UPDATED:
18-JAN-24
© Genetec Inc., 2024. Genetec logo is a trademark of Genetec Inc., and may be registered or pending registration
in several jurisdictions. Other trademarks used in this document are the property of their respective owners.
Genetec Inc.
genetec.com
info@genetec.com
@genetec
Best practices to safeguard your data
Your data privacy checklist
Collect and store only what you need
Reduce the volume of stored data, regularly review and audit the data you possess, and dispose of any
unnecessary information responsibly.
Limit access to sensitive data
Anonymize the data: When sharing data, prioritize anonymization to protect individual privacy. Remove
personally identifiable information to add an extra layer of security.
• Randomization adds noise to numerical values, making re-identification challenging
• Pseudonymization replaces identifying details with pseudonyms or codes
• Tokenization involves replacing sensitive data with unique tokens, enhancing security
• Generalization groups specific data into broader categories, preserving privacy
• Data masking obscures parts of the data, ensuring sensitive information remains protected
Be transparent about data use and get user consent
Transparency is paramount in establishing trust. Clearly communicate with users about:
• Data collection: Inform users of what data you collect, why you collect it, and how it will be used
• User consent: Obtain explicit consent from individuals before collecting and processing their data. Be
transparent by clearly outlining how you plan to use their data
Choose reliable data storage providers
Who is storing your data is as important as how they are storing it. Consider the following factors:
• Retention policies: Understand the provider's data retention policies. Regularly review and update data
storage to align with your organization's needs
• Third-party data sharing: If you're using third-party services, ensure they adhere to robust security
measures. Vet their security protocols and data handling practices
Establish strong policies
Establishing a clear chain of custody ensures accountability and traceability throughout the data lifecycle.
This involves:
• Documenting data movement: Keep a record of how data moves within your organization. This includes
creation, modification, and transmission
• Implementing tools: A digital evidence management system can help you streamline data handling. It
provides version control, access controls, and audit trails, enhancing overall data security
Your data privacy checklist
N O.1
N O. 3
N O.4
N O. 5
N O. 2
Download the ebook
Learn how to implement a physical security strategy with privacy in mind