Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity ManagementVideo SurveillanceRetail/Restaurants/ConvenienceTransportation/Logistics/Supply Chain/Distribution/ Warehousing

People Tracking: Who, What and Where Are You?

By Diane Ritchey
August 1, 2010

These days, if you don’t want to be found, or even if you do, there’s a great likelihood that someone will find you. 

For Jeff Schoepf, CPP, security director for a major light metals manufacturer in Pennsylvania, keeping tracking of employees is a safety issue. Schoepf uses a man-down radio system from Motorola that ensures that employees who walk through the company’s 125 outdoor acres can get help quickly if they need it. “As long as someone is in an upright position, the alarm won’t sound,” he says. “However, if someone falls ill and hits the ground, there is a mechanism on the radio that sends an alarm to our gatehouse. Our gatehouse guard first will verbally check with the person to make sure he’s ok. If there’s no response, he’ll send help.” Even better, the security guard can be guided to the area by sound and continuously talk on his/her radio to the guardhouse. “We’ve never had any incidents and we’ve never had to use it,” Schoepf says, “but we do make it available to our employees when they’re on our grounds.”

Similarly, for John Imhoff, director, office of firm security at Ernst & Young, a travel locator service is of great benefit to keep track of the firm’s employees, for safety reasons as well. “As you might imagine our people are very mobile emanating from all places to all places globally to bring unique skill sets and knowledge to bear on our clients’ needs,” Imhoff says. “Being able to quickly and accurately detail who might be in harm’s way when a security event occurs is very important to us.”

For example, in July 2005, when the London Underground bombings occurred, Imhoff and his staff wanted to account for its people and to know that none had been adversely impacted, and to steer those who might be in the vicinity away from the ongoing events. “Fortunately, we were able to quickly make that determination and communicate with those in the vicinity. The locator service contributed greatly in that regard,” he says. “The system was also beneficial in the recent Chilean earthquake aftermath. The examples go on with queries happening several times per month on average. It’s also an integral part of our pandemic planning allowing us to see retrospectively who might have traveled to a destination or been on a flight with an outbreak of such a communicable disease,” he adds. “Conversely, we can look into impending travel plans to security ‘hot spots’ and counsel travelers accordingly. Thailand is an example of a destination normally a relatively benign travel destination, but of late is presenting some challenging security issues.”

Imhoff says he manages the system with great respect for personal privacy well beyond any strictures imposed by law and is very open with Ernst & Young people that the system is in use. “Recently, I reached out to a couple of travelers in Kyrgyzstan during the military coup and received a somewhat surprised but appreciative message from one of the people who was possibly on-site to say ‘Thanks and how did you know I was there?’ He was very pleased to know this safety net existed,” he says.


Tracking Patients in Medical Care

Talk about a great patient experience that also enhances security. At the new Roy and Patricia Disney Cancer Center in San Fernando Valley, Calif., a patient is tracked once he or she enters the facility, and their experience is personalized to their personal needs while they are there. That all means that wait times are reduced, and it’s easier for patients to locate their treatment area. For security, it means finding a patient easier if a problem arises, for example, if a patient falls ill. 

For example, through the use of Radio Frequency Identification (RFID) technologies, a clinician is paged to the appointed clinical treatment location when a patient arrives. Upon check-in, receptionists greet patients by name and clinicians identify a patient’s location, receive the scheduled treatment plan, and prepare procedures or treatment rooms in advance – all of which maximizes clinician efficiency and reduces patient wait time and anxiety.

And when a patient enters a treatment room, the lighting, music and temperature adjust to their preferences to further personalize the experience.

Opened in February, the Disney Cancer Center provides diagnosis, treatment, professional counseling, support groups and educational resources from one 55,000-square-foot location. Its holistic design is intended to create a peaceful sanctuary for cancer patients, incorporating art, therapeutic music and soothing colors.

According to Raymond Lowe, information services director for Providence Saint Joseph Medical Center, the original intent of the system was to provide patient tracking. “But we also need to understand the traffic plans of an individual – where they are at what time, for example, and since we are using an integrated passive reader that is displayed on an active RFID viewing station, we can do that,” he says. 
Employees can be tracked with the same system when they carry one of the center’s wireless phones.

From the initial planning process to implementation, the IT infrastructure at the Center was designed to work with the business and building systems, and clinical operations. Clinical systems, including radiology and telemetry, and a nurse call system operate on the network.

The Technology Contracting model from Johnson Controls also helps the Center assess its technology needs and design one IP backbone – instead of multiple networks – that can be used by all the building automation, security, clinical and administrative systems to help reduce infrastructure costs.

The model also integrates systems such as security and fire systems, in addition to building management, unified voice and data network; heating and air conditioning; and lighting to provide authorized staff with access to real-time monitoring and controls data so they can make adjustments accordingly.


What about Privacy?

One privacy group says that tracking consumers has reached alarming levels and it is calling on Congress to better protect consumer privacy. The Center for Digital Democracy, a coalition of 11 consumer and privacy advocacy organizations, recent sent a letter to the U.S. Congress outlining the protections any online privacy legislation must include.

The coalition said that industry self-regulation has not provided meaningful consumer protection and stressed that legislation is needed.

“This tracking is an invasion of privacy... Consumers now rely on the Internet and other digital services for a wide variety of transactions,” the groups wrote. “These include sensitive activities, such as health and financial matters. In these contexts, tracking people’s every move online is not simply a matter of convenience or relevance. It presents serious risks to consumers’ privacy, security and dignity.”

The consumer and privacy groups noted that for the past four decades the foundation of U.S. privacy policies has been based on Fair Information Practices: collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual participation, and accountability. 
They called on Congress to apply those principles in passing legislation to protect consumers online.

“Consumers need rights, and profiling should have limits. Behavioral tracking and targeting can be used to take advantage of vulnerable individuals, or to unfairly discriminate against people,” the groups wrote.

The groups argue that self-regulation for privacy will not protect consumers, and that law enforcement access to personal data should require a warrant. They are also requesting that the ability of websites and ad networks to collect or use behavioral data should be limited to 24 hours, and that websites should not collect or use sensitive information for behavioral tracking or targeting. The FTC should be tasked with defining sensitive information, it suggests, and that personal data should be obtained only by lawful and fair means and, unless unlawful or impossible, with the knowledge or consent of the individual.
KEYWORDS: Radio-Frequency IDentification (RFID) tracking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Generic Image for Leadership Topic

    Does Your CEO Know What's Keeping You Up at Night?

    See More
  • Stanley/Niscayah leadership team

    Beyond the Numbers: What the Stanley-Niscayah M&A Means for You

    See More
  • Cut the Cord

    Tracking Employees On-the-Go with Smartphone Apps

    See More

Related Products

See More Products
  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing