Home News Best Data Privacy Practices For Physical Security Leaders
Best Data Privacy Practices For Physical Security Leaders
0

Best Data Privacy Practices For Physical Security Leaders

0

Genetec shared a comprehensive set of data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security. This initiative responds to the escalating importance of data security in an increasingly interconnected digital landscape. Organizations can effectively contribute to a safer digital and physical landscape for all by prioritising privacy.

“Organizations should never have to choose between data privacy and security. By equipping physical security professionals with these essential strategies, Genetec is spearheading a paradigm shift towards a more resilient and trustworthy security ecosystem. It is an ongoing process, and organizations should regularly update protocols, stay informed and continuously educate their teams on best practices”, said Firas Jadalla, Regional Director for Middle East, Turkey and Africa (META) Genetec.

Genetec recommends organizations ensure their security systems respect data privacy by:

1. Collecting and Storing Only What You Need:
A fundamental rule of data security is to collect and store only essential information. The potential impact of a security breach can be reduced by minimizing stored data. It’s important to regularly review and audit data and dispose of unnecessary information responsibly.

2. Limiting Access to Sensitive Data:
Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy. Techniques for anonymizing personal information while retaining its utility include:

  • Randomization (adding noise to numerical values such as an individual’s age or income),
  • pseudonymization (such as replacing names with unique identifiers), tokenization (such as replacing credit card numbers with tokens that have no direct correlation to the original numbers),
  • generalization (such as converting exact birthdates to age ranges),
  • and data masking (showing only the first few digits of a phone number).

3. Ensuring Privacy without Compromising Evidence:
By making use of technologies such as KiwiVision Privacy Protector, organizations can automatically anonymize images of people, so they can continue to survey surveillance footage while respecting privacy. This technology also offers an additional layer of security that ensures only authorized users can “unlock” and view unmasked footage while maintaining an audit trail.

4. Being Transparent and Get User Consent:
Building trust through transparency and user consent is essential. It’s important to clearly communicate with users about the data collection process, promoting informed decisions. Organizations should also gain explicit consent before collecting and processing data.

5. Choosing a Reliable Data Storage Provider:
Organizations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. If using third-party services, organizations should demand strong security measures and reliable data handling practices. Establish who “owns” any data stored in the cloud, and any rights/privileges associated with the use or disclosure of any information.

6. Establishing Strong Policies:
To ensure long-term data safety, Genetec recommends putting in place robust policies across the organization. Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every stage of the data lifecycle.

SNS Mideast

Subscribe us

Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin