CISA Exam Question: Concerns for IS Auditor with RFID Systems

Analyze Radio Frequency Identification (RFID) Systems

Prev Question Next Question

Question

Which of the following should an IS auditor be MOST concerned with when a system uses radio frequency identification (RFID)?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

When a system uses radio frequency identification (RFID), an IS auditor should be most concerned with privacy.

RFID is a technology that uses radio waves to automatically identify and track tags attached to objects. RFID tags can be used for a variety of purposes, such as tracking inventory, managing supply chains, or monitoring the movement of goods. However, the use of RFID tags can also raise concerns about privacy.

The primary concern with RFID is that it allows for the collection of large amounts of data without the knowledge or consent of individuals. This data can be used to track the movements of people and goods, potentially allowing for the creation of detailed profiles of individuals' behavior and activities. This raises significant privacy concerns, particularly when the data is used for commercial purposes.

An IS auditor should therefore be most concerned with ensuring that appropriate controls are in place to protect the privacy of individuals whose data is being collected through the use of RFID. This might include measures such as encryption of data, limitations on the retention of data, and the use of notice and consent procedures to inform individuals about the use of RFID and obtain their consent for the collection of data.

While scalability, maintainability, and nonrepudiation are all important considerations for any system, they are not the primary concern when a system uses RFID. Scalability refers to the ability of a system to handle increasing amounts of data or users, maintainability refers to the ease with which a system can be maintained and updated, and nonrepudiation refers to the ability to verify that a message or action was sent or taken by a particular party. While these factors may be relevant to the use of RFID, they are not the most critical concerns.