National Academies Press: OpenBook

Privacy Issues with the Use of Smart Cards (2008)

Chapter: VI. CONCLUSION

« Previous: V. TRANSIT AGENCIES AND SMART CARDS: POLICIES AND PROCEDURES GOVERNING INFORMATION, ACCESS, AND USE
Page 22
Suggested Citation:"VI. CONCLUSION." National Academies of Sciences, Engineering, and Medicine. 2008. Privacy Issues with the Use of Smart Cards. Washington, DC: The National Academies Press. doi: 10.17226/23104.
×
Page 22
Page 23
Suggested Citation:"VI. CONCLUSION." National Academies of Sciences, Engineering, and Medicine. 2008. Privacy Issues with the Use of Smart Cards. Washington, DC: The National Academies Press. doi: 10.17226/23104.
×
Page 23

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

23 • Designating which position within the department or agency is responsible for the implementation of and ad- herence to this privacy policy; • Prominently posting the policy physically in its offices and on its Internet website, if any; • Distributing the policy to each of its employees and con- tractors who have access to personal data; • Complying with the Information Practices Act (Civil Code Section 1798 et seq.), the Public Records Act (Gov- ernment Code Section 6250 et seq.), Government Code Section 11015.5, and all other laws pertaining to informa- tion privacy, and • Using appropriate means to successfully implement and adhere to this privacy policy.188 The Smart Card Alliance recommends the following policy objectives: • Smart card-related databases of personal information should be encrypted and should transmit only encrypted information. • Transactions between smart card and reader should be offline only, and any information captured by a reader or other intermediate system should be deleted as soon as a transaction is complete. • Organizations should set up checklists to show who is authorized to see or change information in each data field. • Cardholders should be required to authorize, via pass- word, personal identification number or biometric per- mission, the extraction of any data from their smart cards. • Applications should be structured so that transaction records can’t be used as surveillance tools. 189 Further, the Smart Card Alliance recommends: • The organization must have a privacy and security pol- icy that clearly defines what personal information is to be collected, how the information will be used, who can ac- cess the information, how the information will be pro- tected, and how the individual will control its use and provide updates to the information over time. • The enrollment and identity proofing process must ver- ify that the information presented is accurate and protect the confidentiality and integrity of that information. • The system must protect each individual’s information at all times, including while the information is being stored and while it is being used. • The ID an individual carries must protect its contents from being copied, altered, or hacked, to prevent unau- thorized use, misuse, or disclosure of the personal infor- mation it carries. • The exchange of data between the ID and whatever de- vice reads the ID must be protected to prevent unauthor- ized capture and use of data to impersonate an individ- ual. 188 http://www.dot.ca.gov/privacy.html. 189 http://www.gcn.com/online/vol1_no1/21158-1.html (Last visited Jan. 24, 2008). • Access to the personal information should be granted only after an issuer-defined authentication process. Only necessary information should be released and only to au- thorized systems or individuals. • All personnel involved in using the system must be carefully trained and monitored to ensure strict confor- mance to the system’s policies and practices. Compromis- ing these policies and practices means compromising the identity management system itself. 190 Each transit provider would be well advised to closely examine these fair information standards and policies if it has not already done so. Further, each transit pro- vider can determine which principles and guidelines suit its particular objective, protect the transit users’ privacy, and are legally defensible. VI. CONCLUSION Smart Cards have many potentially valuable uses. They may facilitate more expeditious, efficient, and economical fare collection, easing passenger access to and through the system. They may allow the collection of more useful data that can be employed to make bet- ter marketing and planning decisions, including types of fare stimulation packages or when and where new or different services should be offered. They also have the potential to add a layer of security to the transit system so as to ban dangerous patrons or terrorists from the system or apprehend them if they commit a criminal act, particularly if biometric identifiers and more pow- erful RFID card readers are incorporated into them. The more the information collected and correlated with other databases moves across the spectrum from mere fare collection to market data collection to security and surveillance, the greater the privacy concerns. The fundamental challenge of transportation security is to be highly effective in protecting the public against terrorism, while not intruding unnecessarily upon per- sonal privacy, convenience, and civil liberty, nor bur- dening unduly the efficiency of public transportation. The public would be well served if careful thought and analysis was given to where to draw the line between these conflicting policy objectives. As we have seen, transit providers enjoy a wide Con- stitutional latitude in which to collect observable infor- mation in public areas such as transit stations and ve- hicles. They have a legitimate governmental interest in the collection of information concerning fares, and probably such additional data as the identity and ad- dress of the card holder. They probably also have wide discretion to acquire information necessary to serve the compelling governmental interest in protecting public safety and security, such as biometric identifiers, and correlate that data with law enforcement information, particularly in a post-9/11 world—a world in which London and Madrid subways have been bombed, and 190 http://www.smartcardalliance.org/alliance_activities/identity.cf m (Last visited Jan. 24, 2008).

24 Tokyo subways have been gassed, by terrorists. In such an environment, there may be a compelling governmen- tal interest in the protection of public safety that may allow a wide berth of information acquisition and user monitoring. Moreover, the courts have already given governmental institutions wide latitude in monitoring individual conduct in public places, as transit facilities clearly are. However, the acquisition of information not legitimately related to security (such as a patron’s race, religion, political affiliation, or sexual preference), or the imposition of intrusive security measures or proce- dures (such as strip searching suspect patrons) would not likely survive Constitutional scrutiny. Absent Constitutional restraint, the issue becomes one of what sorts of local legal, regulatory, or institu- tional restraints may be imposed. As we have seen, some state statutes and transit agency regulations do attempt to protect privacy. Sometimes, the statutes work at cross purposes, as when on the one hand a state attempts to enhance governmental transparency by promulgating a Freedom of Information Act, while on the other it attempts to protect individual privacy by limiting its dissemination. A transit provider also can further protect privacy through its internal regulations or procedures. Though the Constitutional latitude may be wide, local governmental institutions and transit providers may voluntarily seek to provide privacy pro- tection beyond that mandated by federal law. Transit agencies’ regulations or procedures can pro- tect privacy in various ways. They may limit the type of information that is gathered. They may circumscribe the universe of persons who may have access to it. They may protect information against external dissemina- tion. Information collected can be encrypted, and fire- walls built against external access. The information collected can be prohibited from distribution except by court order. Transit providers, however, must deter- mine the extent of that privacy protection and how it will be legally implemented.

Next: ACKNOWLEDGMENTS »
Privacy Issues with the Use of Smart Cards Get This Book
×
 Privacy Issues with the Use of Smart Cards
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s Transit Cooperative Research Program (TCRP) Legal Research Digest 25: Privacy Issues with the Use of Smart Cards examines basic privacy issues associated with the acquisition and storage of financial and trip data associated with the use of a transit smart card. The report explores who can access the data collected, what data may be accessed and under what conditions, and how the information can be used.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!