Table of Contents
1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
6Overview
7B2Capplicationsusingtag-basedidentification
8ReferencemodelforB2Capplicationsusingtag-based
identification
9PIIinfringementinB2Capplicationsusingtag-based
identification
10PIIprotectionrequirementsforB2Capplicationsusing
tag-basedidentification
AnnexA-Basicprinciplesofnationalapplication
AnnexB-Basicprinciplesofinternationalapplication:
freeflowandlegitimaterestrictions
AppendixI-LocationtrackingbytheidentifierinRFID
services
AppendixII-PIIprotectionservice(PPS)forapplications
usingtag-basedidentification
Bibliography Abstract
Specifies a number of personally identifiable information (PII) infringements for applications using tag-based identification, and requirements for PII protection.