Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Tracking Employees On-the-Go with Smartphone Apps

More than a quarter of U.S. households have ditched their landline phones and gone 100-percent mobile

By Diane Ritchey
People Tracking

Cyclists who are often in remote locations can use the BoldSOS app to stop periodically and send a notification of their whereabouts.

People Tracking

The BoldSOS from Bold Technologies opens up new possibilities for Personal Emergency Response Systems on a mobile basis.

People Tracking
People Tracking
July 1, 2014

More than a quarter of U.S. households have ditched their landline phones and gone 100-percent mobile, a trend driven by younger Americans relying on their cellphones, according to Census Bureau data. Just 71 percent of households had landlines in 2011, down from a little more than 96 percent 15 years ago. Cellphone ownership reached 89 percent, up from about 36 percent in 1998, the first year the survey asked about the devices. The youngest households are abandoning landlines in droves. About two-thirds of households led by people ages 15 to 29 relied only on cellphones in 2011, compared with 28 percent for the broader population.    

Kristi Jennings, Vice President of ESC Central in Birmingham, Alabama, first looked into BoldSOS from Bold Technologies because of that trend. ESC Central provides two-way Voice monitoring and had encountered an increasing number of dealers asking if ESC Central could support users without landlines that only have a cell phone. Jennings implemented BoldSOS as a solution to the challenge of providing Personal Emergency Response Systems (PERS) services and more to users with only a mobile device.

“PERS systems are specific to someone’s house. BoldSOS opens up new possibilities for PERS on a mobile basis. The first question I am always asked is if the PERS device will work if someone is at their mailbox, or out in their backyard. With this app, [users] get PERS with a touch of a button no matter where they are,” says Jennings.

Jennings noted that the notification feature has also been a popular function, one which ESC Central has been successful in marketing. “Consider a scenario where you have a child who is supposed to notify you when they reach a certain place,” says Jennings, “With this application, the child can simply hit the notification button to send the message that they have arrived, and the notification comes through with location information so you know the child is where they are supposed to be.”

Jennings also shared an interesting story about a customer selling the app services in a unique way. The ESC Central customer is an avid cyclist who will often go for several-hour bike rides, which used to cause concern because the cyclist’s family would not know where he was. The cyclist now uses BoldSOS and will stop periodically and send a notification through the app; with one quick push of a button he can send a notification to his wife to check-in and provide his location information. The cyclist can also use the app if in a situation where he needs assistance; for example, if he has a flat tire. The app enables him to quickly send the “needs assistance” notification along with his location information. This customer identified a potential market for other cyclists and decided to offer a solution called CyclingSOS, providing Emergency Services, Impact Monitoring, Notifications and Location Tracking.


Privacy Concerns and Misconceptions with People Tracking and RFID

 

In Minnesota, Sen. Al Franken (D-Minn.) is reintroducing a new piece of privacy legislation that prevents companies and government organizations from tracking a person’s location data.

The Location Privacy Protection Act of 2014 (LPPA), seeks to stop “loop holes and technicalities” that allow some organizations to gain access to the data while also giving consumers control over all location-based data that many Web services use, especially services that take place over smartphones and other Internet-connected mobile devices.

According to a report by ABC News, the bill will force Web services to gain permission from consumers before collecting and sharing location data collected on smartphones, tablets, or in-car navigation devices. It also requires any company tracking more than 1,000 people to publicly disclose location data tracking activity as well as why it’s collecting that data. The bill also would ban all “GPS stalking” applications and calls for law enforcement to seize any profits made from them to help fund further education about stopping location data-privacy violations.

“Most Americans have smartphones now. And the companies that make the software on your phone, including apps, can access extremely sensitive location data that reveals where you live, where you work, where you drop your kids off at school, the church you attend, and the doctors you visit,” Franken said in a statement. “I believe that Americans have the right to control who can collect that information, and whether or not it can be given to third parties. But right now, companies — some legitimate, some not — are collecting your location and giving it to whomever they want,” he said. “My commonsense bill helps a whole range of people, and would finally put an end to GPS stalking apps that allow abusers to secretly track their victims.”

Most people think that biometrics and RFID are the same as tracking, which tends to lump privacy concerns with people tracking with the latter, but according to Kathleen Carroll, Director of Government Relations at HID Global, that’s the wrong way of thinking. “These technologies are authentication technologies, not tracking technologies, such as a GPS in a mobile phone are tracking. RFID and biometrics will authenticate an individual, so for example, a school district in Florida using palm prints to authenticate students in the lunch line. That is not tracking. It’s not the same as RFID or biometrics,” she says.

“From a privacy perspective, tracking is one of the top issues when you talk about biometrics and RFID,” Carroll says. “Both of these technologies are used mainly for authentication, and when it comes to people, but there is perception that you can be tracked.”

Recently, some K-12 schools across the country have banned biometrics, such as in Florida, with Bill 188, which bans the collection of biometric information from students.

“In the Florida schools there was a real concern about the capture of the biometrics and the ability for hackers and law enforcement to access that biometric data,” Carroll explains. “But it’s not a legitimate concern in terms of that in most instances, when a biometric is captured it is not the actual biometric, it becomes a template, so for example, a child gives their palm print, and it is turned into a series of ones and zeroes. A hacker doesn't see the actual palm print. All they see is ones and zeroes because the data is encrypted. What is more critical is biographic data, such as sex, age, name, birth date and Social Security number: that is what hackers go for.”

“Second, from a law enforcement perspective, if law enforcement wanted to access a biometric there are laws on the books that require them to get a court order. Biometrics are protected from law enforcement that way.”

Carroll notes that biometrics can assist a K-12 school with funding, and cites preschools in California that are using RFID to automatically take attendance so that they can get head start funding. “The more accurate their attendance numbers are, the more funding they can get,” she says.

The Federal government is exploring the use of biometrics for exit out of the U.S., Carroll adds. “The U.S. government already requires biometrics from foreign citizens to get into this country, and this bill would introduce a program so that we know when foreign nationals leave. From a privacy perspective, any implementation should take a privacy by design approach, so that even before you implement a system, you conduct a privacy impact assessment and you look all areas where personally identifiable information might be vulnerable and address it before you put the system in. At HID, we also recommend that users of biometrics and RFID apply the Fair Information Practice principals, which, when followed correctly, will go a long way to ensure that solutions, whether it’s RFID or biometrics are privacy protective,” Carroll says. 

KEYWORDS: employee people tracking security apps security tools smartphone security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iPad and iPhone

    Mobility Madness:Security and the Smartphone

    See More
  • Jay Hart, founder of the Force Training Institute

    Saving Lives with a Test: Active Shooter Response Training for Employees

    See More
  • Security Talk Default

    Catering to Happy Employees with Cloud Computing

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×
Cyclists who are often in remote locations can use the BoldSOS app to stop periodically and send a notification of their whereabouts.
The BoldSOS from Bold Technologies opens up new possibilities for Personal Emergency Response Systems on a mobile basis.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!