2.3 C
Casper
Saturday, December 21, 2024

Protecting Privacy in Security: Genetec Offers Best Practices

Must read

Genetec outlines data protection practices for physical security. Learn how to anonymize data and choose reliable storage providers.

Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shared a comprehensive set of data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security.

This initiative comes as a response to the escalating importance of data security in an increasingly interconnected digital landscape. Organizations can effectively contribute to a safer digital and physical landscape by prioritizing privacy.

“Organizations should never have to choose between data privacy and security. Genetec spearheads a paradigm shift toward a more resilient and trustworthy security ecosystem by equipping physical security professionals with these essential strategies. It is an ongoing process, and organizations should regularly update protocols, stay informed, and continuously educate their teams on best practices”, said Firas Jadalla, Regional Director – Middle East, Turkey, and Africa (META) Genetec.

Genetec recommends organizations ensure their security systems respect data privacy by: 

Collecting and Storing Only What You Need

A fundamental data security rule is to collect and store only essential information. The potential impact of a security breach can be reduced by minimizing stored data. It’s important to regularly review and audit data and dispose of unnecessary information responsibly.

Limiting Access to Sensitive Data

Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy. Techniques for anonymizing personal information while retaining its utility include:

  • Randomization (adding noise to numerical values such as an individual’s age or income),
  • pseudonymization (such as replacing names with unique identifiers), tokenization (such as replacing credit card numbers with tokens that have no direct correlation to the original numbers),
  • generalization (such as converting exact birthdates to age ranges),
  • and data masking (showing only the first few digits of a phone number).

Ensuring Privacy without Compromising Evidence

By using technologies such as KiwiVision™ Privacy Protector, organizations can automatically anonymize images of people so they can continue to survey surveillance footage while respecting privacy. This technology also offers an additional security layer that only authorized users can “unlock” and view unmasked footage while maintaining an audit trail.

Also Read: Demystifying Cyber Security: Essential Concepts and Strategies

Being Transparent and Getting User Consent

Building trust through transparency and user consent is essential. Communicating with users about the data collection process and promoting informed decisions is important. Organizations should also gain explicit consent before collecting and processing data.

Choosing a Reliable Data Storage Provider

Organizations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. Organizations should demand strong security measures and reliable data handling practices if using third-party services. Establish who “owns” any data stored in the cloud and any rights/privileges associated with using or disclosing any information.

Establishing Strong Policies

Genetec recommends implementing robust policies across the organization to ensure long-term data safety. Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every data lifecycle stage.

More articles

Latest posts