Download PDF version Contact company

Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, shared a comprehensive set of data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security.

This initiative comes as a response to the escalating importance of data security in an increasingly interconnected digital landscape. By prioritising privacy, organisations can effectively contribute to a safer digital and physical landscape for all.

Resilient and trustworthy security ecosystem

"Organisations should never have to choose between data privacy and security. By equipping physical security professionals with these essential strategies, Genetec is spearheading a paradigm shift toward a more resilient and trustworthy security ecosystem," said Firas Jadalla, Regional Director – Middle East, Turkey and Africa (META) Genetec.

"It is an ongoing process, and organisations should regularly update protocols, stay informed, and continuously educate their teams on best practices."

Genetec's recommendations

Genetec recommends organisations ensure their security systems respect data privacy by: 

1. Collecting and Storing Only What You Need:

The potential impact of a security breach can be reduced by minimising stored data

A fundamental rule of data security is to collect and store only essential information. The potential impact of a security breach can be reduced by minimising stored data.

It’s important to regularly review and audit data and dispose of unnecessary information responsibly.

2. Limiting Access to Sensitive Data:

Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy.

Techniques for anonymising personal information while retaining its utility include:

  • Randomisation (adding noise to numerical values such as an individual’s age or income),
  • Pseudonymisation (such as replacing names with unique identifiers), tokenisation (such as replacing credit card numbers with tokens that have no direct correlation to the original numbers),
  • Generalisation (such as converting exact birthdates to age ranges),
  • And data masking (showing only the first few digits of a phone number).

 3. Ensuring Privacy without Compromising Evidence:

With KiwiVision™ Privacy Protector, organisations can automatically anonymise images of people

By making use of technologies such as KiwiVision™ Privacy Protector, organisations can automatically anonymise images of people, so they can continue to survey surveillance footage while respecting privacy.

This technology also offers an additional layer of security that ensures only authorised users can “unlock” and view unmasked footage while maintaining an audit trail.

4. Being Transparent and Get User Consent:

Building trust through transparency and user consent is essential. It’s important to communicate with users about the data collection process, promoting informed decisions.

Organisations should also gain explicit consent before collecting and processing data.

5. Choosing a Reliable Data Storage Provider:

Organisations should demand strong security measures and reliable data-handling practices

Organisations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. If using third-party services, organisations should demand strong security measures and reliable data handling practices.

Establish who “owns” any data stored in the cloud, and any rights/privileges associated with the use or disclosure of any information.

6. Establishing Strong Policies:

To ensure long-term data safety, Genetec recommends putting in place robust policies across the organisation.

Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every stage of the data lifecycle.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?