Download PDF version Contact company

Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, shared a comprehensive set of data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security.

This initiative comes as a response to the escalating importance of data security in an increasingly interconnected digital landscape. By prioritising privacy, organisations can effectively contribute to a safer digital and physical landscape for all.

Resilient and trustworthy security ecosystem

"Organisations should never have to choose between data privacy and security. By equipping physical security professionals with these essential strategies, Genetec is spearheading a paradigm shift toward a more resilient and trustworthy security ecosystem," said Firas Jadalla, Regional Director – Middle East, Turkey and Africa (META) Genetec.

"It is an ongoing process, and organisations should regularly update protocols, stay informed, and continuously educate their teams on best practices."

Genetec's recommendations

Genetec recommends organisations ensure their security systems respect data privacy by: 

1. Collecting and Storing Only What You Need:

The potential impact of a security breach can be reduced by minimising stored data

A fundamental rule of data security is to collect and store only essential information. The potential impact of a security breach can be reduced by minimising stored data.

It’s important to regularly review and audit data and dispose of unnecessary information responsibly.

2. Limiting Access to Sensitive Data:

Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy.

Techniques for anonymising personal information while retaining its utility include:

  • Randomisation (adding noise to numerical values such as an individual’s age or income),
  • Pseudonymisation (such as replacing names with unique identifiers), tokenisation (such as replacing credit card numbers with tokens that have no direct correlation to the original numbers),
  • Generalisation (such as converting exact birthdates to age ranges),
  • And data masking (showing only the first few digits of a phone number).

 3. Ensuring Privacy without Compromising Evidence:

With KiwiVision™ Privacy Protector, organisations can automatically anonymise images of people

By making use of technologies such as KiwiVision™ Privacy Protector, organisations can automatically anonymise images of people, so they can continue to survey surveillance footage while respecting privacy.

This technology also offers an additional layer of security that ensures only authorised users can “unlock” and view unmasked footage while maintaining an audit trail.

4. Being Transparent and Get User Consent:

Building trust through transparency and user consent is essential. It’s important to communicate with users about the data collection process, promoting informed decisions.

Organisations should also gain explicit consent before collecting and processing data.

5. Choosing a Reliable Data Storage Provider:

Organisations should demand strong security measures and reliable data-handling practices

Organisations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. If using third-party services, organisations should demand strong security measures and reliable data handling practices.

Establish who “owns” any data stored in the cloud, and any rights/privileges associated with the use or disclosure of any information.

6. Establishing Strong Policies:

To ensure long-term data safety, Genetec recommends putting in place robust policies across the organisation.

Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every stage of the data lifecycle.

Download PDF version Download PDF version

In case you missed it

Genetec innovations transform MENA security at Intersec 2025
Genetec innovations transform MENA security at Intersec 2025

Genetec Inc., the global pioneer in enterprise physical security software, will demonstrate the latest innovations in advanced physical security solutions designed to meet the regi...

2024 was a big year for M&A in the security market
2024 was a big year for M&A in the security market

Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Ann...

Enhancing collaboration in physical security operations
Enhancing collaboration in physical security operations

In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to inter...

Quick poll
What is the most significant challenge facing smart building security today?