What you need to know about data privacy

Did you know that most security systems today don’t meet tomorrow's privacy requirements? That’s because they’re always changing! 

Raising awareness for data privacy is important to us so we’ve put together this blog post to help you understand how you can keep your security data safe.

Is your data secure?

Businesses collect data on individuals for a variety of reasons. From wanting to increase sales and learn more about their customers, to improving how they advertise a product.

For your security team, protecting people and assets sometimes requires collecting personal data using tools such as check-in kiosks, security checkpoints with biometrics technology, automatic license plate recognition, and intrusion detection and tracking systems.

The concern regarding all of this data being collected is about where it’s being stored, who has access, and who it’s being shared with?

To ease some of these concerns, here are a few things to prioritize:

  1. Ensure your physical security data that is managed, transmitted, and stored by your security products complies with industry and government standards
  2. Choose security products that give you full control and visibility over who can and has access to your data
  3. Implement video anonymization measures and tools to share digital data in a secure way

Genetec video anonymization

Ensure privacy measures right from the start

If you’re shopping for a new physical security solution, you’ll want to consider those that have privacy baked in from the start. One concept known as Privacy by Design and developed by Dr. Ann Cavoukian is the view that the future of privacy isn’t just about complying with government legislation. That it should come from an organization's default mode of operation.

When your physical security solution is designed from the ground up with privacy in mind, you don't have to choose between protecting the privacy of individuals and your organization’s physical security.


"When we talk about privacy vs. public safety, I can assure you that it is never privacy that wins, nor should it be. But what I reject, is the proposition that privacy must suffer,"

Dr. Ann Cavoukian, Episode 5, Engage: A Genetec Podcast


Complying with privacy regulations

The General Data Protection Regulation (GDPR) was one of the first official data protection acts in Europe that influenced new compliance measures in other countries. What these regulations have in common is how data controllers and data processors collect, use, and share personal data. Most regulations now require that organizations build data and privacy protection into their system design and infrastructure. And non-compliance means hefty fines.

These requirements have already impacted the way organizations manage security data. It’s why you don’t want physical security products that only comply with today’s standards, but rather ones that can adapt to evolving data privacy regulations.

Data privacy and cybersecurity go hand-in-hand

According to the State of Physical Industry 2020 report, due to the global pandemic and more people working remotely, there’s been a huge increase in cyberattacks, resulting in 35% of organizations recently improving their cybersecurity hygiene.

An improperly installed or inadequately secured device that’s part of the IoT can have a big impact on your organization. Without the proper protection, cybercriminals can gain access to vulnerable devices, including video surveillance cameras and door controllers, and attack sensitive data and systems. Whether you calculate the damage in terms of financial loss, data breaches, or reputational damage, the results can be devastating.

Our take on data privacy

Strengthening security while protecting privacy is at the core of our priorities. The KiwiVision Privacy Protector module of Security Center was designed to ensure the privacy of individuals recorded by your video surveillance system while safeguarding potential evidence. 

It dynamically anonymizes individuals in the camera's field of view without obscuring actions and movements. Using permissions, you can easily control which operator can review the original footage. If an incident occurs, authorized operators can access it directly from the Security Center monitoring interface. The original recording can also be encrypted using security certificates to prevent unauthorized access. 

The solution also adheres to the most stringent privacy standards. In fact, it is certified with the European Privacy Seal (EuroPriSe) for five consecutive 2-year terms.

See it in action below:

Want to learn more?

To learn more, check out our blog post about the five ways you can help protect your organization from cyber attacks.

To discover our approach to privacy, visit our Trust Center.

Previous Article
Join our growing internship program – even during the pandemic!
Join our growing internship program – even during the pandemic!

Interns have been an integral part of Genetec since it was founded in 1997. The pandemic has forced many or...

Next Article
How video analytics can help improve operations and maintenance
How video analytics can help improve operations and maintenance

Video analytics can be used not only to automate security tasks, but can also enhance operations and mainte...


Speak with a Genetec expert

First Name
I understand and agree to the privacy policy.
Your request has been received!
Error - something went wrong!