Q

How can organizations secure implanted microchips and RFID tags?

RFID tages and implanted microchips provide excellent tracking technolgies, but what security risks do they involve? Security management expert Mike Rothman weighs in.

I have heard a lot of discussion lately about implanted microchips and RFID tags. How can organizations secure these tracking technologies, what are the advantages of using these devices from a security standpoint and what dangers do they pose?
RFID tags and RFID implants are totally different animals. RFID tags are becoming commonplace in warehouse and other high-volume tracking use cases where it's important to find something in a large environment. These applications are like any other application: make sure access to the application is governed and the data stored by the application is protected.

In terms of advantages, RFID tags provide a level of granularity in tracking items that hasn't been economically

feasible before. The tags are revolutionizing inventory management, and that's a good thing. From a security standpoint, it's possible to use tags to track assets, which could provide more control over where employees take company-owned devices, but that assumes there are RFID readers everywhere an employee would be.

There are also physical security use cases of RFID tags. For example, they could replace the well-worn proximity card readers that most buildings employ. I'm not sure of the economic benefits, but it's certainly a possible use case.

RFID implants have similar application security requirements as tags, but the privacy issues are a totally different ballgame. If medical records are linked to the RFID implant, there are serious HIPAA mandates to protect that information.

As the technology evolves, I believe that human RFID implants could become a slippery slope toward a Big Brother environment. Right now, to my knowledge, there are no GPS-enabled RFID implants -- at least of the variety that could be tracked anywhere in the world -- but eventually they will become reality. Then the question becomes more about ethics than security.

More information:

This was first published in June 2008

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close