The IT Law Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 5: Line 5:
 
== Overview ==
 
== Overview ==
   
βˆ’
This publication seeks to assist organizations in understanding the risks of [[RFID]] technology and [[security]] measures to [[mitigate]] those [[risk]]s. It provides practical, real-world advice on how to initiate, design, [[implement]] and operate [[RFID]] [[system]]s in a manner that [[mitigate]]s [[security]] and [[privacy]] [[risk]]s. The document also provides background information on [[RFID]] [[application]]s, [[standard]]s, and [[system]] components to assist in the understanding of [[RFID]] [[security risk]]s and [[security controls]].
+
This publication seeks to assist organizations in understanding the risks of [[RFID]] technology and [[security]] measures to [[mitigate]] those [[risk]]s. It provides practical, real-world advice on how to initiate, design, [[implement]] and operate [[RFID]] [[system]]s in a manner that [[mitigate]]s [[security]] and [[privacy]] [[risk]]s. The document also provides background information on [[RFID]] [[application]]s, [[standard]]s, and [[system]] components to assist in the understanding of [[RFID]] [[security risk]]s and [[Security controls]].
   
 
This document presents [[information]] that is independent of particular [[hardware platform]]s, [[operating system]]s, and [[application]]s. The emphasis is on [[RFID]] [[system]]s that are based on industry and international [[standard]]s, although the existence of [[proprietary]] approaches is noted when they offer relevant [[security]] features not found in current [[standard]]s.
 
This document presents [[information]] that is independent of particular [[hardware platform]]s, [[operating system]]s, and [[application]]s. The emphasis is on [[RFID]] [[system]]s that are based on industry and international [[standard]]s, although the existence of [[proprietary]] approaches is noted when they offer relevant [[security]] features not found in current [[standard]]s.

Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA

Cancel Editing help (opens in new window)