SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

How do privacy issues and GDPR impact physical security systems?

2 May 2018

How do privacy issues and GDPR impact physical security systems?
2 May 2018

Editor Introduction

You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?


Card image cap
Peter Strom March Networks Corporation

GDPR will have a profound impact on how security systems are designed and managed. Significant investments have been made in developing sophisticated analytics capable of capturing an individual’s activity, identifying them, and linking them to different forms of data and transactions. GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymising retained data. The use of intelligent masking, customisable retention, and data encryption and protection will become the standards moving forward. Failing to comply with these standards can lead to significant fines for the companies collecting the data, and we fully expect to see more end users putting the burden on manufacturers to prove that their systems comply.

Card image cap
Steve Birkmeier Arteco Vision Systems (Arteco, Inc.)

Legislation such as the European Union's General Data Protection Regulation (GDPR) plays a bigger role in the operation and management of physical security systems than one may immediately recognise. These regulations exist to protect the personal data and privacy of citizens and customers, which becomes relevant in the physical security industry for organisations that store footage from the use of video surveillance or event management systems for private or public monitoring. The GDPR focuses heavily on enforcing proper reporting and mitigation techniques in the event of a cyber-attack or breach, emphasising the importance of manufacturer responsibility and convergence between physical and IT security teams to cohesively ensure regulation compliance. While it will be primarily global companies affected by the GDPR, U.S. companies must also pay attention to how it impacts their business and can learn from and apply best practices to increase overall security.

Card image cap
John Davies TDSi

This is a potentially complex situation. With an Access Control system there could be a request to supply data held on an individual, but to ensure the privacy of others it may be necessary to anonymise any data on connected third parties. For example, under GDPR regulations, any person whose image is recorded on CCTV has a right to seek and be supplied with a copy of their own personal data from the footage. However, the identity of any other individuals in that footage needs to be protected when it is shared. Investing in technologies that can automate privacy protection (such as using video redaction capabilities to blur out other people’s faces) could help companies to comply with the new GDPR regulations, painlessly and efficiently. This ability would transform data to a lower risk category, allowing operators to see what is happening in video footage without violating anyone’s privacy.

Card image cap
Joe Oliveri Johnson Controls, Inc.

As the May 25 deadline for GDPR compliance quickly approaches, operators must be proactive in addressing how to improve visibility and control over the large pools of data that are collected with video surveillance, access control and other physical security systems. Owners of on-premise systems will be responsible for GDPR compliance and required to have transparent measures in place that hold them accountable for how data is accessed, used and maintained. Evaluating current systems and engaging with integrators is crucial to better understand what updates are required and how collected data must be reported per the new guidelines. Physical security can help prevent unauthorised access to data, but it’s essential that organisations have the appropriate technical and organisational measures in place to comply fully.

Card image cap
Jumbi Edulbehram NVIDIA

Physical security systems, such as video surveillance systems, gather video data in order to protect people and assets. Many organisations today hold onto that data for a set amount of time to use as forensic evidence or to comply with rules that govern a specific industry, like in casinos and gaming. “Data Controllers,” as they are called in GDPR regulations, are users of security systems who would be ultimately responsible for meeting the strict privacy and regulatory requirements such as the use of that video without consent, the location where the video is stored and the measures in place to protect the video. If “Data Subjects” (people in the video) are clearly identifiable, then the requirements for maintaining their privacy are very stringent. While the protection of data is mainly the responsibility of end users, manufacturers, especially cloud service providers, will also be on the hook for complying with regulations.

Card image cap
Kim Loy ACRE, LLC

While GDPR is being implemented in the EU, U.S.-based companies can also learn a lot from the regulations being enforced in the realm of data privacy. Additionally, it is critically important for U.S. companies to be able to adhere to the rules guiding how data is collected and shared about EU citizens. When a company implements a physical security system such as access control, a lot of personal information is collected and analyzed for various purposes. While the majority of the data being shared is controlled by the company using the system, there are some elements that can come back to the integrator or even the manufacturer, like in the case of the organisation implementing a managed cloud-based solution. Therefore, manufacturers need to be mindful of their product's capabilities and make it easy and streamlined for end-user companies to adhere to the data sharing and privacy regulations in place.

Card image cap
Bud Broomhead Viakoo

Privacy regulations (such as GDPR) are examples of how physical security systems and the data residing in them are subject to a growing number of business-critical compliance and audit standards. For both video surveillance and access control, a major aspect of GDPR is being able to continuously document system operation and be able to secure it from cyber-breaches. To achieve this requires consistent management processes, and automation to support and document those processes. Whether it’s GDPR or any other standard, the day is fast approaching where operators of physical security systems must be able to demonstrate system-wide control over their operations while utilising automated service assurance solutions to ensure failures are quickly detected and their fixes are documented. Taking a system-level instead of a device-level approach to managing physical security is one of the positive directives GDPR is sending the industry.

Card image cap
Simon Bishop GDPR Systems

The physical security market has undergone a lot of changes in recent years, driven by changes in IT technology, and cybersecurity is a commonly used term. In many cases, the CCTV system is installed and then promptly forgotten about – passwords are rarely changed, and overall security of the system is often taken for granted (how many times is the NVR kept in a broom cupboard?) Legislation such as the GDPR shines an uncomfortable light on these systems. Questions asked in IT circles such as “What type of encryption do you use?” and “What is your password policy?” often fall on deaf ears with end users when it comes to physical security. This means manufacturers must bear the responsibility of providing appropriately secure products - that includes encryption! Integrators, installers and manufacturers must educate end users what to look for in an updated data protection world.

Card image cap
Tim Palmquist Milestone Systems

No element of security can stand alone. Security, even “just” physical security systems, have many dimensions that must be considered in the modern-day business climate. Products, their implementation and ongoing management need to not only help secure facilities and personnel but also be secure themselves. Regulations such as GDPR have added a new world of consequences to this evolving topic. While the GDPR requirements are new, they only build on already existing issues such as data integrity, continuity of service and business reputational risks. Taken together, the considerations for successful installations and ongoing administration have become more comprehensive and necessary. System dependency management has never been more important and the opportunities for skilled system integrators never better.


Editor Summary

GDPR’s requirements may fall primarily on the end user community, but the impact will also be felt among integrators and manufacturers, as our panel has emphasised. Data stored in cloud systems, in particular, constitute a GDPR-related concern for integrators and manufacturers. Furthermore, savvy integrators and manufacturers know that meeting their customers’ challenges successfully is the best route to success, even if one of those challenges is to ensure individual privacy and comply with tough new regulations. Fortunately, our industry is already reacting to cybersecurity needs, which are closely aligned with privacy and GDPR.

  • Related links
  • March Networks CCTV software
  • Milestone CCTV software
  • Oncam CCTV software
  • Oncam CCTV cameras
  • TDSi CCTV software
  • TDSi CCTV cameras
  • March Networks Network video recorders (NVRs)
  • Milestone Network video recorders (NVRs)
  • TDSi Network video recorders (NVRs)
  • March Networks Dome cameras
  • Oncam Dome cameras
  • Related categories
  • CCTV cameras
  • CCTV software
  • Network video recorders (NVRs)
  • Dome cameras
  • Storage
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Explore GDPR's impact on physical security, privacy concerns and intelligent surveillance for businesses, ensuring data protection compliance.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec