Ensuring security without compromising privacy

Issue 6 2021 Surveillance

In our increasingly connected world, it’s not surprising that concerns around privacy, particularly in relation to personal data are on the rise. Questions about who has access to what information and for what purposes cannot be taken lightly. Today, governments and other regulatory bodies have developed regulations aimed at restricting collection, processing and access to personal data, including video footage, to help maintain privacy and mitigate the risks of criminal cyber activities.

At the same time, acquiring digital information is a vital component for protecting people and assets. Governments and private businesses frequently collect sensitive data from individuals using the spaces in and around their facilities. This can include personal identifiable information (PII), such as surveillance footage, photos and licence plate information. Does this mean that we have to sacrifice privacy for the sake of securing physical environments?

The answer is, most assuredly, no. Organisations just need to develop their security strategies with intention.

While the concept of privacy can be understood in different ways, from a security perspective, it is essentially about being able to keep personal matters to yourself. For individuals, data privacy means having the right to control how personal information is being collected and used as well as avoiding unauthorised access to information.

When an organisation does not make privacy protection a cornerstone of their security policies, it becomes an afterthought which can lead to the impression that privacy and security are at odds with one another. This does not have to be true.


Quintin Roberts.

Organisations can choose to work with vendors who develop tools that include privacy protection by design. They can select and deploy solutions that are hardened against cyber threats out-of-the-box by manufacturers so as to alleviate worries around system vulnerabilities. These solutions should also give them complete control over their data so that they can adjust protection methods and processes to meet evolving regulations and should also help them configure the system to define who has access to sensitive data and footage without slowing down response times or investigations.

A time of digital transformation and big data

There seems to be no limit to the number of devices being connected to our infrastructures. As Internet connectivity becomes more widespread and affordable, more of us are able to connect everyday items, including phones, alarm systems and lighting equipment to our networks. While this helps improve accessibility and usability, it can also increase system vulnerability by providing more network connections to attack.

Our response to the Covid-19 pandemic has accelerated this digital transformation on a global scale. This is particularly true in relation to the Internet of Things (IoT). When organisations asked employees to work from home, they required even greater connectivity as well as easier access to information from a larger pool of devices and multiple locations. In essence, governments and private businesses were extending their networks far beyond their office buildings.

This has led to increased concerns about data privacy, particularly as cyber criminals have taken advantage of potential system vulnerabilities, human errors (social engineering) and failure to implement best practices (using weak passwords, sharing personal credentials, clicking on suspicious links, etc.). As we connect more devices and applications to our networks, the risk of people’s data ending up in the wrong hands becomes even greater. The result has been that our public health needs are raising further concerns about how to properly protect data and people’s right to privacy.

The role of legislation

Governments and other regulatory bodies have an important role to play in mitigating the risks associated with criminal cyber activity and protecting privacy. As we know, cyber threats are not decreasing. From system hacks to DDoS attacks to the increased prevalence of ransomware attacks, criminal cyber activity is on the rise.

To address this, governments have developed legislation that hold businesses more accountable for data privacy or cybersecurity breaches. The European Union’s General Data Protection Regulation (GDPR) is the most notable mandate enacted to date. But others, including California’s Consumer Privacy Act (CCPA), Canada’s Personal Information Protection and Electronic Document Act (PIPEDA), Brazil’s General Protection Data Law (LGPD) and South Africa’s Protection of Personal Information Act (PoPIA) are also having a major impact on the way we shape and deploy security systems.

Regulatory bodies are also issuing compliance standards across vertical markets. For example, the United States Department of Health and Human Services issued the Health Insurance Portability and Accountability Act (HIPPA) to protect the privacy and security of health information. Similarly, the North American Electric Reliability Corporation (NERC) has issued the Critical Infrastructure Protection (CIP) standard. These regulations and standards can specify how to secure a facility, protect data and manage operations. As a result, organisations must sometimes adhere to multiple evolving standards and laws simultaneously.

The cost of compliance

According to a Privacy Risk Study done in 2020 by IAPP, 43% of organisations are working to comply with anywhere from two to five different privacy laws. What’s more, complying with increasingly stringent laws and regulations across geographies and industries has put a strain on many organisations’ resources.

Achieving compliance usually involves labour and time-intensive tasks, including revising and implementing corporate policies, auditing procedures and systems and re-investing in new technologies. Many organisations are currently struggling to find the staff and resources necessary to support privacy policies.

To make the issue more complicated, new questions about who is ultimately responsible for protecting data and privacy are emerging. Gartner, the global research and advisory company, predicts that, by 2025, 75% of CEOs will be personally liable for both cyber and physical security system attacks. This will surely lead to greater focus from top-level management on implementing physical security solutions that prioritise cybersecurity and privacy compliance.

To mitigate risks and keep costs under control, organisations need a single strategy, built on strong cybersecurity and privacy principles that work for them today and into the future. The good news is that, in 2020, IAPP also found that 565 of respondents are working toward a single, global data protection and privacy strategy that can be tailored to jurisdictional requirements as needed. The question now is how do we get there?

Adopting a unified approach is key

Adopting a unified approach to cybersecurity and data protection helps simplify processes and keeps compliance costs down. It allows organisations to streamline data protection and privacy policies across their entire network and enables them to adapt to evolving threats and mandates. When various cyber defence and privacy protection measures are accessible in one platform, organisations can respect privacy while remaining compliant.

Privacy-by-design

While policies and regulations aimed at preventing data breaches and privacy violations are a good idea, they don’t provide enough protection against cyber-attacks since they penalise organisations after-the-fact. Organisations need a more pro-active approach that includes a privacy-centric focus when designing a comprehensive data protection and privacy strategy.

A privacy-by-design approach involves pro-actively embedding privacy into the design and operations of IT systems, networked infrastructure and business practices from the first line of code to third-party vendors. Adopting this approach can have a positive impact on cybersecurity and can help organisations meet their strategic goals.

When software and hardware developers also adopt a privacy-by-design approach, it ensures higher levels of data protection without infringing on a technology’s evolution. By centring on the principle that respect for individual privacy is the foundation of responsible and innovative design, following this approach enables forward-thinking developers to build this principle into the products they create.

Choosing the right technology

When it comes to physical security technology, organisations need tools that allow security professionals to gather and manage data, including video, while supporting compliance with privacy laws around the world. They need solutions that are designed to help enhance cyber hygiene and respect privacy regulations by making data and privacy protection features accessible and configurable. They need physical security solutions built with privacy in mind.

Genetec solutions are designed to help organisations ensure that their physical security data complies with industry standards and privacy legislation around the world. KiwiVision Privacy Protector, for example, automatically obscures faces that are captured within a camera’s field of view. This add-on to the Genetec Security Center unified platform ensures that operators only have access to the information they need to complete their tasks. And when an event warrants an investigation, accessing the unobscured footage requires an additional layer of permissions.

With the Genetec Clearance digital evidence management system, law enforcement organisations can gather and share reliable evidence that protects everyone’s privacy. With built-in video redaction and secure user management, the identity of victims, bystanders, witnesses and police officers remains protected at all times. When an investigation requires collaboration, Clearance make it easy to give external access to certain pieces of evidence via secure links, with fully encrypted data. The system also helps end users set access permissions to sensitive data and footage without slowing down investigations and incident response. This way, end-users have control over this data so that they can adjust protection methods and processes to comply with privacy legislations based on where they are located in the world.

Trust is essential

Technology vendors have a social responsibility to help customers reach the highest levels of data protection and privacy. Customers want partners who build secure and compliant solutions that help them protect sensitive information. They need partners who keep up with emerging risks and work pro-actively to distribute fixes and new solutions. In addition, they also need partners who are forthcoming about potential vulnerabilities and keep communication open to mitigate risks.

At Genetec, we are committed to building secure and compliant solutions that help protect privacy without compromising physical security. We are transparent about emerging threats and provide our customers access to the latest data protection and privacy features. We also work with our technology partners to build a network of trust – an ecosystem of technology vendors that value data protection and confidentiality. We believe that protecting privacy is everyone’s responsibility so that together, we can create a safer, more secure world.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Hikvision’s top seven trends for the security industry in 2024
Hikvision South Africa News & Events Surveillance AI & Data Analytics
As we embrace technological innovation, and adapt to evolving societal needs, we are witnessing the convergence of advanced technologies like artificial intelligence (AI), the Internet of Things (IoT), and big data.

Read more...
inq. SA unveils AI, IoT solutions for the digital age
AI & Data Analytics Surveillance
inq. has announced the launch of an extensive Edge Artificial Intelligence (AI), Internet of Things (IoT), and the Edgedock data insights value proposition to transform business operations across various sectors.

Read more...
ONVIF releases first add-on for secure communications
Surveillance Training & Education
ONVIF has released the final version of the TLS Configuration add-on to increase the security of communications between devices and software clients within a physical security system.

Read more...
2024 Trends in Video Surveillance report
Surveillance AI & Data Analytics
AI in video surveillance tops Eagle Eye Networks 2024 trends report; this year’s list also includes affordable professional video monitoring, workplace security upgrades, licence-plate recognition for HOAs, and sustainable security.

Read more...