allthe data (bar codes, RFID tag numbers and timestamp)to the database, where it is compared with thedoctor's latest orders. Voice commands on thehandheld announce, "Patient identification confirmed,"or, in the case of discrepancies, "Access denied." Inaddition, any new medication orders, order changesor cancellations are automatically downloaded so thatnurses can learn about them immediately.

Pharmaceutical tagging (item-level): While mostindustry efforts are directed at realizing the benefits oftagging and tracing bulk pharmaceuticals in thesupply chain, as discussed earlier, a smaller subset ofinitiatives is investigating the benefits of tagging item-level drugs, or even individual prescriptions, usually inmore limited health-care provider contexts.

As noted in some of the case studies above, health-care providers are seeing merit in tagging andtracking specific drugs within their own careenvironments, principally to reduce patient medicationerrors and also to maintain accurate inventory records.Using RFID technology, specific drugs may becomeassociated with patients and staff in the course of theiruse, helping to provide an accountable and auditablerecord.

More ambitious RFID pilot projects involve integratingthe technology into medication packaging formonitoring, patient diary and reminding purposes. Inthese cases, RFID technologies serve as an automatedmechanism for ensuring that patients are taking thecorrect drugs, in the rights dose, at the right times,perhaps for clinical testing and recording purposes.The informed prior consent of the patient is critical insuch scenarios.

Less clear is the extent to which prescription vialsprovided directly to individuals by pharmacies arecurrently being RFID-tagged (for example, to help trackand speed up refills). This use case scenario presentsthe strongest privacy issues, i.e., the possibility thatindividuals may carry on their persons RFID tagscontaining sensitive prescription information that couldbe scanned and read by unauthorized parties.

Patients have a legitimate right to know how easy itwould be for unauthorized parties to scan and readthe contents of personal prescription vials carried in apurse or pocket, and to be given a non-RFIDalternative choice. Personal health information thatmay be inferred from the drugs a person takes ishighly sensitive, and requires strict controls andassurances against unauthorized disclosure andcollection. Efficiency and convenience should neverautomatically trump privacy interests!

GuidanceTo the extent that personal information is involved andpotentially at risk, we urge moving forward withcaution, diligence, and a comprehensive informationgovernance program. When assessing the extent ofpersonally identifiable information involved and thedegree of risk involved, the following importantquestions should be asked regarding the system designand information flows:

• Whether personal information is stored on the tags;

• Whether the tagged items are considered personal;

• The likelihood that the tag will be in the proximity ofcompatible un-authorized readers;

• The length of time records are retained in analytic orarchival systems; and

17

Page 18: RFID and Privacy

• The effectiveness of RFID security controls, inparticular:

– The efficacy of tag memory access control andauthentication mechanisms;

– The ability of tags to be disabled after use; and

– The ability of users to effectively shield tags toprevent unauthorized reading.

Prescription tagging: If and when RFID tags are affixedto individually-prescribed vials, pharmacies and health-care providers will have to address a number ofprivacy questions and concerns:

• Objective of tagging vials—are they clearly defined?Combating pharmaceutical counterfeiting, fraud anddiversion are less compelling reasons at theindividual prescription level.

• An account of any (new) information vulnerabilitiesand threats, and appropriate countermeasures tomitigate them. How easy is it for others to read andunderstand the contents of the tagged vials? Canthese vulnerabilities be addressed throughinformation security measures, such as encryption orshielding, and through better patient education?

• Do your privacy policies and procedures extend tothe handling of RFID-tagged vials? Do they cover anypotential use or misuses of the tag and its data?

Tagging peopleThe third and final class of RFID uses involves theintentional tagging and identification of individuals,rather than the devices, tokens or other assets theymay be carrying or associated with. The distinctioncan be subtle since, technically speaking, it is alwaysthe tag that is identified in any RFID systems. However,when we talk about tagging people, we are focusingon the primary purpose of the RFID deployment inquestion, as well as the relative strength andpermanence of the linkage of the tag to the individualand his or her personal information.

For example, we would exclude from this category ageneric or reprogrammable RFID-enabled access cardthat is temporarily signed out for use by an employee,contractor or visitor. The primary purpose of the card isto authorize physical access to certain facilities orspaces, rather than identifying the bearer. The cardassignment may be temporary in nature, and the cardcontains no specific personally identifiable informationembedded or on its face. Any linkage of the card ID tothe individual is retained only in a central registerrather than for operational use. Someone else may usethe access card at a later date.

Examples of RFID used (or intended to be used) toidentify and track individuals in health care contextsinclude:

• Health care employee identification cards;

• Patient health care identification cards;

• Ankle and wrist identification bracelets (e.g., for patients, babies, wandering or elderlypatients); and

• Implantable RFID chips.

The assignment of temporary RFID-enabled braceletsor anklets to patients for the duration of theirhospitalization and treatment, especially in largefacilities, can help reduce the risk of patientmisidentification, wandering or treatment error.

RFID-enabled bracelets are being effectively used bymany hospitals and health-care facilities as alternativesto printed bar code identification to securely identifypatients. Consent is typically provided or implicit, inthe same manner as would be provided to allowidentification through the use of a bar code or humanreadable tags.

The practice of assigning RFID-enabled bracelets tonewborn babies, in order to prevent inadvertentmixups or abduction, is considered to be areasonable, proportional and effective measure. Onesuch maternity identification program also assigns amatching RFID to the mother, for added assurance, inorder to confirm the match between mother and child.

In many cases, the use of RFID wristbands, surprisingly,offer better patient privacy due to the fact thatconfidential and often sensitive medical informationcan be securely stored in the RFID tag, or accessedautomatically from a centralized system rather thanprinted in human-readable format on the band itself.

Other examples include tracking medical researcherswho work with biohazardous and contagiousmaterials, where records of all movements andinteractions are imperative.

RFID-embedded (“contactless”) Identification cards area special category of health care RFID use. Here wemust distinguish between employee identification (andaccess) cards (whether “smart” or not), and patientidentification cards. Employee Identification cards, areincreasingly being equipped with RFID technologies inorder to identify and authenticate the bearer andfacilitate access to physical spaces and other (e.g.computer) resources, as well as for process control andaudit purposes. Dual or multi-purpose employeeidentity cards can serve differing functions at differenttimes, according to context. Such a multi-purpose cardand the data it contains, if not properly controlled,

18

Page 19: RFID and Privacy

invites over-identification for some functions, functioncreep, and unwanted employee profiling.

Patient identification cards are used by health-carefacilities to facilitate patient admission, treatment, andrecord-keeping. Given that personal health informationis highly sensitive, significant security and privacyconcerns would need to be addressed. The value ofthe embedded RFID data, if cloned, could beespecially high since it may be easily obtained bystealth and used to obtain free health care by anyonecapable of cloning the card’s contents (or acquiring acloned card). This could open the door to identityfraud and theft.

Perhaps the most controversial use of RFID for trackingpeople involves implanting small RFID chips insidehuman bodies, typically below the skin of the upperarm. Approved by the U.S. Food and DrugAdministration in 2004, RFID implants are beingtrialed in a number of non-medical scenarios,including military, employment, financial andrecreational. In the health-care realm, voluntary RFIDimplant programs exist for individuals wishing to allowautomatic identification and retrieval of their medicalrecords by virtue of a 16-digit number correlated toinformation stored on a secure database. New RFID-based implants can also act as biosensors and asmicro electro-mechanical systems for monitoring healthconditions.

Generally speaking, if an RFID patient identificationprogram responds to a defined problem or issue in alimited, proportional and effective manner, and isdeployed in a way that minimizes privacy and securityrisks, at least as effectively as any alternative solution,then in principle there should be few privacy concernswith the program.

Privacy ConsiderationsFew topics elicit such strong views among the privacycommunity, medical practitioners, ethicists, consumerand civil rights groups, technologists, and public policyand lawmakers than proposals for using any type oftechnology to automatically and remotely identify andtrack human beings without their consent.

The prospect of remote, automated identification andtracking of individuals goes straight to the heart ofcritical privacy fears and concerns about RFIDtechnology. These fears include:

• Surreptitious identification of individuals by knownand unknown parties, without their prior knowledgeor consent;

• Systemic tracking and surveillance of individuals byknown and unknown parties, without priorknowledge or consent;

• The construction of histories and profiles aboutindividuals and their interactions, without theindividual’s prior knowledge or consent;

• Correlation of acquired data with contextual andother information obtained elsewhere;

• Unwanted or incorrect inferences about theindividual derived from the data;

• Unauthorized revelation of personal and private factsand disclosure to others;

• The inherent imbalance of power and potential forundesirable social engineering, control anddiscrimination on the basis of RFID-generated data;

• Unauthorized access, theft, and loss of RFID-basedpersonal data held by custodians;

• Unauthorized interception and access to protectedinformation stores by unknown parties, due to poorinformation security practices;

• The cloning of RFID identification data andpossibility of unauthorized access to physical andlogical resources, and of identity theft;

• The negative consequences upon the individual of allthe above activities;

• The inability of individuals to find out about thecollection and misuse of their data, and to remedyany errors or abuses; and

• The lack of confidence and trust by individuals in theinformation management practices of organizations.

More than two dozen U.S. states have, in the past twoyears, introduced bills intended to specifically restrictor otherwise prescribe the use of RFID for humanidentification and tracking. At least three states haveenacted laws to ban mandatory RFID “chipping” ofindividuals. Highly contentious public proposals forlarge-scale RFID-enabled passports, travel documents,enhanced drivers’ licenses and other portabledocuments continue to be actively debated, withprivacy concerns at the forefront.

It is interesting to note the complexity andcontentiousness of the matter for civil society. Few ofthese proposals, however, deal with health-carescenarios. One major exception is the subcutaneous“chipping” of patients, such as for long-term carepatients suffering from Alzheimer’s or dementia, whomay be incapable of reliably identifying themselves forproper care and treatment, and are prone towandering.

The practice of subcutaneous chipping has beenapproved by the U.S. Food and Drug Administration

19

Page 20: RFID and Privacy

as safe, and at least one U.S. company offers a nationwide program for individuals to voluntarily becomechipped in order to be identified faster byparticipating caregivers, especially if unconscious orotherwise unable to communicate. The chip contains ashort alphanumeric string that, when queried against asecure database, allows rapid access to personally-stored health records.

The U.S. Council on Ethical and Judicial Affairs (CEJA),which develops policies for the American MedicalAssociation, issued a report (2007) saying thatimplantable RFID devices may compromise people'sprivacy and security because it is yet to bedemonstrated that the information in the tags can beproperly protected.

Complex legal and ethical questions are invoked byRFID (and other ICT) implants in the human body.Many of these questions were addressed by theEuropean Group on Ethics (EGE) in Science andTechnology to the European Commission. In its 2005report, the EGE stressed that RFID (and other implants)in the human body can have repercussions for humandignity, and that their use for health-care requiresinformed consent, utmost transparency and strict limitsin the case of patients unable to consent. Implants togain control over the will of people should be banned,and the autonomy of the patient is the yardstick.

Apart from subcutaneous chipping of the hospitalizedelderly, there may be other justifiable reasons andcircumstances for using RFID technologies in a less-invasive and less-permanent manner, to identify staffand patients. At least one elderly-care treatment centerassigns the elderly an active tag on a lanyard,allowing staff to automatically monitor and track thelocation of patients as they move about the facilities,and to respond immediately in the event of anincident.

Examples of RFID UsesPatient ID system: In January 2007, HP and PrecisionDynamics Corporation (PDC) announced thedeployment of a comprehensive RFID-based patientmanagement system at the Chang-Gung MemorialHospital (CGMH) in Taiwan. The system offers themedical facility numerous benefits and has alreadyrealized positive results in patient identification.Patients are given wristbands with embedded RFIDchips that increase the accuracy of patientidentification and decrease the risk of so-called“wrong-site” and “wrong-patient” surgery, in which theincorrect operation is performed on the correct patient,or the correct operation is performed on the incorrectpatient. Under the new system, CGMH has realized100% accurate patient identification in the operating

room. The system also automates data gathering,which cuts down on previous human error resultingfrom oral communication and manual data entry. Thisautomation also yields better compliance withstandard operating procedures. Alerts are generatedin real-time when the sequence of a prescribed processis going amiss. In addition to improved accuracy, theHP-PDC system brings improved efficiency. Medicalstaff now spend 4.3 minutes less verifying patient dataper incident. This figure multiplied across hundreds oreven thousands of daily patients (CGMH is part of an8,800-bed health care system) can bring dramaticsavings and, ultimately, better health care. Lastly, theRFID wristbands offer better patient privacy in that theconfidential and often sensitive medical information isstored on the RFID chip rather than printed in plainview on a wristband.

Wi-Fi Elderly Care: An Australian provider of elderlycare is using a Wi-Fi-based RFID system to enableresidents to quickly and easily call for help when theyneed it. The medical alerting system notifies caregiversany time a resident wanders into a dangerous area orhasn't moved for a long time, indicating that they mayneed help. Affixed to lanyards that can be wornaround the neck, the tags measure approximately 2 by1.5 inches and are a half-inch thick. They are water-resistant and feature large, easy-to-find call buttonsthat residents can press when they are in trouble orneed assistance. Staff also wear the tags so they caneasily issue an emergency alert. When a tag's callbutton is pressed, the tag transmits its unique IDnumber to a nearby Wi-Fi access point, which passesthat information on to each staff member's mobilehandheld device, as well as to flat-screen monitorsinstalled throughout the complex. The system canidentify the room in which a tag is located, andincludes a set of configurable rules designed to triggeralerts when broken.

Patient Monitoring: A Belgian University Hospital maybe the first to use RFID technology not just to trackwhere patients are, but how they are. The hospital isusing WiFi RTLS tags integrated with medicalmonitoring equipment to remotely transmit patienthealth data and emergency alerts. Nurses carryingwireless phones can instantly access patientinformation from the monitoring equipment, includingblood pressure, oxygen level, and evenelectrocardiogram images. In case of emergency, theRTLS tags can automatically issue an alert. The systemis currently being deployed at a 1,100-bed hospital.The integrated system includes the hospital’s legacyWiFi wireless network, WiFi-enabled RTLS tags,wireless phones, a Wireless Location Appliance,various communication technologies, and monitoring

20

Page 21: RFID and Privacy

equipment from a major medical systems manufacturer.The tags are placed on monitoring equipmentassigned to cardiology patients, who are then free totake strolls, visit lounges, and move about the facility.The application will provide patient location data inaddition to advanced medical telematics information.

Protecting Newborns: Each year in the U.S., there are100-150 baby abductions, with more than 50% ofthose babies taken from health-care faculties. There arealso over 20,000 mix-ups, with the majority caughtbefore the parents even know. A Dallas hospital wasthe first hospital to implement the "Hugs and Kisses"RFID system, which uses active RFID tags to tag babiesand mothers. A 'Hugs' tag is attached to the baby'sfoot. Mothers wear a 'Kisses' wrist band. If they pickup the wrong baby they hear an audible alarm, whilepicking up the correct baby results in a confirmation.RFID reader installations mean that any attemptedabduction is detected as the baby is moved, with thesystem linked to CCTV and security. The tags aredisabled after a time lock when the fire alarm hasbeen activated. Over 400 U.S. hospitals are currentlyusing the RFID-based baby and mother monitoringsystem.

Medical Implant: Doctors at the University of TexasSouthwestern Medical Center, working with engineersfrom the University of Texas, Arlington, have developedinnovative RFID-based medical technology to detectgastroesophageal reflux disease, caused by stomachcontents moving up the esophagus. The condition,commonly referred to as esophageal reflux or GERD, isestimated to affect as many as 19 million people. Thenew solution combines RFID with sensor technology tomeasure and transmit data from within a patient'sbody. A dime-sized RFID chip is inserted into theesophagus, where it remains pinned until a physicianremoves it. Equipped with an electrical impulse sensor,the chip measures particular impulses that indicate thepresence of acidic or non-acidic liquids in theesophagus. These collected measurements aretransferred from the RFID chip to a wireless receptorhanging around the patient's neck.

Implants: In September, VeriChip Corporation, aprovider of RFID systems for health care and patient-related needs, announced that more than 90Alzheimer’s patients and caregivers received theVeriMed™ RFID implantable microchip at the officiallaunch of their Project with Alzheimer’s CommunityCare. VeriChip’s collaboration with Alzheimer’sCommunity Care consists of a voluntary, two-year,200-patient trial to evaluate the effectiveness of theVeriMed™ Patient Identification System in managingthe records of Alzheimer’s patients and theircaregivers.

GuidanceBecause RFID technology allows for the automaticidentification of identifiable individuals, specialvigilance is required when tagging people. Theprivacy and security risks associated with collecting,processing, and retaining personal information are thegreatest here, and require the strictest, most rigorousand most transparent application of projectmanagement skills and risk mitigation measures.

Subcutaneous RFID chips appear to be the mostextreme form of using RFID technology to identifyhumans with its inherent risks. The majority ofdeployments, however, involve the simple assigning ofan RFID-embedded card or bracelet to an individual.When pursuing this type of identification purpose, thefollowing important design and control parametersshould be considered:

• Is the tag directly encoded with personallyidentifiable information?

• Is the tag and its data part of an “open-loop” system

(i.e., involving multiple organizations and actors)?

• Will the data be housed by an outside third party?

• Is the tag subject to tampering and cloning?

• Is the tag and its contents under the control of theindividual?

• Is the tag active or passive, read-only or re-writable?

• Is the tag temporary or otherwise removable from theindividual

(e.g. bracelets, anklets, implants vs. lanyard, ID ornamecard or other token)?

• Will the tag’s information, or tag itself, bepermanently destroyed once its use expires?

Professional and Ethical ConsiderationsWhenever considering, designing and implementinginformation systems that involve collecting, using,retaining and disclosing sensitive personal (health)information of patients, health-care providers arestrongly advised to consult appropriate professionalcodes and other codes of ethics. When in doubt,always check with additional sources.

In Canada, many such policies, guidelines and codesfor the ethical uses of health information have beendeveloped and are readily available. Readers areencouraged to visit the following useful websites:

• Canadian Institute for Health Research (CIHR):Policies and Guidelines in Ethics at: www.cihr-irsc.gc.ca/e/29335.html

• Developing a quality criteria framework for patientdecision aids: online international Delphi consensusprocess at: www.bmj.com/cgi/content/full/333/7565/417

• Ethics in Mental Health Researchat: www.emhr.net/ethics.htm

21

Page 22: RFID and Privacy

ConclusionsIn this paper, we have described RFID technology,provided examples of current uses and discussed itssuitability for the health-care sector. RFID offers manypotential benefits in a wide variety of health-carecontexts for improving the safety, efficiency andeffectiveness of health-care delivery. However, if notimplemented with due care, it can also impact privacyinterests in profound and negative ways.

We have grouped together three different classes ofRFID deployment and described, at a general level,some of the security and privacy issues that couldarise. We have suggested the use of various privacy-enhancing methodologies, tools, and techniquesintended to ensure that privacy safeguards are builtinto information systems from the very start, sufficient tomitigate known vulnerabilities, threats and risks. Theresulting RFID systems should merit the confidence andtrust of all users and stakeholders, as well as meetinglegislative compliance requirements.

The first class of RFID use involves the tagging of“things” alone, with no linkage to personal identifiers,and accordingly, no privacy issues.

The second class involves the potential for datalinkage to personal identifiers, raising the possibilitythat individuals could be identified and tracked. Thiscalls for the introduction of strong privacy-protectivemeasures to ensure that no unintended consequencesarise.

The third class involves the use of RFID intendedprecisely for the purpose of identifying people, thusserving as personal identifiers. While strong privacymeasures are clearly required here, the concern withunintended consequences in this category is arguablyless than in the previous one, where data linkage withpersonal identifiers is ancillary to the primary purpose.Care must always be taken, however, regardless of theextent of the threat posed, for strong protection ofprivacy.

We must ensure that Fair Information Practices - theheart of privacy and data protection - are clearlyunderstood and implemented. Doing so invariablypaves the way to preserving on privacy.

RFID ResourcesRFID Technology Information Sources• RFID Applications, Security, and Privacy, Garfinkel &

Rosenberg, eds. 2006

• HP Global issue Brief - Radio Frequency Identification(RFID)www.hp.com/hpinfo/abouthp/government/ww/gib_rfid.html?jumpid=reg_R1002_USENTBC

• GS1 EPCglobal:

– GS1: www.gs1.org

– EPCglobal: www.epcglobalinc.org

– Discover RFID: www.discoverrfid.org

• RFID Journal: www.rfidjournal.com

• RFID Update: www.rfidupdate.com

RFID & Health Care/Life Sciences• RFID Journal, Radio Frequency Identification in

Health Care (Dec 2007), at:www.rfidjournal.com/article/articleview/3777

• Informationsforum RFID, RFID for the HealthcareSector (August 2007), at: www.info-rfid.de/downloads/RFID_-_for_the_Healthcare_Sector.pdf

• The European Group on Ethics in Science and NewTechnologies to the European Commission, Opinion20: Ethical aspects of ICT implants in the humanbody (2006)

Press Release:http://ec.europa.eu/european_group_ethics/docs/cp20_en.pdf

Report:http://ec.europa.eu/european_group_ethics/docs/avis20compl_en.pdf

– The ethical aspects of ICT implants in the humanbody: Proceedings of the Roundtable Debate(Amsterdam, 21 December 2004)http://ec.europa.eu/european_group_ethics/publications/docs/tb21dec_ict_en.pdf

• AMA Council on Ethical and Judicial Affairs, CEJAReport 5-A-07: Ethics Code for RFID Chip Implants(July 2007) at: www.ama-assn.org/ama1/pub/upload/mm/467/ceja5a07.doc

• IDTech Ex, RFID for Healthcare and Pharmaceuticals2007-2017, at:www.idtechex.com/products/en/view.asp?productcategoryid=101

22

Page 23: RFID and Privacy

RFID & Privacy• Office of the Information and Privacy Commissioner

(IPC) of Ontario (Ann Cavoukian, Ph.D.),www.ipc.on.ca

– Tag, You're It: Privacy Implications of RFIDTechnology (2004)

– Overview of RFID Privacy-Related Issues (2006),Presentation by the Commissioner to EPCglobal Inc(July 2006), at:www.ipc.on.ca/images/Resources/up-2006_07_20_IPC_EPCglobal.pdf

– Can You Read Me Now? The Privacy Implicationsof RFID (March 2007), speech to the InternationalAssociation of Privacy Professionals/KnowledgeNetToronto on the privacy implications of RFIDtechnology, at:www.ipc.on.ca/images/Resources/up-12007_03_13_IAPP_KnowledgeNet.pdf

• RFID and Privacy: A Public Information Center:http://rfidprivacy.mit.edu/access/happening_legislation.html

RFID Use Guidance• IPC, Commissioner Cavoukian issues RFID Guidelines

aimed at protecting privacy, News Release (June2006) www.ipc.on.ca/images/Resources/up-2006_06_19rfid.pdf

– Privacy Guidelines for RFID Information Systems(RFID Privacy Guidelines)www.ipc.on.ca/images/Resources/up-1rfidgdlines.pdf

– Practical Tips for Implementing RFID Guidelineswww.ipc.on.ca/images/Resources/up-rfidtips.pdf

• Article 29 Data Protection Working Party, Results ofthe Public Consultation on Article 29 WorkingDocument 105 on Data Protection Issues Related toRFID Technology (June, 2005)http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2005/wp111_en.pdf

• Article 29 Data Protection Working Party, Workingdocument on data protection issues related to RFIDtechnology 10107/05/EN WP105 (January 19,2005)http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2005/wp105_en.pdf

• European Commission, Radio FrequencyIdentification (RFID) in Europe: steps towards a policyframework {SEC(2007) 312}(March 2007), athttp://eur-lex.europa.eu/LexUriServ/site/en/com/2007/com2007_0096en01.pdf

• European Data Protection Supervisor, Opinion on“RFID in Europe … steps towards a policyframework” (Dec 2007), at:www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2007/07-12-20_RFID_EN.pdf

• European Parliament Scientific Technology OptionsAssessment (STOA), RFID and Identity Managementin Everyday Life: Striking the balance betweenconvenience, choice and control,IPOL/A/STOA/2006-22 (July 2007) at:www.europarl.europa.eu/stoa/publications/studies/stoa182_en.pdf

• Electronic Privacy Information Center (EPIC), PrivacyImplications of RFID Technology in Health CareSettings presentation to the U.S. Department ofHealth & Human Services (2005), at:www.epic.org/privacy/rfid/rfid_ncvhs1_05.ppt

• Conference of International Privacy and Dataprotection Commissioners, Resolution on Radio-Frequency Identification (2003) at:www.privacyconference2003.org/resolutions/res5.DOC

• U.S. Federal Trade Commission, Radio FrequencyIdentification: Applications and Implications forConsumers (Workshop Report, Mar 2005) availableat: www.ftc.gov/os/2005/03/050308rfidrpt.pdf

• CDT Working Group on RFID: Privacy Best Practicesfor Deployment of RFID Technology:www.cdt.org/privacy/20060501rfid-best-practices.php

• RFID Position Statement of Consumer Privacy andCivil Liberties Organizations, at:www.privacyrights.org/ar/RFIDposition.htm

• Halamka, Juels, Stubblefield, and Westhues, TheSecurity Implications of VeriChip Cloning:www.jamia.org/cgi/content/abstract/M2143v1

RFID & Security• National Institute of Standards and Technology

(NIST), Guidelines for Securing Radio FrequencyIdentification (RFID) Systems Recommendations of theNational Institute of Standards and Technology,(April 2007), Special Publication 800-98http://csrc.nist.gov/publications/nistpubs/800-98/SP800-98_RFID-2007.pdf

• RSA Laboratories, RFID Privacy & Security:www.rsa.com/rsalabs/node.asp?id=2115

• Demo: Cloning the Verichip: http://cq.cx/verichip.plRSA Laboratories, RFID Privacy & Security:www.rsa.com/rsalabs/node.asp?id=2115

23

Page 24: RFID and Privacy

To learn more, visit www.hp.ca/rfid© 2008 Hewlett-Packard Development Company, L.P. and Information and Privacy Commissioner of Ontario. Theinformation contained herein is subject to change without notice. The only warranties for HP products andservices are set forth in the express warranty statements accompanying such products and services. Nothingherein should be construed as constituting an additional warranty. HP or IPC shall not be liable for technical oreditorial errors or omissions contained herein.

February 2008

• "Security Analysis of a Cryptographically-EnabledRFID Device" at:www.usenix.org/events/sec05/tech/bono/bono.pdfPrivacy-Enhancing Technology (PET) Award PressRelease:www.microsoft.com/emea/presscentre/pressreleases/20062007PETawardsTS.mspx

Hewlett-Packard (Canada) Co.Mail Stop #H385150 Spectrum WayMississauga, OntarioCanada L4W 5G1Website: www.hp.ca/rfid

Information and Privacy Commissioner of Ontario2 Bloor Street EastSuite 1400Toronto, OntarioCanada M4W 1A8Website: www.ipc.on.ca

Technology for better business outcomes