SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What is the role of ethics when deploying emerging security technologies?

25 Jul 2025

What is the role of ethics when deploying emerging security technologies?
Larry Anderson
Larry Anderson
25 Jul 2025
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Ethics impact company reputation and sustainability in deploying emerging security technologies.
  • Moral principles are essential for a successful and respected physical security industry.
  • AI and data sharing in security require heightened ethical focus beyond legal mandates.

Editor Introduction

Ethics can impact a company's reputation, profitability, and overall sustainability. Ethics extend beyond the law to encompass doing the "right thing" even when it is not legally mandated. As technologies such as artificial intelligence and data sharing continue to impact the physical security industry, a focus on ethics today is timelier than ever. A commitment to moral principles is critical to build a successful, sustainable, and respected industry. We asked our Expert Panel Roundtable: What is the role of ethics when deploying emerging technologies in physical security?


Card image cap
Thomas Jensen Milestone Systems

Ethics serves as the cornerstone for the responsible deployment of emerging technologies in physical security. It ensures that innovation benefits society while protecting human rights. As AI-powered systems become increasingly sophisticated, technology and security professionals must strike a balance between tech advancement, privacy protection, and transparency. Today’s regulatory landscape calls for a "responsibility-by-design" approach. This means ethical considerations must be built into systems from the ground up. Companies should apply robust testing protocols, maintain human oversight, and ensure accountability in AI decision-making processes. The focus should be on security and privacy by design, human rights protection, transparency, and fairness throughout the development process. Rather than viewing regulations as obstacles, responsible use frameworks guide the creation of more trustworthy solutions. Security professionals can shape a future where advanced AI capabilities work with regulatory compliance. This creates safer environments for everyone by embracing responsible innovation practices while maintaining strong ethical standards.

Card image cap
Florian Matusek Genetec, Inc.

In the security industry, the stakes are especially high when deploying technologies like AI. Manufacturers have a clear responsibility to design and build these systems ethically, ensuring they protect people without compromising privacy or civil liberties. That starts with embedding privacy-by-design and responsible AI principles from the outset, including encryption, limiting access to data, and minimising bias in AI models. Just as important is maintaining a human in the loop, someone who can oversee how AI-driven decisions are made, applied, and interpreted. Human oversight helps prevent bias, catch errors, and ensure accountability. It also provides a critical safeguard when systems operate in complex, real-world environments. When physical security technologies are developed and deployed ethically and responsibly, they don’t just reduce risk; they help uphold the values of liberal democracies.

Card image cap
Adam Lowenstein i-PRO

Ethics must be top of mind when deploying emerging technologies in physical security. At i-PRO, we believe innovation should never outpace responsibility. That’s why we have formalised an Ethical Principles for AI framework to guide i-PRO’s development and use of AI-powered systems. These principles prioritise the protection of human rights, data privacy, transparency, and fairness. We embed safeguards into our technology, such as the ability to disable specific attribute searches within our Active Guard intelligent search application, so customers can adapt deployments to meet local policies, cultural norms, and privacy expectations. As AI becomes more capable, so too must our efforts to prevent misuse, bias, or overreach. We continuously evaluate the societal impact of our solutions and maintain an open dialogue with partners to ensure accountability. By building flexibility, security, and ethical foresight into our products, we aim to support safer communities while helping our customers comply with evolving regulations.

Card image cap
Sean Foley Interface Systems LLC

As security technologies evolve, so do the ethical challenges, particularly around data privacy and biometric surveillance. We work with some of the most trusted retail and restaurant brands in the U.S., where protecting people also means protecting brand reputation. Mishandled data or vague practices can lead to regulatory scrutiny, legal exposure, and a loss of public trust. That is why we prioritise complete transparency in everything we do. If personal data is collected, whether it is facial imagery, licence plates, or transaction metadata, our customers know exactly what is being captured, why, where it is stored, and for how long. Delivering to the highest ethical standards isn’t just the right thing to do; it’s good business. We view every deployment through this lens, helping our clients meet their obligations and ensure the technology enhances security without compromising the rights of the people it is meant to protect.

Card image cap
Shaila Rana Institute of Electrical and Electronics Engineers (IEEE)

Ethics in security is becoming genuinely uncharted territory. For example, quantum is not just a distance in the horizon, there are significant advances towards living in a quantum world. Quantum-resistant cryptography forces us to decide: Do we protect today's secrets from tomorrow's quantum computers, or accept that some encrypted data will become readable? The ethical calculus of "cryptographic triage" is unprecedented. With AI, AI-powered autonomous incident response systems that can quarantine networks, block users, or even launch counterattacks without human oversight create ethical dilemmas around machine decision-making in security contexts. As these technologies continue to evolve and develop, ethical safeguards must evolve with them.


Editor Summary

Customers are increasingly conscious of a company's values, and by extension, the values of an industry such as physical security. Ethical behaviour fosters positive relationships with all stakeholders, leading to stronger partnerships and a more supportive business environment. Ethical deployment of technologies such as AI is a cornerstone of success, paving the way for a triumphant future for the physical security market.

  • Related categories
  • Bollards
  • Barricades
  • Storage
  • Barriers
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
SentriGuard's role in sustainable security solutions

SentriGuard's role in sustainable security solutions

2026 Cybersecurity threats: Key risks and strategies

2026 Cybersecurity threats: Key risks and strategies

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Explore the crucial role of ethics in deploying emerging security technologies, ensuring a sustainable and respected industry through commitment to moral principles and responsible practices.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec