Using an identity provider, like Microsoft Active Directory, can also help eliminate human error by automating the processes of adding/removing security user accounts, granting rights, or removing users who have left the organization.Īnonymize data collection automatically. Review access rights regularly so privileges align with user requirements. Grant access to data only to those who need it to do their jobs and monitor those activities to ensure identifying information, like images and access events, is used only as intended. And carefully control what data, how much and for how long it can be shared with other organizations. Set protocols to automatically archive or delete physical security data based on relevance. Consider adjusting a camera’s field of view so it doesn’t record areas that do not require monitoring. Reduce your exposure to risk in the event of a data breach with simple steps. Marketing Technology News: MarTech Interview with Dan Granger, CEO and Founder of Oxford Roadīest practices for ensuring video surveillance, access control and automatic license plate recognition systems meet data privacy standards include:Ĭollect and store only the data the organization truly needs. “By following best practices and ensuring privacy is designed into their physical security solutions, organizations can have the highest levels of security while respecting personal privacy and complying to privacy laws.” “Security and privacy are not mutually exclusive,” said Christian Morin, Chief Security Officer at Genetec Inc. In the physical security industry, acquiring digital information such as surveillance footage, photos, and license plate information is necessary to help protect people and assets and provide a valuable source of actionable business intelligence. Today, 71% of countries have initiated data privacy legislation, and companies that haven’t taken appropriate steps to protect data are facing tens of millions of dollars in fines for violations. In recognition of international Data Privacy Day, Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shared data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security.ĭata privacy has become a global top priority.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |