SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

When does it make sense to share video from a private system?

When does it make sense to share video from a private system?
12 Oct 2016

Editor Introduction

More cameras today are providing more video than ever, but how much of the video is available when and how it is needed? The question often comes up when law enforcement entities are seeking to access video from private systems to help solve a crime. There are many more private video systems than public systems, but is the video available when needed? And what about privacy: In what situations is it acceptable to share private video for the public good? We took these questions to this week’s Expert Panel Roundtable. Specifically, we asked: When does it make sense to share video from private video surveillance systems with citywide systems? What are the technical and/or privacy hurdles to sharing video more widely?


Card image cap
Fredrik Nilsson Axis Communications

Video surveillance cameras are everywhere and can be a great resource for law enforcement in certain investigations. However, it’s not like in the TV show CSI where law enforcement can instantly access all surveillance cameras. Many of them are installed by different companies in stores, cafés, outside buildings in the city centres and not directly accessible by law enforcement. One way to utilise the footage is to manually gather it by downloading the video and analysing it. An even better way to do it is by having public/private relationships much like Project Green Light in Detroit. Project Green Light is the first public/private community partnership of its kind. In short, the Project is blending a mix of real-time crime-fighting and community policing aimed at improving neighbourhood safety, promoting the revitalisation and growth of local businesses, and strengthening Detroit Police Department’s efforts to deter, identify, and solve crime.

Card image cap
Tom Larson

Much depends on what is considered private. If this extends to private business, I believe that video should definitely be shared, not necessarily continuously, but certainly in times of crisis. Going back to the Boston Marathon bombers, they were caught by utilising video sharing of the cameras around the area – everything from Walgreen’s to Bank of America to Crate and Barrel. The collective usage of that footage allowed for the identification of the Tsarnaev brothers after the cowardly act, but also timestamped their movements leading up to it. I am sure there are privacy concerns, but nothing is more important than protecting the citizens.

Card image cap
Bill Hobbs 3xLOGIC, Inc.

It’s difficult for police officers to arrive at a crime scene with little or no information about what deadly situation they may be about to walk into. Use of modern audio and video technology can help. Verified alarm response, including audio and video verification, is quickly becoming the norm. When central monitoring stations have access to video, that video can be provided to a responding officer to increase situational awareness. Wouldn’t it be much better to provide responders data about the number of suspects, their location(s) in premises, physical descriptions, conversations that are occurring, and any weapons present, all in real-time, instead of just saying, “There’s a hold-up at X building”? Even better, we forward the audio and video feed directly into the police vehicle, most of which have laptops, or even to a mobile device. Of course, these scenarios carry privacy concerns that have to be weighed.

Card image cap
David King Pivot3, Inc.

The number-one topic in surveillance is that cities and agencies want to be able to access video and utilise cameras from the private sector. In the event of an emergency, law enforcement wants to access any video possible and bring it to their command centres so they can respond appropriately. We're working on projects in which we use a Law Enforcement Video Gateway, which is a server that is paired with a recorder at a given location. The server stores a couple of hours of video, then when either a duress button is pressed or a 911 call comes in from that location, law enforcement is granted access to the recorded and live video at the location. In respect to privacy parameters, law enforcement can only access video when an event happens. Cameras can also be designated as only available at certain times of day, or only during public events.

Card image cap
Brandon Reich Pivot3, Inc.

Video systems should not be dependent on external or public internet connectivity. This is one of the big challenges of cloud video solutions; Internet connections are notoriously unreliable. If these systems must be connected to the public Internet, some storage should be maintained locally to prevent data loss in the event of a network outage. Private wide area network (WAN) connectivity is typically much more reliable, assuming there is sufficient bandwidth to handle video traffic.


Editor Summary

Network technologies are paving the way for greater sharing of video from various systems, so many of the technical challenges are being met. But is sharing video desirable from an ethical or privacy perspective? Like most ethical questions, the answer may depend on the situation: Giving up privacy may be an easier call in the case of an emergency or life-and-death scenario. The valuable contribution of video to investigating a crime would seem to outweigh privacy concerns, especially if video access is limited to special situations and limited time periods.

  • Related links
  • Axis Communications IP cameras
  • Related categories
  • CCTV cameras
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Explore sharing video from private security systems, weighing benefits and drawbacks with privacy concerns and GDPR impact.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec