Preview

The Personal Data (Privacy) Ordinance and Octopus Card System  

Powerful Essays
Open Document
Open Document
1033 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Personal Data (Privacy) Ordinance and Octopus Card System  
The Personal Data (Privacy) Ordinance and Octopus Card System
Lam Ka Chun
3035069794
The University of Hong Kong
CCST9029 Cyberspace Crime: Technology and Ethics
Dr. K.P. Chow
Ms. Chan Vivien Pui Shan

Abstract
This article is about the leakage of data of the Octopus card company. In 2010 , Octopus sold the information of their clients to 6 companies for promotion and made a profit of 44 million Hong Kong dollars over 4.5 years .In view of the case of Octopus case, this article will go through three part to study it : technical aspect, ethical aspect and legal aspect. It will also suggest feasible suggestions.

The dis-honest company led a leakage of personal data:
Octopus Card Company
Introduction of Octopus card company
According to the statistics, 95% of those between the ages of 16 and 65 have an Octopus and Octopus processes over 12 million transactions a day. The card is accepted by more than 100 transportation service providers and 160 retailers, including 7-Eleven, Starbucks, and Park & Shop. It can also be used at pay phones, photo booths, and parking garages. This reveals that the octopus is commonly and widely used. Also implied that the leakage of personal data influences a lot of people.
Technical Issue
In terms of technical Issue, Octopus card is a rechargeable contactless stored value smart card used widely in transportation and retail business. How can it transfer the money without contact? It is because it used the technique of Radio Frequency Identification (RFID).
We will go into deeper of the RFID. RFID is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. The Octopus card requires no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). The tag contains electronically stored information which can be read from up to several meters

You May Also Find These Documents Helpful

  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rfid Tagging Paper

    • 761 Words
    • 4 Pages

    What is RFID Tagging? RFID stands for Radio Frequency Identification. Therefore RFID simply means that radio frequency is being used on patients and products as an identifying marker and tracking process. The use of RFID technology on products will be combined with the Electronic Product Code (EPC). This will provide the capability to locate as well as track those items through the entire distribution chain. This means that Healthcare companies can capture required information such as the…

    • 761 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I have viewed a few websites about Radio Frequency Identification (RFID) tags. It is a very tiny technology and often the size of a grain of rice but now have been shrunk to half the size of a grain of sand! RFID tags are intelligent bar codes that can store up information of either merchandises, pets or farm animals and many more depending on what people want to chip the RFID tags into. These RFID tags also act as a very powerful tracking device, which farmers and owners of pets chipped them into their herbivores and pets. Because of the capability to determine the distance of the tag from the reader position, lost pets and farm animals, as well as RFID tagged items can be easily tracked down. However, the use of RFID tags are arising privacy concerns among the human community.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    RFID Chips

    • 3547 Words
    • 15 Pages

    Radio-frequency identification (RFID) chips are small radio-frequency electromagnetic fields that can be used in a product, animal, and humans to track location, transfer data, and to identify the object. These chips are as small as a grain of rice and can store over 2,000 bytes of data. Some chips are powered by and read at short ranges via magnetic fields (electromagnetic induction). Certain chips use a local power source like a battery and some others that don’t use a local battery get the energy from interrogating electromagnetic fields and then act as a passive transponder to emit microwaves. RFID chips have been around for a very long time, but a lot of people don’t know what they are used for and what they are used in.…

    • 3547 Words
    • 15 Pages
    Better Essays
  • Better Essays

    Bp Case Study

    • 1496 Words
    • 6 Pages

    Radio Frequency Identification – RFID – is an established data-carrying technology used throughout industry. Data relating to an item is stored on a tag, which is attached to the item. The tag is activated by radio waves emitted from a reader. Once activated, the tag sends data stored in its memory relating to the item back to the reader. This data can then be shared between organizations and trading partners via the EPCglobal Network in a secure manner.…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    The raised letters and numbers on the plastic cards are now rarely used or even read. This then gave rise to “skimming” devices that could be used by some unscrupulous persons to electronically scan and save the information from many customers' cards. Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. A growing security concern with Skimming devices is the possible release of the user’s personal information or location to unauthorized parties. So, what is now needed is a way to increase the security of payment card use at merchant locations.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Best Essays

    RFID is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data. The purposes of automatically identifying and tracking tags attached to objects. Since RFID tags can be attached to clothing, possessions, or even implanted within people the possibility of reading personally-linked information without consent has raised privacy concerns. There are three types of RFID such as passive, semi-passive and active.…

    • 3330 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Verichip

    • 610 Words
    • 3 Pages

    • RFID technology has previously been used in tracking and access applications and refers to technologies that use low-frequency radio waves to identify individual items…

    • 610 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Name, age, address, social security number. all of these are the usual examples of “Personally identifiable information” or PII. We take for granted that our information is somewhere “out there”, on someone computer, safe, manned by an alert computer expert or office manager.The truest reality is unknown to us and the likelihood of nefarious access to our personal information grows along with the internet. While the majority of us are careful not to disclose our information,( just as we are careful not to leave the house without our keys) there is the occasion where we forget. We live in a state of constant distraction. We slip. Nevertheless, our own vigilance is the first level of many defenses that can protect our PII.…

    • 488 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Radio Frequency Identification is the process of identifying a person or an object or a thing using the RF-transmitted identification code. Over the years, the technology has played a vital role in improving the efficiency and effectiveness of health care systems. Today the health care systems are using a wide range of RFID applications to enhance the overall performance of their industry. A few applications include; RFID tracking system, RFID bracelets, RFID under the skin, RFID for patient management system and RFID for resource management system (Banks, 2007).…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    For the most part RFIDs are mainly invisible, which consequently make tracking and data collection practically effortless. They can be found in memory chips, book labels, anti-theft devices, EZPass tags, etc. There are even certain devices that use RFIDs, such as tracking chips put on equipment, animals and children. Some RFID tags can be used in matrices “as real time locators systems (RTLS) that can record movements and locations of tagged entities,” according to Strickland and Hunt. A popular, oblivious way of everyday data collection through radio frequency is Wi-Fi.…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Hunt, V, A. Puglia and M. Puglia. RFID: A guide to Radio Frequency Identification. Hoboken: Wiley-Interscience, 2007.…

    • 4494 Words
    • 11 Pages
    Best Essays
  • Good Essays

    “Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems” (Techopedia, n.d.). It is the responsibility of the individual to protect their own privacy. Therefore, this essay will discuss the classifications of privacy rights by Durlak and linking it to the Utilitarian and Deontological ethics theories by referring to the An Ethical Duty to Protect One’s Own Information Privacy article.…

    • 1164 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Oyster Card Analysis

    • 956 Words
    • 4 Pages

    Contactless instalment cards have gotten to be standard for instalment of open transport in London. In the long haul this kind of innovation may well get to be overwhelming, supplanting Oyster as the most mainstream instalment…

    • 956 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The benefit of these cards is that they will work using eye-identification, which is already a reality, meaning that if thieves steal your card, they will have to come back for your eyeball also.…

    • 1208 Words
    • 4 Pages
    Good Essays