CCTV systems have evolved in recent years

Size: px
Start display at page:

Download "CCTV systems have evolved in recent years"

Transcription

1 Fujifilm s Digital CCTV and Security Guide 1. What digital media should I use? 2. How much footage can I store on the media I use? 3. How do I calculate how much data can fit onto my media? 4. How do I deal with using digital images as evidence? 5. Do I need to meet the Data Protection Act requirements? 6. How do I ensure I am compliant with the Data Protection Act? 7. The Fujifilm Digital Evidence Kit- The solution in the bag. 1. What digital media should I use? CCTV systems have evolved in recent years with digital technology establishing itself as an emerging part of future surveillance solutions. With digital technology, the very way in which it stores data allows a wider variety of recording media to be employed, so which one should be used? The real deciding factor is not so much what you want to do with the recordings but how much footage you need to store and what you intend to do with any footage which may need to be transferred to another party. Based predominantly around hard drive integral storage, digital solutions will usually store their data in a buffer. This data, including video, audio and other information, will then either be overwritten when the hard disk is filled, or removed to another storage media and securely archived. Digital archiving is constantly increasing in capacity, predominantly due to archiving media being used and supported by the IT industry. The most basic digital archiving media is the Compact Disc. The CD has become well known and widely used over the years, and is useful for storing data capacities of up to 700MB. CDs come in two variants, the CD-R which is a WORM type media, (Write Once, Read Many) and the CD-RW which can be rewritten. Where capacities in excess of 700MB are common, users and installers are likely to make use of the constantly developing DVD capacities. DVD capacities currently dwarf those achievable with CDs, and future developments will see these figures rise dramatically. Indeed, the next proposed generation of DVDs will far exceed the current capacities! There are other digital storage formats including various digital tapes, which offer fault-free operation and high speed data transfers, and data storage technology such as 4mm, DLT, and LTO Ultrium data tapes, offering higher storage capacities and faster data transfer speeds. 2. How much footage can I store on the media I use? W hilst it is fairly straightforward how much footage can be stored on analogue media, digital media is more complex. Digital image sizes are governed by how much data they are made up of. One image captured off a specific camera could vary in size when compared to another according to a number of criteria. There are no hard and fast rules when it comes to file sizes and here we will explain why size, whilst being important, is unlikely to be constant! Digital image file sizes can vary according to the information contained. This differs from analogue where a VHS cassette will store 25 frames per second for the entire 180 minutes it is recording. It matters not if the video is of a busy street, an empty car park or a white wall.

2 The image quality can be pin-sharp or so low that it is unusable, but you still will record 25 frames per second for 180 minutes in real-time mode. Digital images however are databased in that each pixel in the image contains colour information. It might initially seem that as all images captured by a system are the same resolution, they will be the same size, but they are not. This is because image compression algorithms will convert the data in order to eliminate as much redundant information as possible. Where there are large areas of continual tone, some image compression algorithms will calculate the number and positions of the pixels and store that data rather than from each individual pixel. Others will take an average value from a group of pixels, and will rebuild the image using grouped averages. Subsequently, an image of an empty car park with a white wall on one side might take up little space, because image compression can use a small amount of data to create certain areas of the image. However when the same car park is filled with cars of different shapes and colours, and with a certain amount of activity, the size of each image, in relation to the data it contains will rise significantly, and less footage can be archived in any given memory. Environmental factors can also affect image file sizes. For example, a frame of video showing an external scene on a clear sunny day will be smaller than the same scene on a rainy day. This is simply because the rain will be constantly changing, and will break up any continuous areas of tone, with the result that compression will be less effective. The size of files is affected by the quality of the video (lower resolutions use bigger pixels, equating to less data), the image compression algorithm and ratio used, the image contents, noise in the picture and environmental conditions. So how much data can you fit on digital media such as a CD? There is no definitive answer. Despite some manufacturers quoting how many hours will fit on a drive, there are too many variables to provide an accurate answer. We understand this is not very useful for users and installers alike trying to decide which media to use. By understanding image file sizes from some market-leading DVR recorders and considering how much footage specific media are able to contain, we hope to give you a greater understanding. Issues affecting file sizes and how much footage you can store Busy scenes take up more space Colourful scenes take up more space A lot of movement such as rain or other activity takes up more space Redundant or repeated data take up less space as they can be compressed A low resolution and a low compression ratio can make an image much smaller 3. How do I calculate how much data can fit on my media? B efore we look at image file sizes, we need to understand how files are measured. This information is necessary to carry out any accurate calculations. Digital files are made up of bytes of information. Where bytes are being specified the abbreviation is B. Where you see a b being used it is referring to bits, often used when measuring data transfer speeds. A byte is one piece of data, and inevitably will be too small to be of any interest with relation to calculations of video sizes. Most image file sizes will be quoted in kilobytes (KB) which is equal to 1000 bytes. A megabyte (MB) is 1000 kilobytes, or 1,000,000 bytes, and a gigabyte (GB) is 1000 MB. It will not be long before DVRs appear offering terabytes (TB) of storage, a TB being 1000 GB. The common factor here is that the multiple is 1000* *The above numbers are shown in decimal (Base 10). In Binary (Base 2), one kilobyte (1KB) is equal to 1,024 bytes and that number should also be used when performing binary calculations.

3 Currently most archiving of footage for generalpurpose CCTV solutions will be CD-Rs. There are two main reasons for this. Firstly the drives and media costs are low. Secondly, there is a requirement for evidential video to be written to WORM (Write Once, Read Many) media. Therefore it is worth considering how much video can be archived onto CD. Remember that evidential footage will need to be accompanied by replay software, plus other documentation, so this will use up some capacity! Calculating how much footage a CD-R (or any digital media) can contain is a simple task. You need to know: The capacity of the media The average image file size of the recorded footage The frame rate at which it is recorded. Fujifilm CD-Rs have a current capacity of 700MB. To make things simpler, convert this figure to KB, as the image file sizes are quoted as such. Therefore 700MB is equivalent to 700,000 KB. To calculate this figure, simply multiply the size in MB by To calculate from GB, multiply the size in GB by 1000 to achieve MB then again by 1000 to achieve the figure in kilobytes (KB). The following example shows how we calculated a 700MB CD-R would contain just over 1 hour 4 minutes of footage. In this example, with image quality equivalent to S-VHS performance, average image file sizes are 18KB. For the purposes of this explanation it can be assumed that the recording rate is 10 pictures per second (PPS). Divide the capacity in KB by the average image size, and this will give the number of images that can be supported. In this case a CD will hold 38,888 pictures. If this figure is divided by 10 (the record rate of 10pps), it gives the number of seconds that can be stored. Simply divide by 60 again to get the number of minutes that can be stored. JPEG COMPRESSION, 10pps, STANDARD RESOLUTION 700MB x 1000 = 700,000KB 18KB (file size) = 38,888 (images) 10 (pps) 60 (seconds) =64.8 minutes. However taking an average of 40KB as the file size, perhaps a recording in the highest resolution mode, and recording in real-time (25 pictures per second) a CD would contain only 11.6 minutes. JPEG COMPRESSION, 25pps, HIGH RESOLUTION 700MB x 1000 = 700,000KB 40KB (file size) = 175,00 (images) 25 (pps) 60 (seconds) = 11.6 minutes The following calculation can be used to ascertain how much footage can be stored on any media: Media Capacity in MB x 1000 (or Media Capacity in GB x 1000 x 1000) File Size in KB = image capacity PPS rate 60 (to calculate minutes 60 again to calculate hours) It is vital that installers and users understand the potential of archiving media when specifying a solution. It is also useful to note there is an element of specmanship, with some providers quoting figures for the lowest possible resolutions at very slow frame rates. However most users and installers prefer standard or high resolution images and should calculate accordingly. 4. I have chosen the media I wish to use, now how do I deal with using digital images as evidence? W hen it comes to the criteria of using video images as evidence, the requirements can appear to be something of a minefield. Add the use of digital images to the equation, and question marks start to appear with regularity. Quite often, depending upon whom you are talking to, you will hear a different version of the so-called digital dilemma when it comes to using CCTV footage for evidential purposes.

4 However the police and courts are aware of the potential offered by digital surveillance solutions, and do not want to curtail the use of a credible and efficient tool in the fight against crime. The Police and Scientific Development Branch have published guidelines for the use of digital images as evidence. The guidelines do not specify which compression algorithm or archiving media should be used instead taking the view that final quality and a credible audit trail are more important. An audit trial for digital CCTV is very much the same as one for an analogue system. However, with digital systems the audit trail must also keep records of which copy is designated as a Master Copy and which is a Working Copy. Here we outline the steps to ensuring your evidence is admissible: STEP 1 Obtain the relevant authority to capture images CCTV systems must obtain, where necessary, the relevant authority to capture images. They should be regularly maintained and an audit trail commenced at the earliest opportunity. STEP 2: Create a Master Copy Because digital images can be replicated without degradation, and due to the fact that the first storage medium is usually an integral part of the DVR, a Master Copy needs to be created. It needs to be stored securely and kept in accordance with evidential procedures. It should be taken directly from the original recording medium and stored onto a removable medium. This removable medium must be a WORM type device. WORM (Write Once, Read Many) devices such as CD-R, DVD-R and DVD+R media add a level of credibility to digital images as once the Master Copy is written the data cannot be affected and changes cannot be made. STEP 3 Create a Working Copy A Working Copy, again on WORM media, can be produced simultaneously with the Master Copy or subsequent to the Master Copy from the original footage, or can be produced directly from the Master Copy. STEP 4 Make sure your Master and Working copies are clearly labelled and include; The relevant image sequences A text file stating any hardware or software requirements for replay Metadata such as time and date information bound to the footage License-free software to view and make copies of the footage, including editable sequences Instructions on how to copy the footage to VHS cassette plus details of any changes that may occur if the cassette is then played alongside the digital footage. You may also include (though this is not a requirement) a copy of the audit trail, a test sequence to ensure replay is correct, and authentication or verification software*. *The DVR manufacturer should supply this. 5. Now I know how to deal with digital evidence, do I also need to ensure that I comply with the Data Protection Act? T he Data Protection Act came into force on 1 March While this legislation has in no way prevented the use of CCTV in a security context, it has placed certain restrictions on its use and the way in which the evidence gathered by this method is handled. Not all CCTV systems are covered by the Data Protection Act. Whether your system is covered by the Data Protection Act depends upon how the system is used.

5 By way of an example, small retailers would not be covered by the Act if their store contained a couple of cameras which could not be remotely controlled to allow individuals to be tracked around the premises, and if the only data stored were the images picked up by the cameras. Furthermore, the footage should only be used for evidential purposes, to be passed to the police if investigating an incident in the shop. If additional data such as Point of Sale information including operator details, method of payment etc. were included, the Act may well apply. If a retailer uses the system to view members of staff to appraise their level of work, the situation changes. In such a case the individual worker becomes the focus of the information gathering, and the video footage gives the management significant information about that individual. In such a case the system will be covered by the Act. There are three main considerations when assessing whether a system will need to be compliant with the Data Protection Act. However, if the cameras are used to generally offer security in the environment and subsequently catch a crime in progress, this is not for the user s own business purposes- although stopping theft is obviously in their own interest! When CCTV systems are more complex, the chances of a system being covered by the Act increase, as such systems will usually have the ability to focus on individuals or examine, in detail, scenes, which identify individuals by behavioural activity. However, where general surveillance is captured by such systems, that footage will not be covered by the Act. If a system is not covered by the Data Protection Act, it is sill vital that correct evidential procedures are followed to ensure captured footage is admissible. Should the system be covered by the Act, system owners are required to formally notify the Office of the Information Commissioner that they are processing data. Are the cameras operated remotely to pan, tilt or zoom in and out to track or look at specific individuals? Are the CCTV images ever used to observe someone s behaviour for the user s own business purposes, such as assessing the performance of staff members? Are CCTV images ever passed to a third party other than a law enforcement agency such as the police? If the answer to all three of these points is NO then the system may not fall within the scope of the Data Protection Act. When considering the second point, you must be careful to fully understand what is meant by the users own business purposes. For example, if a retailer uses a system to watch staff behaviour to assess whether they are doing a good job, it is for their own business purposes. 6. What are the Data Protection Act rules? T he processing of that data must comply with the eight fundamental and enforceable principles of good practice, which state that data must be: Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive Accurate Not kept longer than necessary Processed in accordance with the data subject s rights Secure and confidential Not transferred to countries without adequate protection.

6 So how do these principles relate to the way in which CCTV systems are used day-to-day and what should operators do.. Well, the first step is that those operating a CCTV system that falls under the Act must provide a clearly-stated document of the objectives for using it and a statement of the responsibilities of those involved in operating and managing the system. Those who are being filmed must also be made aware that they are entering an area where CCTV is active. This warning is usually achieved by signage, which should also include details of the purpose of the scheme, the operators and their contact details. If correct signage is not in place, then the scheme will be considered covert. Covert recording may only take place if: informing people that recording is taking place will compromise your objectives; you have reasonable cause to suspect specific criminal activity and the covert processing is only carried out for a limited and reasonable period of time. Under the Data Protection Act, individuals who have been recorded can request a copy of any recording that has been made of them. Access may only be denied where such an action would compromise the detection or prevention of crime, or where it may impede the apprehension or prosecution of offenders. If the operator cannot comply with such a request without disclosing identifiable images of third parties, they must determine whether the images of these parties are held under a duty of confidence, in which case the images should be edited to disguise these identities. Privacy is also a major issue to consider. Cameras should only be set to view images that were intended for the objectives of the scheme. If this is not possible without viewing domestic or other areas, which would reasonably be considered private, the owners of these areas must be consulted. If there are any doubts in this respect, it would be prudent to obscure the view such cameras have of private areas. Confidentiality is also a major issue as far as the DPA is concerned, indeed it is one of the most important, having far-reaching effects on areas such as traceability, security and accountability. All images recorded are considered confidential and, to ensure this confidentiality, the Act requires that it should be possible to trace any recorded image to a specific date, time, recording device, recording medium and individual. Copies of evidential images are only admissible provided that there is a clear audit trail to the original. On removing the medium for use in legal proceedings, the operator should ensure that they have documented: The date on which the images were removed from the general system for use in legal proceedings The reason why they were removed from the system Any crime incident number to which the images may be relevant The location of the images e.g. If they were handed to a police officer, the name and station of that police officer; The signature of the collecting police officer The DPA requires that information not be kept any longer than necessary. When using digital based systems, the DVR can often be set to record over images after a certain period of time. The fact that the Act insists on the confidentiality of recorded images means that the recording equipment and the images themselves must be kept secure. One of the best ways of ensuring this is by using secure cabinets. Should the images on the recording medium be retained for evidential purposes, they should be kept in a place in which access is controlled. As far as possible, it should not be possible to interfere with the recording equipment and access should be restricted to maintenance staff and operators.

7 Also crucial to the use of data as evidence is the quality of the CCTV images themselves. To ensure that this is the case, initial checks should take place to ensure the equipment performs properly and the media produces good quality images. Cameras should be properly maintained and serviced. Also, if the system records features such as date, time or location, this information needs to be accurate. 7. The Fujifilm Digital Evidence Kit The solution in the bag T here is a lot to consider with regards to using digital evidence and complying with the Data Protection Act but help is at hand, via Fujifilm s Digital Evidence Kit. The Digital Evidence Kit was designed to bring total peace of mind to users of CCTV and Security recording devices by helping them with their responsibilities in correctly auditing all recordings, and presenting digital material in a form that is admissible as evidence in a court of law. The Digital Evidence Kit contains everything you need to present digital evidence to the authorities. The number of CD Master Copies and Working Copies or DVD format options included depends on requirements but the Standard Kit contains: 50 Fujifilm CD-Rs (two spindles) 25 standard jewel cases 25 slimline jewel cases The Fujifilm Digital Evidence Kit comes in a two-disc CD set allowing for creation of a Master Copy and a Working Copy; and a three-disc Kit that allows the creation of two Working Copies alongside an original Master Copy. A further set is available for those requiring DVD-R or DVD+R media. Fujifilm media has been designed for a longarchival life, ensuring that your evidence stands the test of time. The 25 standard jewel cases and 25 slimline jewel cases have been developed so that the user can decide which type of cases to standardise upon, passing the other - containing a Working Copy - to the relevant authorities. Where a three-spindle kit is used, the cases are supplemented with 25 plastic sleeves. The benefit of slimline cases is that the space required for CD storage is dramatically reduced. Probably the two most important additions are the Digital Evidence Logbook, and the CPS approved Evidence Bags. Fujifilm s CPS approved Evidence Bags feature an easy to use closure seal that provides tamper-evident security against all known methods of attack. Once sealed, any attempts to open the bag will result in the word STOP appearing in white on the orange background. Whilst this clearly identifies tamper attempts, independent testing showed users could not start opening the sealed bag without making it obvious that an attempt had been made. Once evidence is placed in the bag, any attempts to remove it are going to be detected! Logbook to keep audit trails in check with uniquely numbered sheets CPS-approved Tamper Evident evidence bags Procedural Guide CD friendly marker pen (for labelling)

8 Each bag is marked with a unique number, ensuring traceability and enabling accurate pinpointing of breaches in security. Each evidence bag includes a tear-off receipt at the bottom, which has the unique number of the bag printed onto it and sufficient space to allow for the recipient s details to be recorded. The bag is over-printed with a log of all activity from when a CD-R is sealed in until such a time as a copy is called for evidence. A permanent marker pen is included so CDs can be marked with a unique number from the evidence logbook. This is important as labels can affect the balance of CDs during writing and reading, adversely affecting performance and reliability. Following research which highlighted the fact that many users are unaware of how to present digital footage as evidence, a leaflet has been enclosed explaining the basic requirements of how to present digital CCTV footage as evidence along with a handy guide to CCTV. The Evidence Bags allow CDs to be tracked and audited throughout the entire storage and handling process ensuring the admissibility of the footage in court. Each kit contains 25 Evidence Bags providing an audit trail (and proof no tampering has occurred) for each Master Copy. As mentioned earlier, the Data Protection Act requires that it be possible to trace any recorded images to a specific date, time, recording device, recording medium and operator. The Digital Evidence Logbook was developed to enable users to comply with this requirement by creating an audit trail, with its pages designed to fit inside a standard CD case, which are easily detachable for when copies of footage are made. The complete audit trail in a box, the kit makes life a whole lot easier for installers and users alike offering all the tools necessary to ensure that every stage of the evidence gathering process is accurately performed in the eyes of the Law. A copy of each Logbook sheet can be inserted in the case. One with the Master Copy, one with the Working Copy and one retained in the book for management purposes. Each logbook sheet is colour-coded and designed to ensure that a record of the CD-Rdetails; audit information and the evidence bag number are all logged. The evidence log sheets each contain a unique number, which removes the need for users to manage their own numbering systems.

Cambridge City Council s. Guide for. Commercial User of CCTV in Small Businesses

Cambridge City Council s. Guide for. Commercial User of CCTV in Small Businesses Cambridge City Council s Guide for Commercial User of CCTV in Small Businesses March 2011 1 CONTENTS Section Description Page number 1 Introduction 2 2 Do you Need CCTV? 2 3 Other Considerations 3 4 What

More information

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL CCTV User Group GUIDE FOR SMALL USERS PRIVATE and COMMERCIAL 1 CONTENTS Section Number Description Page number 1. Introduction 3 2. Human Rights Act and its implications for you 3 3. Data Protection and

More information

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles

More information

How To Store Data On A Computer (For A Computer)

How To Store Data On A Computer (For A Computer) TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or

More information

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent

More information

SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE

SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten

More information

CCTV CODE OF PRACTICE

CCTV CODE OF PRACTICE CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,

More information

PRODUCING DV VIDEO WITH PREMIERE & QUICKTIME

PRODUCING DV VIDEO WITH PREMIERE & QUICKTIME This article contains guidelines and advice on producing DV video for the screen using a DV camcorder, Adobe Premiere and QuickTime. PRODUCING DV VIDEO WITH PREMIERE & QUICKTIME PRODUCING DV VIDEO WITH

More information

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012 UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one

More information

Policy for Management of CCTV on Waste Operation Vehicles

Policy for Management of CCTV on Waste Operation Vehicles Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for

More information

Policing requirements for Closed Circuit Television

Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems

More information

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:

More information

Parliamentary Security Camera Policy

Parliamentary Security Camera Policy Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system

More information

Security. Deployment Protocol for BWC s (Appendix H)

Security. Deployment Protocol for BWC s (Appendix H) (Appendix H) Ref: 1012 Rev: Author: Approver: Date: 24/08/12 Introduction North East Lincolnshire Partnership Car Parks Department owns 18 Body Worn cameras, hereinafter referred to as BWCs. This document

More information

The legal admissibility of information stored on electronic document management systems

The legal admissibility of information stored on electronic document management systems Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

Managing Closed Circuit Television (CCTV) Records

Managing Closed Circuit Television (CCTV) Records Queensland State Archives Managing Closed Circuit Television (CCTV) Records Guideline for Queensland Public Authorities October 2010 Document details Security Classification PUBLIC Date of review of security

More information

University of Essex Automatic Number Plate Recognition (ANPR) Policy

University of Essex Automatic Number Plate Recognition (ANPR) Policy & Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies

More information

Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places

Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication

More information

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

In the two following sections we separately consider hardware and software requirements. Sometimes, they will be offered for sale as a package.

In the two following sections we separately consider hardware and software requirements. Sometimes, they will be offered for sale as a package. Appendix A COMPUTER HARDWARE AND SOFTWARE In this appendix we discuss some of the issues in choosing hardware and software for image analysis. The purpose is to draw attention to the issues involved rather

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

Upgrade from Sage Instant Accounts v15

Upgrade from Sage Instant Accounts v15 Upgrade from Sage Instant Accounts v15 Sage Instant Accounts 2014 is the market-leading software that puts you in control of your cashflow. Whether you re dealing with quotes and invoices, customers or

More information

Records Management Plan. April 2015

Records Management Plan. April 2015 Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised

More information

Data Protection Guidance

Data Protection Guidance 53 September 2010 Management Circular No. 53 Glasgow City Council Education Services Wheatley House 25 Cochrane Street Merchant City GLASGOW G1 1HL To Heads of all Educational Establishments Data Protection

More information

CCTV PROCEDURES To support Information Security Policy Framework

CCTV PROCEDURES To support Information Security Policy Framework CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

Human Resources and Data Protection

Human Resources and Data Protection Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council

More information

Information Security Policy. Appendix B. Secure Transfer of Information

Information Security Policy. Appendix B. Secure Transfer of Information Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document

More information

Understanding Compression Technologies for HD and Megapixel Surveillance

Understanding Compression Technologies for HD and Megapixel Surveillance When the security industry began the transition from using VHS tapes to hard disks for video surveillance storage, the question of how to compress and store video became a top consideration for video surveillance

More information

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street

More information

Camera Use. Policy Statement and Purpose. Table of Contents

Camera Use. Policy Statement and Purpose. Table of Contents Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing

More information

Merton Parking Service CCTV Enforcement Manual

Merton Parking Service CCTV Enforcement Manual Merton Parking Service CCTV Enforcement Manual Version 1.3 April 2013 Introduction Legislation Data protection Health & Safety CCCTV camera equipment Mobile CCTV vehicles CCTV control room CCTV evidence

More information

Hybrid Storage: Hard Disk and Blu-ray. Law Enforcement s Answer to Reliable Digital Asset Management

Hybrid Storage: Hard Disk and Blu-ray. Law Enforcement s Answer to Reliable Digital Asset Management Hybrid Storage: Hard Disk and Blu-ray Law Enforcement s Answer to Reliable Digital Asset Management January 16, 2012 Introduction It can be difficult for Law Enforcement and related organizations to keep

More information

INFORMATION SECURITY INCIDENT REPORTING POLICY

INFORMATION SECURITY INCIDENT REPORTING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of

More information

Council CCTV Surveillance System Data Protection Act, 1998

Council CCTV Surveillance System Data Protection Act, 1998 Council CCTV Surveillance System Data Protection Act, 1998 How to Apply for Access to Information held on the CCTV System These notes explain how you find out what information, if any is held about you

More information

MODESTO CITY SCHOOLS Administrative Regulation

MODESTO CITY SCHOOLS Administrative Regulation MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

DynaGuard 200 Series. Compact and Versatile MPEG-4. Ver. 1.1

DynaGuard 200 Series. Compact and Versatile MPEG-4. Ver. 1.1 DynaGuard 200 Series Compact and Versatile MPEG-4 Ver. 1.1 An Introduction to the DynaGuard 200 Series MPEG-4 Digital Video Recorder for Small to Medium Applications What is a DynaGuard TM 200? Combined

More information

Photography and filming in schools Code of Practice

Photography and filming in schools Code of Practice Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit

More information

Data Protection Policy

Data Protection Policy Data Protection Policy 1. INTRODUCTION 1.1. The Data Protection Act gives you as an individual the right to know what information is held about you. It provides a framework to ensure that personal information

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

Data Protection Policy

Data Protection Policy Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and

More information

Manage Video Clutter and Organize Your Digital Library

Manage Video Clutter and Organize Your Digital Library Learn How To... Manage Video Clutter and Organize Your Digital Library This e-book will help in maintaining your video collection and preserving your family's memories. Table Of Contents INTRODUCTION...1

More information

WORKPLACE SAFETY KIT A STEP BY STEP GUIDE TO SAFETY FOR BUSINESS GUIDE 2001. WorkCover NSW Health and Safety Guide. WorkCover. Watching out for you.

WORKPLACE SAFETY KIT A STEP BY STEP GUIDE TO SAFETY FOR BUSINESS GUIDE 2001. WorkCover NSW Health and Safety Guide. WorkCover. Watching out for you. WORKPLACE SAFETY KIT A STEP BY STEP GUIDE TO SAFETY FOR BUSINESS GUIDE 2001 WorkCover NSW Health and Safety Guide WorkCover. Watching out for you. Table of Contents Table of Content: How to Use the Workplace

More information

Computer Logic (2.2.3)

Computer Logic (2.2.3) Computer Logic (2.2.3) Distinction between analogue and discrete processes and quantities. Conversion of analogue quantities to digital form. Using sampling techniques, use of 2-state electronic devices

More information

Western Australia Legislation for Video Surveillance Devices

Western Australia Legislation for Video Surveillance Devices Western Australia Legislation for Video Surveillance Devices This document is an analysis of the Western Australia Surveillance Devices Act 1998; its purpose is to highlight some widely held misconceptions

More information

Chapter 8 Memory Units

Chapter 8 Memory Units Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical

More information

A&H Software House Inc. Web: www.luxriot.com Email: sales@luxriot.com. Luxriot

A&H Software House Inc. Web: www.luxriot.com Email: sales@luxriot.com. Luxriot A&H Software House Inc. Web: www.luxriot.com Email: sales@luxriot.com Luxriot Luxriot Product Features Luxriot is equipped with Unique, Advanced and Industry Standard Surveillance Features: Luxriot is

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

CCTV Cameras Policy. Policy Guidelines

CCTV Cameras Policy. Policy Guidelines CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes

More information

Backup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v.

Backup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v. Backup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v. Existing backup methods Most companies see an explosive growth in the amount of data that they have

More information

Choosing a computer for ANY-maze

Choosing a computer for ANY-maze Choosing a computer for ANY-maze ANY-maze www.anymaze.com Choosing a computer for ANY-maze 1 Introduction... 3 2 Overview... 3 3 Recommended and minimum specifications at a glance... 3 3.1 Recommended

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

Welcome to Northern Lights A film about Scotland made by you.

Welcome to Northern Lights A film about Scotland made by you. Welcome to Northern Lights A film about Scotland made by you. As part of the Year Of Creative Scotland 2012 we want you to take out a camera and show us what you can see. We are not sure what you will

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages

More information

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information

Peace of Mind Through Surveillance: Affordable Solutions for Home and SMB

Peace of Mind Through Surveillance: Affordable Solutions for Home and SMB 1 A NEW NAS Experience a white paper Peace of Mind Through Surveillance: Affordable Solutions for Home and SMB August 2009 Table of Contents 2 Introduction 3 What is NAS? 3 Surveillance Station Features

More information

Tech Application Chapter 3 STUDY GUIDE

Tech Application Chapter 3 STUDY GUIDE Name: Class: Date: Tech Application Chapter 3 STUDY GUIDE Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. This type of device retains data

More information

Scope and Explanation

Scope and Explanation The Moray Council Retention & Disposal Schedule for documents and records [paper and electronic] Scope and Explanation 1 Document Control Sheet Name of Document: The Moray Council Records Retention Schedule

More information

Safeguarding Data Storage for Video Surveillance and Security

Safeguarding Data Storage for Video Surveillance and Security Safeguarding Data Storage for Video Surveillance and Security 2005 Infortrend Corporation. All rights reserved. Table of Contents Overview... 3 Executive Summary... 3 Traditional Storage... 3 Advanced

More information

The benefits need to be seen to be believed!

The benefits need to be seen to be believed! The benefits need to be seen to be believed! Resolutions Summary The Wow Factor Benefits of HD Security and more Applications Key Features - Size matters! Tackling large file sizes Other features Viewing

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

hp pavilion home pc hp dvd writer

hp pavilion home pc hp dvd writer hp pavilion home pc hp dvd writer The information in this document is subject to change without notice. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but

More information

Effective complaint handling

Effective complaint handling This guide sets out key information for state sector agencies about developing and operating an effective complaints process. It also provides information about the Ombudsman s role, as an independent,

More information

Referral fees, referral arrangements and fee sharing

Referral fees, referral arrangements and fee sharing Referral fees, referral arrangements and fee sharing This response to the consultation is prepared by Carter Law LLP. Our experience spans the RTA/PI sector and as such, any criminal advocacy questions

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

Digital Preservation. Guidance Note: Care, Handling and Storage of Removable media

Digital Preservation. Guidance Note: Care, Handling and Storage of Removable media Digital Preservation 3 Guidance Note: Care, Handling and Storage of Removable media Document Control Author: Adrian Brown, Head of Digital Preservation Research Document Reference: DPGN-03 Issue: 2 Issue

More information

A guide to access control for offices

A guide to access control for offices A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY Reference number RM001 Approved by Information Management and Technology Board Date approved 23 rd November 2012 Version 1.1 Last revised July 2013 Review date May 2015 Category Records Management Owner

More information

Video Surveillance Buyer's Guide By the purchasing experts at BuyerZone

Video Surveillance Buyer's Guide By the purchasing experts at BuyerZone Introduction From a single camera and monitor to complex video surveillance systems with hundreds of cameras, multiple operators, and digital recorders, closed circuit television (CCTV) systems can provide

More information

Digital Security Surveillance. Reference Guide. Security you can rely on.

Digital Security Surveillance. Reference Guide. Security you can rely on. Digital Security Surveillance Reference Guide Security you can rely on. 03 Contents The security industry goes digital 4 Digital products selection table 6 Digital video recorder 8 Eazeo general application

More information

Introduction to Final Cut Pro 7 - Editing Basics

Introduction to Final Cut Pro 7 - Editing Basics Workshop Objectives Become familiar with the Final Cut Pro workspace, basic editing, capturing footage, using tools, exporting to tape, or QuickTime. Learn effective workflow and file management strategies.

More information

hp pavilion home pc hp dvd writer

hp pavilion home pc hp dvd writer hp pavilion home pc hp dvd writer The information in this document is subject to change without notice. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but

More information

Kentucky Department for Libraries and Archives Public Records Division

Kentucky Department for Libraries and Archives Public Records Division Introduction Kentucky Department for Libraries and Archives Public Records Division Ensuring Long-term Accessibility and Usability of Textual Records Stored as Digital Images: Guidelines for State and

More information

CCTV Digital Video Recorder (DVR) FAQ from the Rockpile Security Buyer s Guide

CCTV Digital Video Recorder (DVR) FAQ from the Rockpile Security Buyer s Guide WHITE PAPER CCTV Digital Video Recorder (DVR) FAQ from the Rockpile Security Buyer s Guide I - Frequently Asked Questions The following are some of the questions we are commonly asked regarding digital

More information

AUDITOR GUIDELINES. Responsibilities Supporting Inputs. Receive AAA, Sign and return to IMS with audit report. Document Review required?

AUDITOR GUIDELINES. Responsibilities Supporting Inputs. Receive AAA, Sign and return to IMS with audit report. Document Review required? 1 Overview of Audit Process The flow chart below shows the overall process for auditors carrying out audits for IMS International. Stages within this process are detailed further in this document. Scheme

More information

Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930

Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Security Classification: NOT PROTECTIVELY MARKED Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Association of Chief

More information

Title of the Policy: Surveillance Policy

Title of the Policy: Surveillance Policy Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:

More information

Established in 2005, Safewatch Security Systems are a security system integration company.

Established in 2005, Safewatch Security Systems are a security system integration company. Established in 2005, Safewatch Security Systems are a security system integration company. The director of the company Joe Lawlor, has more than 14 years experience in designing and installing security

More information

Video surveillance policy (PUBLIC)

Video surveillance policy (PUBLIC) 29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Securing safe, clean drinking water for all

Securing safe, clean drinking water for all Securing safe, clean drinking water for all Enforcement policy Introduction The Drinking Water Inspectorate (DWI) is the independent regulator of drinking water in England and Wales set up in 1990 by Parliament

More information

OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS

OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS February 13, 2013 TABLE OF CONTENTS Page Introduction... 1 Applicability of Guidelines... 2 ATIPPA... 3 Definitions... 5 Collection

More information

DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS

DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS STATEMENT OF PURPOSE The Delaware Public Archives (DPA) has issued "Model Guidelines for Electronic Records"

More information

SELECTING THE CCTV SECURITY SYSTEM THAT IS RIGHT FOR YOU

SELECTING THE CCTV SECURITY SYSTEM THAT IS RIGHT FOR YOU SELECTING THE CCTV SECURITY SYSTEM THAT IS RIGHT FOR YOU When buying a security camera or complete CCTV system you need to consider the main purpose of the system. For example, is it to be used for: Observation

More information

New DS2 Operation Training. Reference Notes

New DS2 Operation Training. Reference Notes New DS2 Operation Training Reference Notes 2 DS2PD Operation Training Notes Issue 4.5 (064) Contents Contents... 3 Introduction... 4 Improvements to the User Interface... 4 Keyboard Layout... 4 On-Screen

More information

CLOSED CIRCUIT TELEVISION

CLOSED CIRCUIT TELEVISION CLOSED CIRCUIT TELEVISION South Australia Police A GUIDE FOR BUSINESS 01 02 03 04 Foreword Introduction Establishing CCTV objectives Monitoring CCTV images 06 07 08 CCTV recording systems Frame rate Archive

More information

Crime Prevention through Environmental Design (CPTED) - Checklist

Crime Prevention through Environmental Design (CPTED) - Checklist Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the

More information

Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015

Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 1. Introduction and Scope 1.1 The Data Protection Act 1998 is the law that protects personal privacy and applies to any school

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction The Data Protection Act 1998 gives individuals the right to know what personal information is held about them. It provides a framework to ensure that the Office of the

More information