The role of privacy in physical security 4
Staying up to date with privacy regulations 5
Privacy by Design 7
Evaluating your current physical security infrastructure 8
Building a holistic approach to privacy 9
Collect and store only the data you need 10
Limit access to sensitive data on a need-to-know basis 11
Automatically anonymize data collection 12
Protect privacy when sharing information 13
Unification: a successful data and privacy
protection strategy 14
Why selecting the right vendors is key 16
Choosing solutions that ensure privacy without
compromising security 17
A look inside