{"id":417721,"date":"2024-10-20T06:17:26","date_gmt":"2024-10-20T06:17:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-tr-166842014-2\/"},"modified":"2024-10-26T11:43:21","modified_gmt":"2024-10-26T11:43:21","slug":"bsi-pd-cen-tr-166842014-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-tr-166842014-2\/","title":{"rendered":"BSI PD CEN\/TR 16684:2014"},"content":{"rendered":"
This Technical Report is to assist operators of applications in areas where radio frequency interrogators are deployed, to identify the types of information that are called for in the recommendation.<\/p>\n
The Technical Report provides all the current information to assist operators to develop and publish a concise accurate and easy to understand information policy for each of their applications.<\/p>\n
The policy should at least include:<\/p>\n
the identity and address of the operators;<\/p>\n<\/li>\n
the purpose of the application;<\/p>\n<\/li>\n
what data are to be processed by the application, in particular if personal data will be processed, and whether the location of tags will be monitored;<\/p>\n<\/li>\n
a summary of the privacy and data protection impact assessment;<\/p>\n<\/li>\n
the likely privacy risks, if any, relating to the use of tags in the application and the measures that individuals can take to mitigate these risks.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | 0 Introduction 0.1 General 0.2 Overview <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Terms and definitions 3 CCTV as an Exemplar <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Figure 1 \u2014 CCTV logo, Bus Station Northern Ireland <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Figure 2 \u2014 CCTV logo, Filling Station in Scotland Figure 3 \u2014 Speed Safety Camera signs <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Figure 4 \u2014 Speed Safety Camera signs 4 The RFID European Emblem 4.1 General Figure 5 \u2014 RFID Emblem <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.2 Guidelines on the use of the Common European RFID emblem 4.3 Definition of the Common European RFID Notification Sign <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.4 Placement of signs 4.4.1 General 4.4.2 Presence of Readers 4.4.3 Placement of signs notifying the presence of readers 4.4.3.1 General 4.4.3.2 Multiple Applications 4.4.3.3 Multiple Operators 4.4.4 Presence of tags 4.4.4.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.4.4.2 Use of Emblem on tagged items 4.4.4.3 Purpose of application declaration on tagged items 4.4.4.4 Contact Point 4.5 Who should place signage on tagged items <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.6 Size of emblem 5 Guidelines on additional information 5.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 Name of the operator of the application 5.2.1 Name 5.2.2 Contact point 5.3 Purpose of the application <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.4 Data processed 5.5 Summary of the privacy impact assessment 5.5.1 PIA report date 5.5.2 RFID application operator 5.5.3 RFID application overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.5.4 Data on the RFID tag 5.6 Likely privacy risks 5.7 Measures to mitigate the risks <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Table 1 \u2014 PIA Summary of the PIA Process 5.8 Privacy information policy for RFID 5.8.1 General 5.8.2 Consumer and members of the public choice information \u2013 promotional material <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.8.3 Consumer and members of the public choice information \u2013 sales material and pre-contract information 5.8.4 Consumer and members of the public choice information \u2013 means of conveying the information 5.8.5 Consumer and members of the public privacy information accessibility <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.8.6 Privacy related contractual and privacy policy information 5.8.7 Consumer and members of the public post sale user privacy information <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.8.8 Consumer and members of the public information \u2013 means of conveying the post sale user privacy information 5.9 Consumer and public information \u2013 non application operator RFID privacy information <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex A (informative) RFID applications in retail <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex B (informative) RFID applications in library <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex C (informative) RFID applications in transportation <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Figure C.1 \u2014 Card IFM Project Figure C.2 \u2014 Card RMV Figure C.3 \u2014 Card MOBIB <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Figure C.4 \u2014 Card OneSchotland Figure C.5 \u2014 Card NaviGO <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Figure C.6 \u2014 Card IFM Project <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Figure C.7 \u2014 ISO 24014:\u2014 IFM operational and management entities <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex D (informative) RFID applications in banking Figure D.1 \u2014 MasterCard paypass <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Figure D.2 \u2014 Visa payWave Figure D.3 \u2014 MasterCard paypass Watch <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Figure D.4 \u2014 Visa Key Chain Figure D.5 \u2014 Contactlesss Terminal <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Notification of RFID. Additional information to be provided by operators<\/b><\/p>\n |