{"id":37318,"date":"2019-07-11T03:07:30","date_gmt":"2019-07-10T19:07:30","guid":{"rendered":"https:\/\/mec.ph\/?p=37318"},"modified":"2022-02-21T13:25:30","modified_gmt":"2022-02-21T05:25:30","slug":"axis-privacy-surveillance","status":"publish","type":"post","link":"https:\/\/mec.ph\/axis-news\/axis-privacy-surveillance\/","title":{"rendered":"Axis: Securing Privacy When Undertaking Surveillance"},"content":{"rendered":"\t\t
Surveillance and privacy\u00a0don\u2019t seem to be\u00a0natural bedfellows. However,\u00a0because the\u00a0public begins\u00a0to grasp\u00a0how surveillance will\u00a0help\u00a0with their safety and\u00a0security,<\/a>\u00a0the utilization of\u00a0surveillance\u00a0in public\u00a0places is\u00a0changing into additional\u00a0accepted.\u00a0Whereas\u00a0privacy has\u00a0perpetually\u00a0been a priority\u00a0within the\u00a0surveillance\u00a0industry, public awareness over their rights has been heightened by initiatives like GDPR in Europe and FISMA\u00a0within the\u00a0US. As a result, organizations have had\u00a0to take\u00a0note and show\u00a0however\u00a0they\u2019re\u00a0safeguarding privacy<\/a>\u00a0to not\u00a0solely\u00a0protect their\u00a0brand\u00a0perception\u00a0but\u00a0also\u00a0go with union laws\u00a0that specify privacy protections\u00a0within the\u00a0workplace. All of this combined is putting additional pressure on organizations to secure their surveillance data.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Surveillance cameras\u00a0are\u00a0a typical\u00a0sight\u00a0in public\u00a0places \u2013 in 2016\u00a0there have been\u00a0thought to be nearly 350 million\u00a0surveillance\u00a0cameras worldwide \u2013\u00a0and other people\u00a0are\u00a0accepting\u00a0that\u00a0they\u2019ll\u00a0be caught on camera\u00a0often. In London alone,\u00a0it\u2019s\u00a0calculable\u00a0that\u00a0voters\u00a0are\u00a0recorded on camera around\u00a0three hundred\u00a0times\u00a0day after day,\u00a0which puts\u00a0the need\u00a0to grasp\u00a0how\u00a0all this\u00a0data\u00a0is processed and\u00a0keep\u00a0into perspective.<\/p> \u00a0<\/p> The organizations capturing the\u00a0surveillance\u00a0could also be doing so\u00a0for\u00a0a range\u00a0of reasons \u2013 from securing\u00a0a district\u00a0against criminal activities through\u00a0to making sure\u00a0traffic is\u00a0running smoothly. Manufacturers and sellers of surveillance cameras will help users stay enlightened on surveillance best practices. This includes a way to properly and ethically use the data collected by surveillance cameras, yet to help them take the mandatory steps to go with local and international privacy regulations.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t While there\u00a0are\u00a0regional nuances\u00a0in\u00a0the precise wording of how organizations ought to go with data security and surveillance regulation, primarily it\u2019s there to safeguard people\u2019s human rights by safeguarding their right to privacy. Therefore, it puts in place controls that have to be enforced around the capturing, storing and sharing of video data. Many tools and technologies exist to safeguard people\u2019s privacy throughout the method of viewing, recording and exporting video. The foremost common are dynamic anonymization, permanent masking, and redaction.<\/p> \u00a0<\/p> Dynamic anonymization: With this method, analytics software is employed to automatically anonymize individuals within the video in real-time as the analytics monitors the actions and movements in an exceeding scene. Should the identities of these captured within the footage be crucial to an investigation, solely authorized personnel will unmask the data to access the video. Not only will this protect people in their right to privacy, but it also covers an organization\u2019s obligations to keep individuals safe \u2013 particularly in open, public areas.<\/p> \u00a0<\/p> Permanent masking: This approach is most typically utilized in environments where the identities of passers-by don\u2019t seem to be relevant to the first aim of the surveillance. Permanent masking provides an additional basic method of protecting people\u2019s privacy by anonymizing everybody in an exceeding video and permanently burning the masking into the video, therefore, there\u2019s no way to undo the masking within the footage. This suggests that while areas may be monitored for things like hazards, footfall counting, or non-human surveillance like traffic monitoring, should somebody have to be compelled to access the footage as a part of an investigation, the identities of those within the video can\u2019t be uncovered. Permanent masking might involve static masking \u2013 where there are defined areas of a scene that are permanently masked in the live and recorded video \u2013 or dynamic masking, where masking isn\u2019t static but dynamically applied to moving objects in an exceeding scene in living and recorded video.<\/p> \u00a0<\/p> Redaction:\u00a0instead of\u00a0blanket-anonymizing\u00a0individuals\u00a0caught on camera, redaction is undertaken\u00a0once\u00a0someone\u2019s image has been caught on camera\u00a0to safeguard\u00a0the privacy of non-relevant\u00a0people.\u00a0this can be\u00a0most typically\u00a0used\u00a0once\u00a0an organization\u00a0should\u00a0share un-anonymized footage,\u00a0like\u00a0with\u00a0law enforcement\u00a0as\u00a0a part of an investigation.\u00a0whereas\u00a0this method\u00a0helps organizations\u00a0shield\u00a0the privacy of innocent\u00a0people, it\u00a0doesn\u2019t\u00a0safeguard privacy for live video streams.<\/p> \u00a0<\/p> As well\u00a0as the\u00a0above\u00a0approaches to\u00a0surveillance\u00a0privacy protection, some non-visual surveillance\u00a0technologies naturally lend themselves to identity protection.\u00a0for instance, thermal cameras\u00a0are\u00a0usually\u00a0utilized in\u00a0sensitive environments,\u00a0for instance, patient monitoring in healthcare, therefore individuals may be observed remotely without capturing personal details \u2013 one thing that\u2019s required by HIPPA regulation within the US.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tEnsuring users understand their obligations<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
Enabling compliance through technology<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
Making privacy protection the norm<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t