RFID System protects personal privacy and financial data.

Press Release Summary:



Using battery-powered tags that transmit wireless message 30-100 ft to hidden receivers, ActiveTag(TM) manages and secures computer assets that hold privacy data. Dual Activator determines whether asset is in or out of secured area. RFID System helps prevent theft or loss of personal records by offering individual asset tracking and protection, dynamic wireless custodian assignments to assets, complete reports, and wireless alerting to exception-based security events.



Original Press Release:



AXCESS Announces RFID Solution for Protecting Personal Privacy and Financial Data



Unique Solution Complies with Mandated State and Federal Law Guidelines for Handling Personal Privacy Information

DALLAS, June 6 -- AXCESS International Inc. (BULLETIN BOARD: AXSI) , a leading provider of Radio Frequency Identification (RFID) solutions and Real Time Location Systems (RTLS), announced today a solution for managing and securing critical computer assets which hold privacy data. The unique ActiveTag(TM) RFID solution is applicable to data centers, record departments and enterprise operations where computer assets must be accounted for and protected to be in compliance with Federal and State Laws which require notification to individuals if personal privacy data may have been compromised. The AXCESS solution has been installed in a number of data centers and enterprise offices where it was seamlessly interfaced into the existing security system to prevent unauthorized removal of computer assets.

"The loss of personal information is now a far reaching societal issue. This economical and reliable high security RFID solution automatically accounts for and protects computers, data media, and record boxes holding millions of personal privacy records for a total cost of around $1 per month per asset including the minimal infrastructure," commented Allan Griebenow, President & CEO of AXCESS International Inc. "We have installed the system in numerous enterprise environments where multiple types of assets are accounted for and protected. An electronic, automatic asset management and protection solution is the only way to have true real time visibility into the status of computer hardware and the records residing there. And now, the penalty for not knowing that status is severe."

83 million personal confidential records were compromised last year from lost data tapes and stolen computers among other losses, according to Privacy Rights Clearinghouse. Events in the last few weeks include the Veterans Administration losing control of 26 million records, The American Institute of CPAs who lost 330,000 names and the Texas Guaranteed Student Loan Corp. which lost 1.3 million personal records. Significant business losses are also attributable to information theft and unauthorized data access. Each name lost causes over $40,000 in fraud-related charges, according to a 2003 study by the nonprofit Identity Theft Resource Center.

Regulations covering information security are now at both the State and Federal level. The California Security Breach Information Act (CA SB 1386) is a typical example specifically addressing circumstances where residents are affected by an incident. The law mandates notification if personal information is compromised. Twenty-three states now have similar laws. Information compromise does not always mean loss to the individual. However, organizations are still required to notify each person and suffer the public embarrassment. At the Federal level, the Sarbanes-Oxley Act of 2002 is directed at public accounting firms and publicly traded companies and outlines proper internal control and audit procedures. Title VIII of the act makes it a felony for certain non-compliance.

The AXCESS system addresses the problem of preventing theft or loss of personal records by offering individual asset tracking and protection, dynamic wireless custodian assignments to assets, complete reports, and wireless alerting to exception-based security events. One key to the reliability of the solution is AXCESS' battery powered RFID tags which generate strong signals to enable metal encased computers to be identified even when hidden. When AXCESS RFID asset tags are placed on fixed desktops, servers, and storage devices as well as on mobile assets such as laptops, the tags are activated on-demand to transmit their ID at key control points such as doorways. Key to the system's accuracy is the localized tag activation field which uses the Company's new Dual Activator tag activation product which precisely identifies assets at specific points in and around the enterprise. The Dual Activator is unique within RFID technology in being able to determine with certainty whether an asset is in or out of a secured area, which delivers actionable intelligence through which a reliable security response can be determined and initiated.

The tags transmit to low cost network-based receivers which pass the tag IDs to the AXCESS software and database to record their location, who moved it, and whether their movement is authorized. Individual custodians such as computer administrators and authorized employees can also be tagged to provide an automatic, electronic custodial assignment for accountability and to freely move assets around the facility as needed without triggering an alarm. This process of Functional Linkage(TM) can be dynamically changed to further facilitate the movement of assets without adversely impacting productivity. Assets can also be regularly inventoried using beaconing transmissions. Alarms are automatically triggered if an asset leaves a controlled area without authorization. Doors can then be automatically locked, and typically wireless alerts are sent to security and responders to recover the asset before it leaves the premises.

AXCESS' patented ActiveTag(TM) RFID systems use small, battery powered tags (generically called "semi-active" tags) that when automatically activated, transmit a wireless message typically 30 to 100 feet to hidden palm size receivers. The receivers are connected via standard network simultaneously to the enterprise system software, the existing security alarm equipment, and standalone management software. Optionally, the tag system can be used to trigger security video recording and live remote video transmission. The tags are used for a variety of enterprise productivity applications including automatic personnel access control and tracking, automatic vehicle access control and payload management, automatic asset management and protection, as well as special purpose sensing. Automatic email alerting and paging is offered for rapid response to security related incidents.

More information, including a white paper on the ROI metrics for the system are available from the Company's web site at www.axcessinc.com/ or by calling Kelly Stark at 972-407-6080.

About AXCESS International Inc.
AXCESS International Inc. (BULLETIN BOARD: AXSI) , headquartered in greater Dallas, TX, provides Active and Semi-Active RFID (radio frequency identification) and Real Time Location Systems (RTLS) for asset management, physical security and supply chain efficiencies. The battery-powered (active) RFID tags locate, identify, track, monitor, count, and protect people, assets, inventory, and vehicles. AXCESS' RFID solutions are supported by its integrated network-based, streaming digital video (or IPTV) technology. Both patented technologies enable applications including: automatic "hands-free" personnel access control, automatic vehicle access control and logistics management, automatic asset management, and sensor management. AXCESS is a portfolio company of Amphion Innovations plc.

CONTACT: Public Relations - Lauren Stein of Financial Dynamics, +1-212-850-5650, stein@fd-us.com

All Topics