EN-Books

How to implement a physical security strategy with privacy in mind

Issue link: https://resources.genetec.com/i/1490550

Contents of this Issue

Navigation

Page 14 of 17

15 "I sit on the Audiovisual Surveillance Technolog y (AVST) committee. We are responsible for setting up guidelines for authorized camera locations, who may view them, and reasons cameras may be authorized for use. Security Center provides granular user privileges, access rights, and authorizations. It delivers many built-in tools that support our privacy efforts, allowing us to easily maintain checks and balances on our operations." "One thing that we struggled with is 'what do we do with all this video? And how do we get this video to our relevant business partners?' Genetec Clearance allows us to dictate storage for every incident that happens within the organization. So, if it's a slip-trip-fall event, we'll set a minimum retention time for that video within Clearance. It acts as our central repository for all long-term video archives. We can then easily share the video with our internal teams or external agencies in an efficient and secure manner." "In the past, we needed to give more people access to our physical security systems to service those access requests. Since the provisioning workflows are all automated within ClearID now, we've been able to restrict access to the application itself to a very limited group of system users. This makes our security operations far more secure and resilient." –Dell Hamilton Manager of Transportation Services, Texas A&M University –Sean Owens Director of Security Technology & Non Acute Care, Lee Health –Larry Allen Technical Product Owner for Facilities, Security and Crisis Management, Cytiva Over 42,500 customers chose Genetec to protect their everyday, learn more about their stories.

Articles in this issue

Links on this page

view archives of EN-Books - How to implement a physical security strategy with privacy in mind