@JohnPhilpin I'd guess that one would need to authenticate to the device in some way to authorize the reading of data. I can't imagine it would be something broadcasted passively. But it follows that once authenticated an authority of some type could subsequently request access to the device. We know how it works out when you question what your legal rights may be or actually assert that you have any rights.