Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video systems are helping to ensure privacy?
When it comes to physical security technology, systems can offer robust privacy features by design. Built-in privacy protection tools that automatically obscure the identity of individuals captured in surveillance video allow operators to see what is happening in the footage without violating anyone’s privacy. When an investigation requires collaboration, security systems with privacy protection allow operators to give access to evidence via secure links with fully encrypted data. End users can set permissions for sensitive data and footage without slowing down investigations and incident response. Only those with the proper authorisation can view the data. For others, it remains encrypted. User privileges and audit trails ensure that the integrity of data stays intact.
Modern video systems include a bevy of intelligent technologies to help ensure privacy. These include masking fixed areas in the camera view, anonymising people through dynamic masking or thermal imaging, and using radar technology. Additionally, when there is a need to safeguard the privacy of bystanders in exported video, video redaction support in video management software is also available. Such solutions enable robust video surveillance systems while also addressing privacy regulations that place restrictions on the collection of personally identifiable data. Furthermore, when it comes to protecting the video and data that are generated via video systems, many solutions today include built-in encryption and cybersecurity features to help counter different types of attacks, effectively mitigate vulnerabilities, and prevent unauthorised access to the system. From detecting firmware tampering to preventing software replacement, these cybersecurity features safeguard systems from the inside out and help reduce the risk of costly, disruptive digital attacks.
The redaction of pixels from video (from the likes of Facit Data Systems) is an intelligent way of helping to ensure video systems do not infringe on people’s privacy or break any applicable data privacy laws. Development of this approach has advanced significantly through the use of AI and intelligent video analytics, and it would have been difficult to have achieved this with any practicality without them. This approach works well for censoring key parts of video footage, for instance, certain parts of a building (perhaps restrooms or areas that may accommodate children or other vulnerable people) or even for protecting intellectual property/sensitive data (such as wall-mounted printed data or presentation boards). Because this approach is so flexible, it is possible to ensure any sensitive images can be automatically blocked without compromising on the areas that need to be legitimately surveilled.
To date, 71% of countries around the world have established some form of legislation that ensures the protection of data and privacy. Hence it is our belief that vendors should develop tools that include privacy protection by design. Modern security cameras should include features such as i-PRO’s Privacy Guard to automatically anonymise people’s faces and bodies at the edge in real time. Available free of charge, this feature ensures that organisations never have to compromise between privacy and security. And while it is important to provide the right privacy tools to end users, it is also important to remember that most AI-based analytics are in fact designed to detect humans and vehicles anonymously.
Traditional on-premises security systems certainly face increased cybersecurity risk from unauthorised access and direct attack. The first step in securing cameras is a strong account password, which prevents unauthorised access to your cameras. We purpose-design cybersecurity safeguards in our cameras, using reverse SSH encryption connected to a secure cloud environment with strict controls and access granted by invitation only. When RTSP video stream requests come in from outside this secure cloud environment, connections are fully supported by strong password and digest authorisation with SSL encryption. We regularly monitor cyberspace, continually enhancing and updating firmware to foil new hacking trends – automatically updating deterrence cameras to keep them impenetrable. Video surveillance cameras are indispensable in home and business security and safety, but they must be cyber-secure and continually updated to prevent outside threats.