SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Effective high-security wedge barriers by Delta
    • SCD secures major contract for HD MWIR detectors
    • ASSA ABLOY's Aperio: Revolutionising digital security
    • VIVOTEK supports ecological restoration in Taiwan
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Koorsen announces security cameras combined with facial recognition software for contact tracing during COVID-19

14 Oct 2020

Koorsen announces security cameras combined with facial recognition software for contact tracing during COVID-19
Contact company
Contact Koorsen Fire & Security
icon Add as a preferred source Download PDF version

The rampant spread of COVID-19 around the globe continues to challenge public health officials and governments alike to find ways to manage the spread of the disease until an effective vaccine can be developed. This challenge has led to new and novel approaches, particularly in the use of technology. One of the most recent technology applications to control the spread of the virus is the use of security cameras combined with facial recognition software.

Facial recognition is part of a computer software category that uses video content analysis (VCA) technology. VCA technology uses machine learning and artificial intelligence to detect objects within a video image and then extract, identify, classify, and index them for a broad range of applications.

As schools and businesses reopen, contact tracing has become an essential tool in preventing the spread of COVID-19. However, not surprisingly, people infected with the virus often struggle to remember everyone they have come in contact with in the previous two weeks, which reduces the effectiveness of contact tracing.

Video security systems

Instead of relying on human memory, schools and businesses that have video security systems can use facial recognition to quantify people's proximity across time and location. They can track where on the premises a student or employee has been and identify any other people that person has been in contact with while in the building.

This technology helps avoid having to close an entire school or business when an individual tests positive for the virus by providing more precise information about what areas need to be sanitized and who may need to be quarantined.

Safe and responsible reopening

VCA technology and video security systems can also be used together to help ensure safe and responsible reopening

In addition to contact tracing, VCA technology and video security systems can also be used together to help ensure safe and responsible reopening during the current pandemic in other ways, too:

Improving compliance with face mask requirements -- Providing the ability to search for people with or without a mask, facial recognition can be used to detect face mask violations in real-time and alert those responsible for ensuring compliance.

Limiting occupancy to ensure proper social distancing -- Video management systems software can be encoded with lower occupancy thresholds and rules to count the number of people entering and exiting a building or an area within it and send alerts when the occupancy thresholds are met. This allows security staff to ensure proper social distancing and provides a better understanding of where social distancing may be more challenging.

Contact tracing

Here is one example of how a business might use facial recognition for contact tracing. When an employee self-discloses that he/she has tested positive for COVID-19, the employer can upload a digital image of that employee into its VCA system to conduct a filtered search through its video footage for the last 2-3 weeks for any face matches for that employee.

When matches are identified, the operator can review the video for each match to identify where in the facility the employee has been and who the employee may have come in contact with. The employer can then notify those individuals that they may have been exposed to the virus and recommend or require that they self-quarantine for the recommended 14 days.

It is incumbent on the employer and required by the federal Health Insurance Portability and Accountability Act (HIPAA) to protect the individual’s identity when notifying the people he/she has interacted with.

Important Considerations

Critics argue that using video surveillance with facial recognition in hospitals and public spaces creates privacy issues

Research has found that facial recognition is not as accurate as people may think. In an analysis of the use of facial recognition technology in law enforcement, Cardiff University found thousands of false-positive matches. Concerning facial recognition algorithms' accuracy, the National Institute of Standards and Technology (NIST) defines a false positive as two different individuals incorrectly identified as the same person. A false negative means that the software failed to match two images of the same person. 

The fact is, facial recognition technology has been controversial since its development. While facial recognition has been used to locate missing children and has improved the security at airports against terrorism, critics argue that using video surveillance with facial recognition in hospitals and public spaces creates privacy issues. In contrast, others point to concerns that inaccurate results can lead to false arrest problems when used in law enforcement.

Facial recognition

Given the strong feelings that the use of this technology can elicit, any organization considering using facial recognition should be prepared to address them openly.  

The Brookings Institute has developed several recommendations to help protect people from the potential problems facial recognition software can pose. These recommendations were developed prior to the emergence of COVID-19.

Transparency

However, while many of them will take years to implement, there are two that, in the short term, can do much to help ensure the responsible use of facial recognition in preventing the spread of the disease:

Limit the Data Storage Time -- This is a reform that could go far in mitigating privacy concerns and fears around the misuse of data for purposes other than that for which it was originally collected. Data collected for contact tracing will no longer be relevant after the pandemic is over; therefore, there is no need to retain it beyond that. Defining limits on how long such videos will be retained will instill confidence that their images are used only for beneficial purposes and only for a specific period.

Provide Clear Notification in Public Areas that Facial Recognition is Being Used and Why -- This would allow those who object to avoid those areas. While it would seem that everyone who wants to do whatever they can to help control the spread of COVID-19, some may not agree that facial recognition is an appropriate way to do that. Transparency concerning the use of these technologies in public spaces is therefore very important.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security cameras
  • Video analytics
  • Video surveillance
  • COVID-19
  • Related categories
  • CCTV cameras
  • CCTV software
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec