CCTV systems have evolved in recent years
|
|
- Frank Hicks
- 7 years ago
- Views:
Transcription
1 Fujifilm s Digital CCTV and Security Guide 1. What digital media should I use? 2. How much footage can I store on the media I use? 3. How do I calculate how much data can fit onto my media? 4. How do I deal with using digital images as evidence? 5. Do I need to meet the Data Protection Act requirements? 6. How do I ensure I am compliant with the Data Protection Act? 7. The Fujifilm Digital Evidence Kit- The solution in the bag. 1. What digital media should I use? CCTV systems have evolved in recent years with digital technology establishing itself as an emerging part of future surveillance solutions. With digital technology, the very way in which it stores data allows a wider variety of recording media to be employed, so which one should be used? The real deciding factor is not so much what you want to do with the recordings but how much footage you need to store and what you intend to do with any footage which may need to be transferred to another party. Based predominantly around hard drive integral storage, digital solutions will usually store their data in a buffer. This data, including video, audio and other information, will then either be overwritten when the hard disk is filled, or removed to another storage media and securely archived. Digital archiving is constantly increasing in capacity, predominantly due to archiving media being used and supported by the IT industry. The most basic digital archiving media is the Compact Disc. The CD has become well known and widely used over the years, and is useful for storing data capacities of up to 700MB. CDs come in two variants, the CD-R which is a WORM type media, (Write Once, Read Many) and the CD-RW which can be rewritten. Where capacities in excess of 700MB are common, users and installers are likely to make use of the constantly developing DVD capacities. DVD capacities currently dwarf those achievable with CDs, and future developments will see these figures rise dramatically. Indeed, the next proposed generation of DVDs will far exceed the current capacities! There are other digital storage formats including various digital tapes, which offer fault-free operation and high speed data transfers, and data storage technology such as 4mm, DLT, and LTO Ultrium data tapes, offering higher storage capacities and faster data transfer speeds. 2. How much footage can I store on the media I use? W hilst it is fairly straightforward how much footage can be stored on analogue media, digital media is more complex. Digital image sizes are governed by how much data they are made up of. One image captured off a specific camera could vary in size when compared to another according to a number of criteria. There are no hard and fast rules when it comes to file sizes and here we will explain why size, whilst being important, is unlikely to be constant! Digital image file sizes can vary according to the information contained. This differs from analogue where a VHS cassette will store 25 frames per second for the entire 180 minutes it is recording. It matters not if the video is of a busy street, an empty car park or a white wall.
2 The image quality can be pin-sharp or so low that it is unusable, but you still will record 25 frames per second for 180 minutes in real-time mode. Digital images however are databased in that each pixel in the image contains colour information. It might initially seem that as all images captured by a system are the same resolution, they will be the same size, but they are not. This is because image compression algorithms will convert the data in order to eliminate as much redundant information as possible. Where there are large areas of continual tone, some image compression algorithms will calculate the number and positions of the pixels and store that data rather than from each individual pixel. Others will take an average value from a group of pixels, and will rebuild the image using grouped averages. Subsequently, an image of an empty car park with a white wall on one side might take up little space, because image compression can use a small amount of data to create certain areas of the image. However when the same car park is filled with cars of different shapes and colours, and with a certain amount of activity, the size of each image, in relation to the data it contains will rise significantly, and less footage can be archived in any given memory. Environmental factors can also affect image file sizes. For example, a frame of video showing an external scene on a clear sunny day will be smaller than the same scene on a rainy day. This is simply because the rain will be constantly changing, and will break up any continuous areas of tone, with the result that compression will be less effective. The size of files is affected by the quality of the video (lower resolutions use bigger pixels, equating to less data), the image compression algorithm and ratio used, the image contents, noise in the picture and environmental conditions. So how much data can you fit on digital media such as a CD? There is no definitive answer. Despite some manufacturers quoting how many hours will fit on a drive, there are too many variables to provide an accurate answer. We understand this is not very useful for users and installers alike trying to decide which media to use. By understanding image file sizes from some market-leading DVR recorders and considering how much footage specific media are able to contain, we hope to give you a greater understanding. Issues affecting file sizes and how much footage you can store Busy scenes take up more space Colourful scenes take up more space A lot of movement such as rain or other activity takes up more space Redundant or repeated data take up less space as they can be compressed A low resolution and a low compression ratio can make an image much smaller 3. How do I calculate how much data can fit on my media? B efore we look at image file sizes, we need to understand how files are measured. This information is necessary to carry out any accurate calculations. Digital files are made up of bytes of information. Where bytes are being specified the abbreviation is B. Where you see a b being used it is referring to bits, often used when measuring data transfer speeds. A byte is one piece of data, and inevitably will be too small to be of any interest with relation to calculations of video sizes. Most image file sizes will be quoted in kilobytes (KB) which is equal to 1000 bytes. A megabyte (MB) is 1000 kilobytes, or 1,000,000 bytes, and a gigabyte (GB) is 1000 MB. It will not be long before DVRs appear offering terabytes (TB) of storage, a TB being 1000 GB. The common factor here is that the multiple is 1000* *The above numbers are shown in decimal (Base 10). In Binary (Base 2), one kilobyte (1KB) is equal to 1,024 bytes and that number should also be used when performing binary calculations.
3 Currently most archiving of footage for generalpurpose CCTV solutions will be CD-Rs. There are two main reasons for this. Firstly the drives and media costs are low. Secondly, there is a requirement for evidential video to be written to WORM (Write Once, Read Many) media. Therefore it is worth considering how much video can be archived onto CD. Remember that evidential footage will need to be accompanied by replay software, plus other documentation, so this will use up some capacity! Calculating how much footage a CD-R (or any digital media) can contain is a simple task. You need to know: The capacity of the media The average image file size of the recorded footage The frame rate at which it is recorded. Fujifilm CD-Rs have a current capacity of 700MB. To make things simpler, convert this figure to KB, as the image file sizes are quoted as such. Therefore 700MB is equivalent to 700,000 KB. To calculate this figure, simply multiply the size in MB by To calculate from GB, multiply the size in GB by 1000 to achieve MB then again by 1000 to achieve the figure in kilobytes (KB). The following example shows how we calculated a 700MB CD-R would contain just over 1 hour 4 minutes of footage. In this example, with image quality equivalent to S-VHS performance, average image file sizes are 18KB. For the purposes of this explanation it can be assumed that the recording rate is 10 pictures per second (PPS). Divide the capacity in KB by the average image size, and this will give the number of images that can be supported. In this case a CD will hold 38,888 pictures. If this figure is divided by 10 (the record rate of 10pps), it gives the number of seconds that can be stored. Simply divide by 60 again to get the number of minutes that can be stored. JPEG COMPRESSION, 10pps, STANDARD RESOLUTION 700MB x 1000 = 700,000KB 18KB (file size) = 38,888 (images) 10 (pps) 60 (seconds) =64.8 minutes. However taking an average of 40KB as the file size, perhaps a recording in the highest resolution mode, and recording in real-time (25 pictures per second) a CD would contain only 11.6 minutes. JPEG COMPRESSION, 25pps, HIGH RESOLUTION 700MB x 1000 = 700,000KB 40KB (file size) = 175,00 (images) 25 (pps) 60 (seconds) = 11.6 minutes The following calculation can be used to ascertain how much footage can be stored on any media: Media Capacity in MB x 1000 (or Media Capacity in GB x 1000 x 1000) File Size in KB = image capacity PPS rate 60 (to calculate minutes 60 again to calculate hours) It is vital that installers and users understand the potential of archiving media when specifying a solution. It is also useful to note there is an element of specmanship, with some providers quoting figures for the lowest possible resolutions at very slow frame rates. However most users and installers prefer standard or high resolution images and should calculate accordingly. 4. I have chosen the media I wish to use, now how do I deal with using digital images as evidence? W hen it comes to the criteria of using video images as evidence, the requirements can appear to be something of a minefield. Add the use of digital images to the equation, and question marks start to appear with regularity. Quite often, depending upon whom you are talking to, you will hear a different version of the so-called digital dilemma when it comes to using CCTV footage for evidential purposes.
4 However the police and courts are aware of the potential offered by digital surveillance solutions, and do not want to curtail the use of a credible and efficient tool in the fight against crime. The Police and Scientific Development Branch have published guidelines for the use of digital images as evidence. The guidelines do not specify which compression algorithm or archiving media should be used instead taking the view that final quality and a credible audit trail are more important. An audit trial for digital CCTV is very much the same as one for an analogue system. However, with digital systems the audit trail must also keep records of which copy is designated as a Master Copy and which is a Working Copy. Here we outline the steps to ensuring your evidence is admissible: STEP 1 Obtain the relevant authority to capture images CCTV systems must obtain, where necessary, the relevant authority to capture images. They should be regularly maintained and an audit trail commenced at the earliest opportunity. STEP 2: Create a Master Copy Because digital images can be replicated without degradation, and due to the fact that the first storage medium is usually an integral part of the DVR, a Master Copy needs to be created. It needs to be stored securely and kept in accordance with evidential procedures. It should be taken directly from the original recording medium and stored onto a removable medium. This removable medium must be a WORM type device. WORM (Write Once, Read Many) devices such as CD-R, DVD-R and DVD+R media add a level of credibility to digital images as once the Master Copy is written the data cannot be affected and changes cannot be made. STEP 3 Create a Working Copy A Working Copy, again on WORM media, can be produced simultaneously with the Master Copy or subsequent to the Master Copy from the original footage, or can be produced directly from the Master Copy. STEP 4 Make sure your Master and Working copies are clearly labelled and include; The relevant image sequences A text file stating any hardware or software requirements for replay Metadata such as time and date information bound to the footage License-free software to view and make copies of the footage, including editable sequences Instructions on how to copy the footage to VHS cassette plus details of any changes that may occur if the cassette is then played alongside the digital footage. You may also include (though this is not a requirement) a copy of the audit trail, a test sequence to ensure replay is correct, and authentication or verification software*. *The DVR manufacturer should supply this. 5. Now I know how to deal with digital evidence, do I also need to ensure that I comply with the Data Protection Act? T he Data Protection Act came into force on 1 March While this legislation has in no way prevented the use of CCTV in a security context, it has placed certain restrictions on its use and the way in which the evidence gathered by this method is handled. Not all CCTV systems are covered by the Data Protection Act. Whether your system is covered by the Data Protection Act depends upon how the system is used.
5 By way of an example, small retailers would not be covered by the Act if their store contained a couple of cameras which could not be remotely controlled to allow individuals to be tracked around the premises, and if the only data stored were the images picked up by the cameras. Furthermore, the footage should only be used for evidential purposes, to be passed to the police if investigating an incident in the shop. If additional data such as Point of Sale information including operator details, method of payment etc. were included, the Act may well apply. If a retailer uses the system to view members of staff to appraise their level of work, the situation changes. In such a case the individual worker becomes the focus of the information gathering, and the video footage gives the management significant information about that individual. In such a case the system will be covered by the Act. There are three main considerations when assessing whether a system will need to be compliant with the Data Protection Act. However, if the cameras are used to generally offer security in the environment and subsequently catch a crime in progress, this is not for the user s own business purposes- although stopping theft is obviously in their own interest! When CCTV systems are more complex, the chances of a system being covered by the Act increase, as such systems will usually have the ability to focus on individuals or examine, in detail, scenes, which identify individuals by behavioural activity. However, where general surveillance is captured by such systems, that footage will not be covered by the Act. If a system is not covered by the Data Protection Act, it is sill vital that correct evidential procedures are followed to ensure captured footage is admissible. Should the system be covered by the Act, system owners are required to formally notify the Office of the Information Commissioner that they are processing data. Are the cameras operated remotely to pan, tilt or zoom in and out to track or look at specific individuals? Are the CCTV images ever used to observe someone s behaviour for the user s own business purposes, such as assessing the performance of staff members? Are CCTV images ever passed to a third party other than a law enforcement agency such as the police? If the answer to all three of these points is NO then the system may not fall within the scope of the Data Protection Act. When considering the second point, you must be careful to fully understand what is meant by the users own business purposes. For example, if a retailer uses a system to watch staff behaviour to assess whether they are doing a good job, it is for their own business purposes. 6. What are the Data Protection Act rules? T he processing of that data must comply with the eight fundamental and enforceable principles of good practice, which state that data must be: Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive Accurate Not kept longer than necessary Processed in accordance with the data subject s rights Secure and confidential Not transferred to countries without adequate protection.
6 So how do these principles relate to the way in which CCTV systems are used day-to-day and what should operators do.. Well, the first step is that those operating a CCTV system that falls under the Act must provide a clearly-stated document of the objectives for using it and a statement of the responsibilities of those involved in operating and managing the system. Those who are being filmed must also be made aware that they are entering an area where CCTV is active. This warning is usually achieved by signage, which should also include details of the purpose of the scheme, the operators and their contact details. If correct signage is not in place, then the scheme will be considered covert. Covert recording may only take place if: informing people that recording is taking place will compromise your objectives; you have reasonable cause to suspect specific criminal activity and the covert processing is only carried out for a limited and reasonable period of time. Under the Data Protection Act, individuals who have been recorded can request a copy of any recording that has been made of them. Access may only be denied where such an action would compromise the detection or prevention of crime, or where it may impede the apprehension or prosecution of offenders. If the operator cannot comply with such a request without disclosing identifiable images of third parties, they must determine whether the images of these parties are held under a duty of confidence, in which case the images should be edited to disguise these identities. Privacy is also a major issue to consider. Cameras should only be set to view images that were intended for the objectives of the scheme. If this is not possible without viewing domestic or other areas, which would reasonably be considered private, the owners of these areas must be consulted. If there are any doubts in this respect, it would be prudent to obscure the view such cameras have of private areas. Confidentiality is also a major issue as far as the DPA is concerned, indeed it is one of the most important, having far-reaching effects on areas such as traceability, security and accountability. All images recorded are considered confidential and, to ensure this confidentiality, the Act requires that it should be possible to trace any recorded image to a specific date, time, recording device, recording medium and individual. Copies of evidential images are only admissible provided that there is a clear audit trail to the original. On removing the medium for use in legal proceedings, the operator should ensure that they have documented: The date on which the images were removed from the general system for use in legal proceedings The reason why they were removed from the system Any crime incident number to which the images may be relevant The location of the images e.g. If they were handed to a police officer, the name and station of that police officer; The signature of the collecting police officer The DPA requires that information not be kept any longer than necessary. When using digital based systems, the DVR can often be set to record over images after a certain period of time. The fact that the Act insists on the confidentiality of recorded images means that the recording equipment and the images themselves must be kept secure. One of the best ways of ensuring this is by using secure cabinets. Should the images on the recording medium be retained for evidential purposes, they should be kept in a place in which access is controlled. As far as possible, it should not be possible to interfere with the recording equipment and access should be restricted to maintenance staff and operators.
7 Also crucial to the use of data as evidence is the quality of the CCTV images themselves. To ensure that this is the case, initial checks should take place to ensure the equipment performs properly and the media produces good quality images. Cameras should be properly maintained and serviced. Also, if the system records features such as date, time or location, this information needs to be accurate. 7. The Fujifilm Digital Evidence Kit The solution in the bag T here is a lot to consider with regards to using digital evidence and complying with the Data Protection Act but help is at hand, via Fujifilm s Digital Evidence Kit. The Digital Evidence Kit was designed to bring total peace of mind to users of CCTV and Security recording devices by helping them with their responsibilities in correctly auditing all recordings, and presenting digital material in a form that is admissible as evidence in a court of law. The Digital Evidence Kit contains everything you need to present digital evidence to the authorities. The number of CD Master Copies and Working Copies or DVD format options included depends on requirements but the Standard Kit contains: 50 Fujifilm CD-Rs (two spindles) 25 standard jewel cases 25 slimline jewel cases The Fujifilm Digital Evidence Kit comes in a two-disc CD set allowing for creation of a Master Copy and a Working Copy; and a three-disc Kit that allows the creation of two Working Copies alongside an original Master Copy. A further set is available for those requiring DVD-R or DVD+R media. Fujifilm media has been designed for a longarchival life, ensuring that your evidence stands the test of time. The 25 standard jewel cases and 25 slimline jewel cases have been developed so that the user can decide which type of cases to standardise upon, passing the other - containing a Working Copy - to the relevant authorities. Where a three-spindle kit is used, the cases are supplemented with 25 plastic sleeves. The benefit of slimline cases is that the space required for CD storage is dramatically reduced. Probably the two most important additions are the Digital Evidence Logbook, and the CPS approved Evidence Bags. Fujifilm s CPS approved Evidence Bags feature an easy to use closure seal that provides tamper-evident security against all known methods of attack. Once sealed, any attempts to open the bag will result in the word STOP appearing in white on the orange background. Whilst this clearly identifies tamper attempts, independent testing showed users could not start opening the sealed bag without making it obvious that an attempt had been made. Once evidence is placed in the bag, any attempts to remove it are going to be detected! Logbook to keep audit trails in check with uniquely numbered sheets CPS-approved Tamper Evident evidence bags Procedural Guide CD friendly marker pen (for labelling)
8 Each bag is marked with a unique number, ensuring traceability and enabling accurate pinpointing of breaches in security. Each evidence bag includes a tear-off receipt at the bottom, which has the unique number of the bag printed onto it and sufficient space to allow for the recipient s details to be recorded. The bag is over-printed with a log of all activity from when a CD-R is sealed in until such a time as a copy is called for evidence. A permanent marker pen is included so CDs can be marked with a unique number from the evidence logbook. This is important as labels can affect the balance of CDs during writing and reading, adversely affecting performance and reliability. Following research which highlighted the fact that many users are unaware of how to present digital footage as evidence, a leaflet has been enclosed explaining the basic requirements of how to present digital CCTV footage as evidence along with a handy guide to CCTV. The Evidence Bags allow CDs to be tracked and audited throughout the entire storage and handling process ensuring the admissibility of the footage in court. Each kit contains 25 Evidence Bags providing an audit trail (and proof no tampering has occurred) for each Master Copy. As mentioned earlier, the Data Protection Act requires that it be possible to trace any recorded images to a specific date, time, recording device, recording medium and operator. The Digital Evidence Logbook was developed to enable users to comply with this requirement by creating an audit trail, with its pages designed to fit inside a standard CD case, which are easily detachable for when copies of footage are made. The complete audit trail in a box, the kit makes life a whole lot easier for installers and users alike offering all the tools necessary to ensure that every stage of the evidence gathering process is accurately performed in the eyes of the Law. A copy of each Logbook sheet can be inserted in the case. One with the Master Copy, one with the Working Copy and one retained in the book for management purposes. Each logbook sheet is colour-coded and designed to ensure that a record of the CD-Rdetails; audit information and the evidence bag number are all logged. The evidence log sheets each contain a unique number, which removes the need for users to manage their own numbering systems.
Cambridge City Council s. Guide for. Commercial User of CCTV in Small Businesses
Cambridge City Council s Guide for Commercial User of CCTV in Small Businesses March 2011 1 CONTENTS Section Description Page number 1 Introduction 2 2 Do you Need CCTV? 2 3 Other Considerations 3 4 What
More informationCCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL
CCTV User Group GUIDE FOR SMALL USERS PRIVATE and COMMERCIAL 1 CONTENTS Section Number Description Page number 1. Introduction 3 2. Human Rights Act and its implications for you 3 3. Data Protection and
More informationLONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
More informationHow To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
More informationUniversity of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
More informationContra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
More informationPOLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
More informationSECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
More informationCCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
More informationPRODUCING DV VIDEO WITH PREMIERE & QUICKTIME
This article contains guidelines and advice on producing DV video for the screen using a DV camcorder, Adobe Premiere and QuickTime. PRODUCING DV VIDEO WITH PREMIERE & QUICKTIME PRODUCING DV VIDEO WITH
More informationUNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
More informationPolicy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
More informationPolicing requirements for Closed Circuit Television
Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems
More informationPOLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same
POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:
More informationParliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
More informationSecurity. Deployment Protocol for BWC s (Appendix H)
(Appendix H) Ref: 1012 Rev: Author: Approver: Date: 24/08/12 Introduction North East Lincolnshire Partnership Car Parks Department owns 18 Body Worn cameras, hereinafter referred to as BWCs. This document
More informationThe legal admissibility of information stored on electronic document management systems
Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationScotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
More informationManaging Closed Circuit Television (CCTV) Records
Queensland State Archives Managing Closed Circuit Television (CCTV) Records Guideline for Queensland Public Authorities October 2010 Document details Security Classification PUBLIC Date of review of security
More informationUniversity of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
More informationInformation and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
More informationBuckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
More informationSecurity Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
More informationIn the two following sections we separately consider hardware and software requirements. Sometimes, they will be offered for sale as a package.
Appendix A COMPUTER HARDWARE AND SOFTWARE In this appendix we discuss some of the issues in choosing hardware and software for image analysis. The purpose is to draw attention to the issues involved rather
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More informationUpgrade from Sage Instant Accounts v15
Upgrade from Sage Instant Accounts v15 Sage Instant Accounts 2014 is the market-leading software that puts you in control of your cashflow. Whether you re dealing with quotes and invoices, customers or
More informationRecords Management Plan. April 2015
Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised
More informationData Protection Guidance
53 September 2010 Management Circular No. 53 Glasgow City Council Education Services Wheatley House 25 Cochrane Street Merchant City GLASGOW G1 1HL To Heads of all Educational Establishments Data Protection
More informationCCTV PROCEDURES To support Information Security Policy Framework
CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK
More informationClosed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
More informationHuman Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
More informationInformation Security Policy. Appendix B. Secure Transfer of Information
Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document
More informationUnderstanding Compression Technologies for HD and Megapixel Surveillance
When the security industry began the transition from using VHS tapes to hard disks for video surveillance storage, the question of how to compress and store video became a top consideration for video surveillance
More informationTRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales
TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street
More informationCamera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
More informationMerton Parking Service CCTV Enforcement Manual
Merton Parking Service CCTV Enforcement Manual Version 1.3 April 2013 Introduction Legislation Data protection Health & Safety CCCTV camera equipment Mobile CCTV vehicles CCTV control room CCTV evidence
More informationHybrid Storage: Hard Disk and Blu-ray. Law Enforcement s Answer to Reliable Digital Asset Management
Hybrid Storage: Hard Disk and Blu-ray Law Enforcement s Answer to Reliable Digital Asset Management January 16, 2012 Introduction It can be difficult for Law Enforcement and related organizations to keep
More informationINFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationInformation and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
More informationCouncil CCTV Surveillance System Data Protection Act, 1998
Council CCTV Surveillance System Data Protection Act, 1998 How to Apply for Access to Information held on the CCTV System These notes explain how you find out what information, if any is held about you
More informationMODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
More informationRemote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
More informationDynaGuard 200 Series. Compact and Versatile MPEG-4. Ver. 1.1
DynaGuard 200 Series Compact and Versatile MPEG-4 Ver. 1.1 An Introduction to the DynaGuard 200 Series MPEG-4 Digital Video Recorder for Small to Medium Applications What is a DynaGuard TM 200? Combined
More informationPhotography and filming in schools Code of Practice
Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationCSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global
CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit
More informationData Protection Policy
Data Protection Policy 1. INTRODUCTION 1.1. The Data Protection Act gives you as an individual the right to know what information is held about you. It provides a framework to ensure that personal information
More informationChapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
More informationData Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
More informationManage Video Clutter and Organize Your Digital Library
Learn How To... Manage Video Clutter and Organize Your Digital Library This e-book will help in maintaining your video collection and preserving your family's memories. Table Of Contents INTRODUCTION...1
More informationWORKPLACE SAFETY KIT A STEP BY STEP GUIDE TO SAFETY FOR BUSINESS GUIDE 2001. WorkCover NSW Health and Safety Guide. WorkCover. Watching out for you.
WORKPLACE SAFETY KIT A STEP BY STEP GUIDE TO SAFETY FOR BUSINESS GUIDE 2001 WorkCover NSW Health and Safety Guide WorkCover. Watching out for you. Table of Contents Table of Content: How to Use the Workplace
More informationComputer Logic (2.2.3)
Computer Logic (2.2.3) Distinction between analogue and discrete processes and quantities. Conversion of analogue quantities to digital form. Using sampling techniques, use of 2-state electronic devices
More informationWestern Australia Legislation for Video Surveillance Devices
Western Australia Legislation for Video Surveillance Devices This document is an analysis of the Western Australia Surveillance Devices Act 1998; its purpose is to highlight some widely held misconceptions
More informationChapter 8 Memory Units
Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical
More informationA&H Software House Inc. Web: www.luxriot.com Email: sales@luxriot.com. Luxriot
A&H Software House Inc. Web: www.luxriot.com Email: sales@luxriot.com Luxriot Luxriot Product Features Luxriot is equipped with Unique, Advanced and Industry Standard Surveillance Features: Luxriot is
More informationData Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
More informationCCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
More informationBackup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v.
Backup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v. Existing backup methods Most companies see an explosive growth in the amount of data that they have
More informationChoosing a computer for ANY-maze
Choosing a computer for ANY-maze ANY-maze www.anymaze.com Choosing a computer for ANY-maze 1 Introduction... 3 2 Overview... 3 3 Recommended and minimum specifications at a glance... 3 3.1 Recommended
More informationData Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
More informationWelcome to Northern Lights A film about Scotland made by you.
Welcome to Northern Lights A film about Scotland made by you. As part of the Year Of Creative Scotland 2012 we want you to take out a camera and show us what you can see. We are not sure what you will
More informationData Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
More informationComputers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer
Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.
More informationComputer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
More informationPeace of Mind Through Surveillance: Affordable Solutions for Home and SMB
1 A NEW NAS Experience a white paper Peace of Mind Through Surveillance: Affordable Solutions for Home and SMB August 2009 Table of Contents 2 Introduction 3 What is NAS? 3 Surveillance Station Features
More informationTech Application Chapter 3 STUDY GUIDE
Name: Class: Date: Tech Application Chapter 3 STUDY GUIDE Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. This type of device retains data
More informationScope and Explanation
The Moray Council Retention & Disposal Schedule for documents and records [paper and electronic] Scope and Explanation 1 Document Control Sheet Name of Document: The Moray Council Records Retention Schedule
More informationSafeguarding Data Storage for Video Surveillance and Security
Safeguarding Data Storage for Video Surveillance and Security 2005 Infortrend Corporation. All rights reserved. Table of Contents Overview... 3 Executive Summary... 3 Traditional Storage... 3 Advanced
More informationThe benefits need to be seen to be believed!
The benefits need to be seen to be believed! Resolutions Summary The Wow Factor Benefits of HD Security and more Applications Key Features - Size matters! Tackling large file sizes Other features Viewing
More informationMONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
More informationhp pavilion home pc hp dvd writer
hp pavilion home pc hp dvd writer The information in this document is subject to change without notice. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but
More informationEffective complaint handling
This guide sets out key information for state sector agencies about developing and operating an effective complaints process. It also provides information about the Ombudsman s role, as an independent,
More informationReferral fees, referral arrangements and fee sharing
Referral fees, referral arrangements and fee sharing This response to the consultation is prepared by Carter Law LLP. Our experience spans the RTA/PI sector and as such, any criminal advocacy questions
More informationHIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationCCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
More informationDigital Preservation. Guidance Note: Care, Handling and Storage of Removable media
Digital Preservation 3 Guidance Note: Care, Handling and Storage of Removable media Document Control Author: Adrian Brown, Head of Digital Preservation Research Document Reference: DPGN-03 Issue: 2 Issue
More informationA guide to access control for offices
A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.
More informationRECORDS MANAGEMENT POLICY
Reference number RM001 Approved by Information Management and Technology Board Date approved 23 rd November 2012 Version 1.1 Last revised July 2013 Review date May 2015 Category Records Management Owner
More informationVideo Surveillance Buyer's Guide By the purchasing experts at BuyerZone
Introduction From a single camera and monitor to complex video surveillance systems with hundreds of cameras, multiple operators, and digital recorders, closed circuit television (CCTV) systems can provide
More informationDigital Security Surveillance. Reference Guide. Security you can rely on.
Digital Security Surveillance Reference Guide Security you can rely on. 03 Contents The security industry goes digital 4 Digital products selection table 6 Digital video recorder 8 Eazeo general application
More informationIntroduction to Final Cut Pro 7 - Editing Basics
Workshop Objectives Become familiar with the Final Cut Pro workspace, basic editing, capturing footage, using tools, exporting to tape, or QuickTime. Learn effective workflow and file management strategies.
More informationhp pavilion home pc hp dvd writer
hp pavilion home pc hp dvd writer The information in this document is subject to change without notice. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but
More informationKentucky Department for Libraries and Archives Public Records Division
Introduction Kentucky Department for Libraries and Archives Public Records Division Ensuring Long-term Accessibility and Usability of Textual Records Stored as Digital Images: Guidelines for State and
More informationCCTV Digital Video Recorder (DVR) FAQ from the Rockpile Security Buyer s Guide
WHITE PAPER CCTV Digital Video Recorder (DVR) FAQ from the Rockpile Security Buyer s Guide I - Frequently Asked Questions The following are some of the questions we are commonly asked regarding digital
More informationAUDITOR GUIDELINES. Responsibilities Supporting Inputs. Receive AAA, Sign and return to IMS with audit report. Document Review required?
1 Overview of Audit Process The flow chart below shows the overall process for auditors carrying out audits for IMS International. Stages within this process are detailed further in this document. Scheme
More informationDisclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930
Security Classification: NOT PROTECTIVELY MARKED Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Association of Chief
More informationTitle of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
More informationEstablished in 2005, Safewatch Security Systems are a security system integration company.
Established in 2005, Safewatch Security Systems are a security system integration company. The director of the company Joe Lawlor, has more than 14 years experience in designing and installing security
More informationVideo surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
More informationSo the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
More informationSecuring safe, clean drinking water for all
Securing safe, clean drinking water for all Enforcement policy Introduction The Drinking Water Inspectorate (DWI) is the independent regulator of drinking water in England and Wales set up in 1990 by Parliament
More informationOIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS
OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS February 13, 2013 TABLE OF CONTENTS Page Introduction... 1 Applicability of Guidelines... 2 ATIPPA... 3 Definitions... 5 Collection
More informationDELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS
DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS STATEMENT OF PURPOSE The Delaware Public Archives (DPA) has issued "Model Guidelines for Electronic Records"
More informationSELECTING THE CCTV SECURITY SYSTEM THAT IS RIGHT FOR YOU
SELECTING THE CCTV SECURITY SYSTEM THAT IS RIGHT FOR YOU When buying a security camera or complete CCTV system you need to consider the main purpose of the system. For example, is it to be used for: Observation
More informationNew DS2 Operation Training. Reference Notes
New DS2 Operation Training Reference Notes 2 DS2PD Operation Training Notes Issue 4.5 (064) Contents Contents... 3 Introduction... 4 Improvements to the User Interface... 4 Keyboard Layout... 4 On-Screen
More informationCLOSED CIRCUIT TELEVISION
CLOSED CIRCUIT TELEVISION South Australia Police A GUIDE FOR BUSINESS 01 02 03 04 Foreword Introduction Establishing CCTV objectives Monitoring CCTV images 06 07 08 CCTV recording systems Frame rate Archive
More informationCrime Prevention through Environmental Design (CPTED) - Checklist
Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the
More informationHampstead Parochial CofE Primary School Data Protection Policy Spring 2015
Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 1. Introduction and Scope 1.1 The Data Protection Act 1998 is the law that protects personal privacy and applies to any school
More informationData Protection Policy
Data Protection Policy Introduction The Data Protection Act 1998 gives individuals the right to know what personal information is held about them. It provides a framework to ensure that the Office of the
More information