Part of the Security management glossary:

A smart label is an item identification slip that contains more advanced technologies than conventional bar code data. The most common enhancements in smart labels are QR codes, Electronic Article Surveillance (EAS) tags and specially configured RFID tags.

QR codes are a type of 2D bar code that provides easy access to information through a smartphone or other device equipped with a barcode reader. 2D bar codes can store up to 7,089 characters, significantly greater storage than is possible with the 20-character capacity of a unidimensional barcode. QR code smart labels are often used to facilitate package shipping.

Electronic Article Surveillance (EAS) tag-based smart labels are commonly used to prevent theft of library books and merchandise in stores. When the item is checked out or purchased, the tag is deactivated. If someone tries to leave the premises with an item with an active tag, an alarm sounds. 

RFID tag-based smart labels are commonly used in manufacturing. They consist of a flat configuration of an RFID tag inserted into an item identification slip. 

This was last updated in November 2012
Contributor(s): Ivy Wigmore
Posted by: Margaret Rouse

Related Terms

Definitions

  • Types of enterprise risk

    - An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, r... (WhatIs.com)

  • business risk

    - A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negativ... (WhatIs.com)

  • pay for privacy

    - Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy serv... (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.