O'Reilly logo

RTLS For Dummies® by Ajay Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B

Privacy Issues

In This Appendix

Allowing users to maintain their personal privacy

Protecting users’ personal privacy

In an era where privacy is valued, tagging people for the purpose of locating them may be met with resistance. And it’s not just about tagging people — sometimes even the fact that a person is using a tagged asset has the potential to violate privacy. Although merits of tracking people and assets are driving RTLS demand, it’s crucial that you understand the impact on privacy.

Privacy issues may be grouped roughly into two categories:

Allowing personal privacy: Different people, cultures, and nations have a wide variety of expectations about how much privacy a person is entitled to or what constitutes an invasion of privacy. In the simplest form, privacy is the right of an individual who is carrying or using an RTLS tag to be left alone. This relates to the RTLS ability to allow an individual to remain unnoticed, unidentified, or untraceable at any time.

Protecting personal privacy: This is the ability of an RTLS system to keep the meaning of the information transmitted between the tag and the reader secure from unintended recipients, such as hackers and criminals.

Because any RTLS application’s success depends upon the people who carry or use the RTLS tags, without addressing privacy issues carefully, appropriately, and clearly, you can severely limit the RTLS benefits.

Allowing Personal Privacy

Employees and visitors typically have to relinquish some ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required