SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Body worn video cameras
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
  • Videos

UK Surveillance Camera Commissioner, Tony Porter, to highlight importance of Camera Code of Practice at IFSEC 2016

Ron Alalouff
Ron Alalouff
Contact company
Contact United Business Media Limited
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Tony Porter underscores CCTV Code of Practice importance for effective, transparent surveillance.
  • Self-assessment tool aids compliance; between 60%-70% of authorities already compliant.
  • IFSEC 2016 sees launch of National Surveillance Camera Strategy to enhance sector standards.
Tony Porter will be speaking on a Passport to Compliance in the Security Management Theatre at IFSEC 2016
Porter will tell IFSEC attendees about an upcoming National Surveillance Camera Strategy

The Surveillance Camera Commissioner for England and Wales, Tony Porter, will be speaking at IFSEC International 2016 on how compliance with the U.K. Surveillance Camera Code of Practice can ensure that CCTV systems are operated proportionately, transparently and effectively.

Porter has certainly been busy in the two years since his appointment by the Home Secretary. He has the difficult job of balancing effective surveillance on the one hand with considerations for privacy and individual freedom on the other.

What is Surveillance Camera Code of Practice?

To help him achieve this, the Home Secretary published the Surveillance Camera Code of Practice in 2013, under the Protection of Freedoms Act 2012. The code sets out guidance on the appropriate and effective use of CCTV systems by “relevant authorities,” who must take it into consideration in the running of their surveillance systems.

“My role is to ensure CCTV systems are used to support and protect communities, and not to spy on them,” says Porter. “The 12 guiding principles of the code of practice aim to balance the need for cameras in public places with individuals’ right to privacy. If the principles are followed, it means that systems are only used proportionately, transparently and effectively.”

Other, mainly private, users are encouraged to adopt the code on a voluntary basis. Apart from overt surveillance, the guiding principles of the code also apply to drones, body-worn cameras and automatic number plate recognition systems.

CCTV system self-assessment

Flowing from the code of practice is a detailed self-assessment tool, with which those managing CCTV systems can ascertain whether or not they are complying with the code of practice.

Between 60% and 70% of
authorities have demonstrated
that they comply with the code
using the self-assessment process

“The self-assessment tool is a very good first step to demonstrate compliance with the code,” says Porter. “By encouraging authorities to publish the findings of their assessments, a conversation takes place with the public so they feel that surveillance is not being done to them, but that they are part of it. I call it surveillance by consent.” He estimates that between 60% and 70% of authorities have demonstrated that they comply with the code using the self-assessment process.

But what about those CCTV users who do not fall into the category of those required to use the code of practice? “We’re getting a great deal of uptake from the private sector,” says Porter. “We have worked with universities, banks, retailers, government departments and bodies like Transport for London. The incentive for them is that they can then tell their customers or stakeholders that they follow best practice and provide good security for them.”

Even in times of austerity and squeezed budgets, the self-assessment tool can have benefits. While some local authorities have declared there is no money and have walked away from their systems or reduced the extent of monitoring, others are using the tool as an opportunity to review whether their systems are working effectively and efficiently.

Independent verification of CCTV users

One step further in raising standards and accountability is the third party certification scheme for operators of public space surveillance camera systems. The scheme, launched last year, enables organisations complying with the code of practice to be independently verified. It is open to all users operating CCTV systems in a public space.

“Users can demonstrate compliance with the code by using a process that demonstrates integrity cost-effectively,” says Porter. “Certification is an outward sign of inward compliance and the process will help raise standards.”

Certification can be relatively inexpensive as well, with a typical cost of £300-£400 for a 50-camera system for the first stage of certification. “Step one certification is a desktop review of the system. The process is built on honesty but based on transparency, and is valid for one year. It is designed for organisations that are working towards full compliance with the code, but are aware they need more time to become fully compliant. We encourage people to approach step one certification as a natural follow-on from self-assessment, but certification is on the understanding that the organisation will work towards being in a position to apply for full certification. Step two (full certification) includes a full on-site audit of the system and is valid for five years, subject to an annual review.”

The self-assessment tool, the first step to demonstrate compliance with the code, can have benefits even in times of austerity and squeezed budgets
Porter wants to focus the thoughts and actions of users, suppliers, installers and consultants on the core requirements of the system by re-working the OR so that it facilitates compliance with the code of practice

Recommendations

Although introduced only in 2013, the commissioner has already carried out a review of the code of practice. Among his recommendations are:

  • Extending the definition of “relevant authorities” to cover all organisations that are publicly funded in any way, including bodies such as NHS trusts, education establishments and transport operators;
  • Introducing an obligation for authorities to publish their camera coverage in terms of systems, numbers, privacy impact assessments, self-assessments, certification and outcomes of annual reviews, with limited powers of enforcement in cases of non-compliance;
  • Encouraging the use of a “passport to compliance” using the Operational Requirement and system certification;
  • Producing a single code of practice on surveillance camera systems rather than having two (the Surveillance Camera Commissioner’s and the Information Commissioner’s Office) at present.

Revamping Operational Requirement (OR)

Among the further initiatives to come from the commissioner is the revival of the Operational Requirement (OR), which was last revised in 2009. The OR is used by designers of CCTV systems and consultants, but the intention is to revise its provisions so that it can become a key element of the passport to compliance.

Porter wants to re-work the OR so that it facilitates compliance with the code of practice by focusing the thoughts and actions of users, suppliers, installers and consultants on the core requirements of the system, therefore becoming a process and guidance manual.

As stated in the commissioner’s review of the code of practice: “Properly developed, the OR represents a key opportunity to ensure public monies are properly invested and CCTV industry specialists are held to account for products provided.” The revamped OR is due to go out to consultation soon.

Looking further ahead, Porter will tell IFSEC attendees about an upcoming National Surveillance Camera Strategy, due to go out for consultation in the autumn. The strategy aims to cover all stakeholders – manufacturers, designers, installers and end users – and to raise standards and compliance with the code of practice. “I see this strategy as being crucial to bring the many different and disparate parts of the sector to follow one strategy.”

“I’m determined to drive up standards right across the spectrum of the industry,” concludes Porter. “I believe the first two years of tenure in my post demonstrate that.”

Tony Porter will be speaking on a Passport to Compliance in the Security Management Theatre at IFSEC International in London on 21 June.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security camera systems
  • License plate recognition
  • Body worn video cameras
  • Related links
  • IFSEC 2016
  • Articles by Ron Alalouff
  • Related categories
  • CCTV cameras
  • IP cameras
  • IP Dome cameras
  • Dome cameras
Related white papers
Unlocking wide-angle camera dewarping

Unlocking wide-angle camera dewarping

Download
Cloud video and smart cities

Cloud video and smart cities

Download
Making sense of today’s security camera options

Making sense of today’s security camera options

Download
Related articles
SOURCE Tactical Gear women's ballistic vests win

SOURCE Tactical Gear women's ballistic vests win

Roc Technologies & City of London: Future-proof networking

Roc Technologies & City of London: Future-proof networking

Pimloc's Secure Redact enhances video privacy

Pimloc's Secure Redact enhances video privacy

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Body worn video cameras
  4. News
  5. Expert commentary
About this page

Discover UK Surveillance Commissioner Tony Porter's insights on the up-to-date role of CCTV and best practices for effective camera surveillance.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec