Issue link: https://resources.genetec.com/i/930320
Video of people captured by surveillance cameras Example of PII collected by physical security systems: Cardholder information and activities tracked by an access control system License plate numbers captured by an automatic license plate recognition (ALPR) system How our solutions can help you prepare for GDPR compliance Strong protection of data Cyber security is at the heart of our R&D process. Our solutions are designed to protect personal data against cyber attacks. How our solutions can help 1. 2. 3. We offer a wide range of on-premises and cloud-based solutions that can help you gain better control over the data you collect and prepare for GDPR. Here's how: A comprehensive approach to data protection How we help protect your data Protecting data by default GDPR imposes new legal requirements and potential fines to companies who suffer data breaches that expose PII. Making sure the data you collect is protected against unauthorized access is the first step in preparing for GDPR. Our solutions provide you the tools you need to ensure that any PII captured and stored by our security systems is fully secured. Our dedicated cybersecurity team actively collaborates with industry experts to identify new vulnerabilities and prepare countermeasures rapidly. Security is in our DNA, a core foundation of our products. We design our products with cybersecurity and privacy in mind. Ready for right to access We offer a secure self-service system that helps you answer personal information access requests. Privacy by design Our solutions give you full control over data collection, retention, and accessibility. Our cloud-based solutions are GDPR-ready, and will help you fulfill GDPR requirements. Our information security management system (ISMS) is audited and complies with various government and industry standards. Ensure the video and data stored and transmitted within your system is encrypted Keep your video and data from getting into the wrong hands with built-in authentication Control the scope of activity of users with comprehensive individual and group-based authorization management © 2018 Genetec Inc.