SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

What is the impact of privacy concerns on physical security?

12 Jul 2021

What is the impact of privacy concerns on physical security?
Larry Anderson
Larry Anderson
12 Jul 2021

Editor Introduction

Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics.

Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?


Card image cap
Sean Foley Interface Systems LLC

Every time a cyber-attack or data breach is announced, people lose a little more faith in the IT industry’s ability to protect their privacy and assets. With constant ransomware attacks in the news, it’s no longer ‘if’, but ‘when’ the next attack will occur. For the professional security market, this is a key topic between vendors and corporate customers who cannot risk damage to their brand. In an IoT, IP-based world, every single device that is put on the network must be properly protected. Customers have become increasingly cyber-aware and they want assurances regarding a product’s cyber worthiness. Features like auto-masking to protect privacy are increasingly requested. The most successful security solutions are those designed with privacy in mind. Enterprises need to wisely choose solution providers who design with a ‘security first’ mindset and properly address privacy rights.

Card image cap
Mark Harper HSM (UK) Ltd.

Personal data, no matter its form, has historically played a part in privacy concerns. But in the past three years, since the inception of the GDPR legislation, organisations have changed, enduring in their efforts to protect sensitive data as privacy concerns have become more prevalent than ever. With that, organisational policies have changed. Data handlers now realise that confidential personal and commercial information presents a huge risk to organisations – whether in cyber or physical form. Shredding devices have become the first line of defence for physical data forms. For one, sensitive data is instantly recognisable on paper. It is also portable, easy to copy or scan and therefore just as dangerous as electronic data in the wrong hands. And now, with hybrid working scenarios in the mix, we may see an accelerated impact on the physical security market – with home offices providing further risks to the security of physical data.

Card image cap
John Davies TDSi

There are measures in place to protect the privacy of individuals, such as GDPR, but the problem we face is that criminals and hostile actors can and do act anonymously or dishonestly online, to connect with people who have access to sensitive data. Often the human factor is the weak link in security, if we fail to prepare the whole team for potential dangers of attackers looking to win their confidence. There is a significant need to create awareness across personnel in our businesses, and in the general public, to be more careful and circumspect, when we are approached seemingly innocently via social media and the like. Physical security systems are well placed to protect people’s privacy, the encryption used to secure credentials equally protects personal information. However, these solutions are only as secure as the weakest link in the chain, human beings that are also custodians of this information.

Card image cap
Dean Brazenall IndigoVision

Privacy has always been a primary concern for our industry, especially as the deployment of video security technologies has increased at pace over recent decades. Privacy is a critical element in gaining the trust of people and for broader acceptance of CCTV systems across society as a force for good, rather than the negative perception of ‘Big Brother’ that can sometimes prevail. Video storage has often been the area of most concern, in terms of privacy. In this regard, video security technologies and procedures must provide clear standards for storage retention and access, as well as the conditions under which video footage can be retrieved and used. The importance of this has been further highlighted with the introduction of GDPR. Above all else, transparency is the key.

Card image cap
Charles (Chuck) O'Leary Open Options

As privacy concerns remain present in organisation's minds, the demand for physical security systems, such as access control, is only increasing. However, it is vital that organisations understand the rules and data surrounding these systems, before implementing them to keep their infrastructure and employees safe. One of the biggest security concerns for access control systems is network breaches by unauthorised users. When a company chooses a physical security system to protect its infrastructure, personal data such as name, age, and sometimes, even biometrics are collected and analysed by the system. Because of the amount of information that is collected, physical security manufacturers must create products that make it easy to adhere to the proper rules and regulations set in place (such as GDPR) and offer extensive training to their end-user customers, in order to foster a successful usage of their security solution.

Card image cap
Rick Cadiz IPVideo Corporation

Security dealers and end user customers are reaching out to us, to address the needs of security, while not infringing on privacy. Today, security is needed everywhere. However, facial recognition pushback and highly publicised invasion of privacy events have renewed the concerns over the use of cameras, video and audio recordings. Our shift to sensor technology as an add-on to camera and VMS solutions provides data-driven event-based alerting that maintains privacy, while keeping people safe. This security strategy is becoming widely accepted for use in bathrooms, locker rooms, patient rooms, residential complexes, classrooms, private offices, etc. and quickly addresses those original customer privacy concerns. 

Card image cap
Leo Levit ONVIF

Privacy protection regulations are becoming more effective on a global scale. Various regions have adopted different methods, but the common denominator is the protection of individual privacy. This requires a lot of guidelines on how security and safety systems are handling privacy and personal data. These rules seek to regulate what data can be processed by security systems, and how that data is handled, stored and maintain. The way that systems handle personal data is becoming a higher criterion for operations in the security industry. Most major vendors are adapting the methodology for handing personal data to comply with major laws such as GDPR, although privacy law differs from country to country and even city to city. This seems to indicate that the long-term impacts from privacy regulations have yet to be realised, particularly in the areas of video surveillance and analytics technologies such as facial recognition.

Card image cap
Kim Loy ACRE, LLC

Since GDPR has been implemented in the European Union, U.S.-based companies are learning a lot from the regulations being enforced in the realm of data privacy. Additionally, it is critically important for U.S. companies to be able to adhere to the rules guiding how data is collected and shared about EU citizens. When a company implements a physical security system, such as access control, a lot of personal information is collected and analysed for various purposes. While the majority of the data being shared is controlled by the company using the system, there are some elements that can come back to the integrator or even the manufacturer, like in the case of the organisation implementing a managed cloud-based solution. Therefore, manufacturers need to be mindful of their product's capabilities and make it easy and streamlined for end-user companies to adhere to the data sharing and privacy regulations in place.

Card image cap
Aaron Saks Hanwha Vision America

Cyber security and privacy go hand-in-hand. When hackers are successful, often it is private data that is exploited and sold. And while Europe made significant strides with GDPR, other countries, such as the United States, still have more to do in implementing regulations that adequately protect the privacy rights of individuals. It is imperative that product development address privacy concerns from the outset in any video security design and implementation. Beyond masking areas that should not be seen, best practices should include an audit trail detailing of what operators have been viewing. Everyone must be accountable for their actions, when using these powerful tools. Privacy rights and cyber security are increasingly driving decision-making for security customers, as the big tech companies continually grapple with the topic in the headlines. There should be no reason for a customer to compromise privacy for security.


Editor Summary

Whether protecting personal data to comply with GDPR or managing CCTV usage to avoid a perception of ‘Big Brother’, privacy is a primary concern for anyone in the physical security industry. As one Expert Panelist comments, security and privacy should not be a choice: Both can – and must – coexist proactively and responsibly to everyone's benefit. With cyber security attacks prominent in our daily news feeds, awareness has never been higher, and the negative impact of cyber-attacks on privacy should always be kept in mind.

  • Related links
  • Genetec Access control software
  • TDSi Access control software
  • TDSi Access control systems & kits
  • Genetec IP cameras
  • IndigoVision IP cameras
  • TDSi IP cameras
  • IndigoVision IP Dome cameras
  • TDSi IP Dome cameras
  • Biometric Access control systems & kits
  • Biometric Access control software
  • Access Control Software Access control software
  • Network IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Proximity Access control systems & kits
  • Standalone / Networked Access control systems & kits
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • Face Recognition Software Access control software
  • Issuance and identification system Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
  • IP cameras
  • IP Dome cameras
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Round table discussions
About this page

Explore GDPR's impact on physical security systems, data protection compliance, and enhancing your organisation's cybersecurity measures.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec