What procedures should be followed if personal information is unduly disclosed and compromised?
A redress procedure should always be part of any system dealing with private information; this applies to RF-enabled identity verification systems as well. Redress procedures must define how to modify incorrect data, as well as how to assign new identification numbers when they have been compromised. It is important to design the identification system to allow redress for compromised personal information and not rely exclusively on the security measures that were put in place to protect private information in the first place. For example, if a number attached to an individual is made “permanent” by the identification system, it is very hard to change the number if it has been disclosed to unauthorized parties. Using a credential number (such as with credit cards) allows the identification number to be changed when something bad happens. In RF-enabled identification systems, it is highly recommended that the identity credential number (personal information called an attribute) be linked