The Library has implemented Radio Frequency Identification (RFID) technology over the entire Library collection at both City and Kuring-gai campuses.
RFID gives you MORE
•Check-out more items simultaneously
•Borrow more items immediately after self-returning your loans
•Library items more easily found
•More time for library staff to provide you with F2F service
What is RFID and how does it work?
Radio Frequency Identification or RFID technology is used widely in everyday applications in a variety of industries, including libraries worldwide. An RFID tag, as the name implies, uses radio waves to transmit information to a reading device. For example, the new self service loans machines will read the information on the RFID tag on the book and the bar code on your library card.
Are there any health risks associated with RFID and radio waves?
RFID uses the low-end of the electromagnetic spectrum. The waves coming from readers are no more dangerous that the waves coming from your car radio.
Recent independant test results show that all devices fall within the safe limits set by the ARPANSA RP-3 Radiation Protection Standard.
Are there any differences to the way I currently borrow items from Open access area and Open Reserve?
There'll be no difference in how you borrow, however in the Open Reserve you can both borrow and return items. The benefits are that borrowing will be quicker, you'll be able to check-out multiple items simultaneously and will be able to borrow more items immediately after self-returning your loans.
What information is stored on RFID tags?
The tags contain only information that will identify a particular library item and the rules that apply to the item. The title of the book is not stored on the tag, nor is any personal information stored on the tag. Only a Library staff member with authorisation to use the Library's system can determine the title of the item attached to the library item number.
UTS Library endeavours to protect the privacy of its clients. Our systems operate under legal obligations and implement technical safeguards for protection of privacy.