Cover: 9 to 5:  Do You Know if Your Boss Knows Where You Are?

9 to 5: Do You Know if Your Boss Knows Where You Are?

Case Studies of Radio Frequency Identification Usage in the Workplace

Published 2005

by Edward Balkovich, Tora K. Bikson, Gordon Bitko

Download

Download eBook for Free

FormatFile SizeNotes
PDF file 0.2 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 Format Price
Add to Cart Paperback36 pages $12.00

Radio Frequency Identification (RFID) tags are finding their way into a broad range of new applications that have raised concerns about privacy that demonstrate how emerging information technologies can upset the balance of privacy, personal benefits, and public safety and security. Although proposed retail uses are new, RFID tags have been used to control access in the workplace for over a decade. The authors conducted a case study of six enterprises to understand their policies for collecting, retaining, and using personally identifiable records obtained by sensing RFID-based access cards. They found that RFID usage in the surveyed workplaces has a number of common features (data are used for more than access control, access control system records are linked with other enterprise databases, and security and employment practices trump privacy concerns), but that policies are not generally written down or communicated to employees. They conclude that although employees ought to be informed about uses of access control system records and have the right to inspect and correct records about their activities, implementing traditional fair information practices for access control systems records would be impractical for some situations, such as the individual’s ability to correct an erroneous record. Thus there is a need for a modified notion of fair information practices with regard to this use of RFID technology.

The research in the public interest described in this report results from the RAND Corporation’s continuing program of self-initiated research. Support for such research is provided, in part, by donors and by the independent research and development provisions of RAND’s contracts for the operation of its U.S. Department of Defense federally funded research and development centers.

This report is part of the RAND technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.