RFID Spychips! Grocery Store Surveillance

Written by Mike Banks Valentine

Continued from page 1

More and more giant retailers like Walmart are requiring suppliers to use RFID technology. The German chain Metro Group, which operates 2300 stores in Europe and Asia has demandedrepparttar same of their suppliers. Metro Group has gone even further with RFID to operate what they callrepparttar 133525 "Store ofrepparttar 133526 future" where shoppers needn't remove items from shopping carts to pay for them. They simply pass by RFID readers and all items will be tallied and paid for. Metro stores provide RFID tagged "loyalty cards" to consumers that identifies those shoppers by reading within purses and wallets as those consumers enter and leave any ofrepparttar 133527 2300 Metro stores.

Business Week Article on Metro Future Stores Protest

Target Stores announced this month that they too, would be requiring suppliers to RFID tag atrepparttar 133528 pallet and case level by 2005.

Privacy loving Americans may not stand forrepparttar 133529 "Big Brother" implications of a system like that used byrepparttar 133530 German retail chain. An anti-RFID web site has been launched by privacy advocates and named "Spychips" forrepparttar 133531 ability ofrepparttar 133532 chips to track consumers and link their buying habits to other personally identifiable information.

A recent piece by technology commentator Jeffrey Harrow has a chilling description of how RFID technology might betray consumers movements and link their buying habits in a huge database. Harrow is a consultant and analyst of emerging technology. He often comments on privacy implications related to implementation of emerging technology. ------------------------------------------------------------- Harrow paints a harrowing picture of RFID readers.

"The issue is that these many sensors . . . would also note repparttar 133533 passing of your car key's unique ID;repparttar 133534 unique ID of your driver's license, and evenrepparttar 133535 unique ID of each and every dollar bill in your wallet. ... And if allrepparttar 133536 chains' main computers and those of smaller stores made this mass of random information available to say, a Marketing firm, or to other stores along your path (for a fee, of course), or to a government organization upon demand, then a very detailed picture of "You" - your travel habits, your spending habits (remember those individually tagged dollar bills?), almost everything about you, could be mixed, matched and dissected in ways that you might, or might not, agree with. This might berepparttar 133537 ultimate "data mining" warehouse."

Harrow Technology Report

RFID is publicly discussed only by technology enthusiasts like Harrow and a few privacy advocates concerned aboutrepparttar 133538 implications of that "data mining warehouse". But as those RFID chips supplant barcodes overrepparttar 133539 next couple of years, we'll be hearing from privacy advocates whenrepparttar 133540 Big Brother implications become clearer to consumers. Mark your calendar for early in 2005 and prepare to weatherrepparttar 133541 coming storm of privacy concerns that could reach hurricane proportions.

------------------------------------------------------------ Mike Banks Valentine is a web journalist covering privacy issues where you can learn about Automotive Event Data Recorders or EDR's, Computer SpyWare, Identity Theft, Surveillance, HIPAA, COPPA, TIA, GLB and privacy implications of the USA Patriot Act.

What is Software Piracy?

Written by S. Housley

Continued from page 1

Indications of reseller piracy are multiple users withrepparttar same serial number, lack of original documentation or an incomplete set, and non-matching documentation.

Trademark/Trade Name Infringement Infringement occurs when an individual or dealer claims to be authorized either as a technician, support provider or reseller, or is improperly using a trademark or trade name.

BBS/Internet Piracy - BBS/ Internet Piracy occurs when there is an electronic transfer of copyrighted software. If system operators and/or users upload or download copyrighted software and materials onto or from bulletin boards orrepparttar 133524 Internet for others to copy and use withoutrepparttar 133525 proper license. Often hackers will distribute or sellrepparttar 133526 hacked software or cracked keys. The developer does not receive any money forrepparttar 133527 softwarerepparttar 133528 hacker distributed. This is an infringement onrepparttar 133529 developer's copyright.

Another technique used by software pirates is to illegally obtain a registered copy of software. Pirates purchaserepparttar 133530 software once and use it on multiple computers. Purchasing software with a stolen credit card is another form of software piracy. Unfortunately there are many kinds of software piracy that has hamperedrepparttar 133531 software industry.

These types of software piracy have hamperedrepparttar 133532 software industry. Forrepparttar 133533 software industry to prosper and further develop useful software for consumers please support and pay for software. This results in better software for all.

To Report Piracy : Software Information Industry Association - http://www.spa.org/piracy/default.asp

About the Author: Sharon Housley manages marketing for NotePage, Inc. http://www.notepage.net a company specializing in alphanumeric paging, SMS and wireless messaging software solutions. Other sites by Sharon can be found at http://www.softwaremarketingresource.com and http://www.small-business-software.net

    <Back to Page 1
ImproveHomeLife.com © 2005
Terms of Use