What new features of video systems help to ensure privacy?
Editor Introduction
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video systems are helping to ensure privacy?
When it comes to physical security technology, systems can offer robust privacy features by design. Built-in privacy protection tools that automatically obscure the identity of individuals captured in surveillance video allow operators to see what is happening in the footage without violating anyone’s privacy. When an investigation requires collaboration, security systems with privacy protection allow operators to give access to evidence via secure links with fully encrypted data. End users can set permissions for sensitive data and footage without slowing down investigations and incident response. Only those with the proper authorisation can view the data. For others, it remains encrypted. User privileges and audit trails ensure that the integrity of data stays intact.
Modern video systems include a bevy of intelligent technologies to help ensure privacy. These include masking fixed areas in the camera view, anonymising people through dynamic masking or thermal imaging, and using radar technology. Additionally, when there is a need to safeguard the privacy of bystanders in exported video, video redaction support in video management software is also available. Such solutions enable robust video surveillance systems while also addressing privacy regulations that place restrictions on the collection of personally identifiable data. Furthermore, when it comes to protecting the video and data that are generated via video systems, many solutions today include built-in encryption and cybersecurity features to help counter different types of attacks, effectively mitigate vulnerabilities, and prevent unauthorised access to the system. From detecting firmware tampering to preventing software replacement, these cybersecurity features safeguard systems from the inside out and help reduce the risk of costly, disruptive digital attacks.
The redaction of pixels from video (from the likes of Facit Data Systems) is an intelligent way of helping to ensure video systems do not infringe on people’s privacy or break any applicable data privacy laws. Development of this approach has advanced significantly through the use of AI and intelligent video analytics, and it would have been difficult to have achieved this with any practicality without them. This approach works well for censoring key parts of video footage, for instance, certain parts of a building (perhaps restrooms or areas that may accommodate children or other vulnerable people) or even for protecting intellectual property/sensitive data (such as wall-mounted printed data or presentation boards). Because this approach is so flexible, it is possible to ensure any sensitive images can be automatically blocked without compromising on the areas that need to be legitimately surveilled.
To date, 71% of countries around the world have established some form of legislation that ensures the protection of data and privacy. Hence it is our belief that vendors should develop tools that include privacy protection by design. Modern security cameras should include features such as i-PRO’s Privacy Guard to automatically anonymise people’s faces and bodies at the edge in real time. Available free of charge, this feature ensures that organisations never have to compromise between privacy and security. And while it is important to provide the right privacy tools to end users, it is also important to remember that most AI-based analytics are in fact designed to detect humans and vehicles anonymously.
Traditional on-premises security systems certainly face increased cybersecurity risk from unauthorised access and direct attack. The first step in securing cameras is a strong account password, which prevents unauthorised access to your cameras. We purpose-design cybersecurity safeguards in our cameras, using reverse SSH encryption connected to a secure cloud environment with strict controls and access granted by invitation only. When RTSP video stream requests come in from outside this secure cloud environment, connections are fully supported by strong password and digest authorisation with SSL encryption. We regularly monitor cyberspace, continually enhancing and updating firmware to foil new hacking trends – automatically updating deterrence cameras to keep them impenetrable. Video surveillance cameras are indispensable in home and business security and safety, but they must be cyber-secure and continually updated to prevent outside threats.
Editor Summary
With legislation to ensure privacy becoming more common around the world, it behooves designers and manufacturers of video surveillance systems to address privacy issues and protect the vulnerable. As our Expert Panelists assure us, there are technologies and systems in place to do just that. Preserving the value of video surveillance without threatening privacy is a delicate balance. Fortunately, it is top-of-mind for manufacturers of these systems.
- Related companies
- Axis Communications
- TDSi
- Genetec, Inc.
- i-PRO
- iDter
- Related links
- Axis Communications Access control software
- Axis Communications CCTV software
- Genetec Access control software
- Genetec CCTV software
- TDSi Access control software
- TDSi CCTV cameras
- TDSi CCTV software
- Infrared CCTV cameras
- Biometric Access control software
- ANPR Software CCTV software
- PCB CCTV cameras
- Detection Software CCTV software
- Thermal CCTV cameras
- Proximity Access control software
- Carpool Anti-passback Access control software
- Central Monitoring Option Access control software
- Smart Card Access control software
- Management Software CCTV software
- Monitoring Software CCTV software
- Combined online/offline solution Access control software
- Surveillance Software CCTV software
- Face Recognition Software Access control software
- Guard tool module Access control software
- Keypad Commands/Intrusion Zones Access control software
- Management Systems Upgrade Access control software
- NStar software upgrade Access control software
- Remote software for telecode door entry phone system Access control software
- Server software for MSDE Access control software
- Version Upgrade Access control software
- Related categories
- CCTV cameras
- CCTV software
- Access control software
- View all news from
- Axis Communications
- TDSi
- Genetec, Inc.
- i-PRO
- iDter
Expert commentary
- Enhancing collaboration in physical security operations
- Global regulations of AI: the role and impact on the physical security industry
- Mind the gap: Addressing cybersecurity at every phase of technology management
- When choosing an access solution, make Total Cost of Ownership a key part of the calculation
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadDahua 4MP WizColor Bullet Camera with Fixed-Focal and WizSense AI
Hikvision WonderHub: Interactive Displays for Collaboration
Verkada GC31 Cellular Gateway for Seamless Device Connectivity