Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Tracking Employees On-the-Go with Smartphone Apps

More than a quarter of U.S. households have ditched their landline phones and gone 100-percent mobile

By Diane Ritchey
People Tracking

Cyclists who are often in remote locations can use the BoldSOS app to stop periodically and send a notification of their whereabouts.

People Tracking

The BoldSOS from Bold Technologies opens up new possibilities for Personal Emergency Response Systems on a mobile basis.

People Tracking
People Tracking
July 1, 2014

More than a quarter of U.S. households have ditched their landline phones and gone 100-percent mobile, a trend driven by younger Americans relying on their cellphones, according to Census Bureau data. Just 71 percent of households had landlines in 2011, down from a little more than 96 percent 15 years ago. Cellphone ownership reached 89 percent, up from about 36 percent in 1998, the first year the survey asked about the devices. The youngest households are abandoning landlines in droves. About two-thirds of households led by people ages 15 to 29 relied only on cellphones in 2011, compared with 28 percent for the broader population.    

Kristi Jennings, Vice President of ESC Central in Birmingham, Alabama, first looked into BoldSOS from Bold Technologies because of that trend. ESC Central provides two-way Voice monitoring and had encountered an increasing number of dealers asking if ESC Central could support users without landlines that only have a cell phone. Jennings implemented BoldSOS as a solution to the challenge of providing Personal Emergency Response Systems (PERS) services and more to users with only a mobile device.

“PERS systems are specific to someone’s house. BoldSOS opens up new possibilities for PERS on a mobile basis. The first question I am always asked is if the PERS device will work if someone is at their mailbox, or out in their backyard. With this app, [users] get PERS with a touch of a button no matter where they are,” says Jennings.

Jennings noted that the notification feature has also been a popular function, one which ESC Central has been successful in marketing. “Consider a scenario where you have a child who is supposed to notify you when they reach a certain place,” says Jennings, “With this application, the child can simply hit the notification button to send the message that they have arrived, and the notification comes through with location information so you know the child is where they are supposed to be.”

Jennings also shared an interesting story about a customer selling the app services in a unique way. The ESC Central customer is an avid cyclist who will often go for several-hour bike rides, which used to cause concern because the cyclist’s family would not know where he was. The cyclist now uses BoldSOS and will stop periodically and send a notification through the app; with one quick push of a button he can send a notification to his wife to check-in and provide his location information. The cyclist can also use the app if in a situation where he needs assistance; for example, if he has a flat tire. The app enables him to quickly send the “needs assistance” notification along with his location information. This customer identified a potential market for other cyclists and decided to offer a solution called CyclingSOS, providing Emergency Services, Impact Monitoring, Notifications and Location Tracking.


Privacy Concerns and Misconceptions with People Tracking and RFID

 

In Minnesota, Sen. Al Franken (D-Minn.) is reintroducing a new piece of privacy legislation that prevents companies and government organizations from tracking a person’s location data.

The Location Privacy Protection Act of 2014 (LPPA), seeks to stop “loop holes and technicalities” that allow some organizations to gain access to the data while also giving consumers control over all location-based data that many Web services use, especially services that take place over smartphones and other Internet-connected mobile devices.

According to a report by ABC News, the bill will force Web services to gain permission from consumers before collecting and sharing location data collected on smartphones, tablets, or in-car navigation devices. It also requires any company tracking more than 1,000 people to publicly disclose location data tracking activity as well as why it’s collecting that data. The bill also would ban all “GPS stalking” applications and calls for law enforcement to seize any profits made from them to help fund further education about stopping location data-privacy violations.

“Most Americans have smartphones now. And the companies that make the software on your phone, including apps, can access extremely sensitive location data that reveals where you live, where you work, where you drop your kids off at school, the church you attend, and the doctors you visit,” Franken said in a statement. “I believe that Americans have the right to control who can collect that information, and whether or not it can be given to third parties. But right now, companies — some legitimate, some not — are collecting your location and giving it to whomever they want,” he said. “My commonsense bill helps a whole range of people, and would finally put an end to GPS stalking apps that allow abusers to secretly track their victims.”

Most people think that biometrics and RFID are the same as tracking, which tends to lump privacy concerns with people tracking with the latter, but according to Kathleen Carroll, Director of Government Relations at HID Global, that’s the wrong way of thinking. “These technologies are authentication technologies, not tracking technologies, such as a GPS in a mobile phone are tracking. RFID and biometrics will authenticate an individual, so for example, a school district in Florida using palm prints to authenticate students in the lunch line. That is not tracking. It’s not the same as RFID or biometrics,” she says.

“From a privacy perspective, tracking is one of the top issues when you talk about biometrics and RFID,” Carroll says. “Both of these technologies are used mainly for authentication, and when it comes to people, but there is perception that you can be tracked.”

Recently, some K-12 schools across the country have banned biometrics, such as in Florida, with Bill 188, which bans the collection of biometric information from students.

“In the Florida schools there was a real concern about the capture of the biometrics and the ability for hackers and law enforcement to access that biometric data,” Carroll explains. “But it’s not a legitimate concern in terms of that in most instances, when a biometric is captured it is not the actual biometric, it becomes a template, so for example, a child gives their palm print, and it is turned into a series of ones and zeroes. A hacker doesn't see the actual palm print. All they see is ones and zeroes because the data is encrypted. What is more critical is biographic data, such as sex, age, name, birth date and Social Security number: that is what hackers go for.”

“Second, from a law enforcement perspective, if law enforcement wanted to access a biometric there are laws on the books that require them to get a court order. Biometrics are protected from law enforcement that way.”

Carroll notes that biometrics can assist a K-12 school with funding, and cites preschools in California that are using RFID to automatically take attendance so that they can get head start funding. “The more accurate their attendance numbers are, the more funding they can get,” she says.

The Federal government is exploring the use of biometrics for exit out of the U.S., Carroll adds. “The U.S. government already requires biometrics from foreign citizens to get into this country, and this bill would introduce a program so that we know when foreign nationals leave. From a privacy perspective, any implementation should take a privacy by design approach, so that even before you implement a system, you conduct a privacy impact assessment and you look all areas where personally identifiable information might be vulnerable and address it before you put the system in. At HID, we also recommend that users of biometrics and RFID apply the Fair Information Practice principals, which, when followed correctly, will go a long way to ensure that solutions, whether it’s RFID or biometrics are privacy protective,” Carroll says. 

KEYWORDS: employee people tracking security apps security tools smartphone security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iPad and iPhone

    Mobility Madness:Security and the Smartphone

    See More
  • Jay Hart, founder of the Force Training Institute

    Saving Lives with a Test: Active Shooter Response Training for Employees

    See More
  • Security Talk Default

    Catering to Happy Employees with Cloud Computing

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • December 12, 2011

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we'll update you on what is out there for camera viewing software along with our reviews. We'll also look at the Axis Product Selector tool and several other applications that are available today.
  • February 3, 2012

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we’ll update you on what is out there for camera viewing software along with our reviews. We’ll also look at the Axis Product Selector tool and several other applications that are available today.
View AllSubmit An Event
×
Cyclists who are often in remote locations can use the BoldSOS app to stop periodically and send a notification of their whereabouts.
The BoldSOS from Bold Technologies opens up new possibilities for Personal Emergency Response Systems on a mobile basis.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!