Surveillance Equipment



Similar documents
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

Title of the Policy: Surveillance Policy

Contra Costa Community College District Business Procedure SECURITY CAMERA OPERATING PROCEDURE

Camera Use. Policy Statement and Purpose. Table of Contents

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

NMSU Procedural Guidelines (Policy Security Cameras on University Premises)

Stanford University Video Surveillance System Guidelines

Surveillance Camera Calgary North - One Executive Place Calgary, Alberta

MODESTO CITY SCHOOLS Administrative Regulation

CCTV Cameras Policy. Policy Guidelines

College of DuPage Information Technology. Information Security Plan

Security Systems Surveillance Policy

Video surveillance policy (PUBLIC)

Mobile Devices Security Policy

How To Write A Health Care Security Rule For A University

OIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada

R345, Information Technology Resource Security 1

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

For the purpose of this chapter the following definitions shall apply:

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Information Security Policy

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools

5.00 Employee in relation to the university, includes a volunteer and a service provider.

Supply Chain Security Audit Tool - Warehousing/Distribution

Acceptable Use Policy

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

DRAFT CITY/COUNTY OF, TENNESSEE POLICE ALARM ORDINANCE

Encryption Security Standard

Lawlink NSW: Guide to the Workplace Video Surveillance Act

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

UMDNJ COMPLIANCE PLAN

Information Security Program

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE:

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Winning Initiatives and Best Practices for Physical Security

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

How To Protect Data At Northeast Alabama Community College

Information Systems Security Policy

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

Administrative Procedure

Network Security Policy

UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy

Rowan University Data Governance Policy

COBAR SHIRE COUNCIL FILE:P5-90

Information Security Program Management Standard

Utica College. Information Security Plan

Wellesley College Whistleblower Policy Adopted April 2009

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

COMPUTER, NETWORK AND INTERNET USE POLICY

ADMINISTRATIVE PROCEDURES/REGULATIONS.

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

PURPOSE AND GENERAL POLICY DEFINITIONS ALARM PERMITS (1) Permit Fees

CREDIT CARD SECURITY POLICY PCI DSS 2.0

Copyright Compliance and Peer-to-Peer File Sharing Policy

Chapter ALARM SYSTEMS. Sec Intent and purpose of chapter. Sec Definitions. Page 1 FOOTNOTE(S):

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

Guidelines on video surveillance

Principles Concerning the Protection of Personal Data in the Workplace: Guidelines for Employee Monitoring *

Video surveillance at EFSA Implementing rules and technical specifications

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Chapter 3 ALARM SYSTEMS

Bring Your Own Device (BYOD) Usage and Network Access Guidelines. Rules and Requirements

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV

VIDEO SURVEILLANCE GUIDELINES

Information Security Policy

Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008

View. Select View Managed Video Services ADT

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

OLYMPIC COLLEGE POLICY

BRANCH SECURITY REVIEW CHECKLIST

Personal Information Protection Act (PIPA) Privacy & Landlord - Tenant Matters Frequently Asked Questions

Network Security Policy

Security Alarm Monitoring Protocol

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

HOWARD UNIVERSITY POLICY

Court Security Guidelines

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

ARTICLE 26 5/07/07 Annual Town Meeting Public Safety Chapter 9 Section 30

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

COMPUTER USE POLICY. 1.0 Purpose and Summary

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Acceptable Use of Information Technology

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

North Clackamas School District 12

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

Transcription:

University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of Surveillance Equipment for the purpose of security. II. Scope This standard practice applies to all personnel, schools, and centers of the University in the use of surveillance equipment. This standard practice is not intended to cover the use of Web cams unless the Web cam is used for surveillance. III. Definitions Audio surveillance - Close observation or recording of a person, group, or an area relating to or used in the transmission or reception of sound. Campus Security Subcommitte A task group reporting through the campus Loss Control Committee to the VP for Finance and Operations. The mission of the subcommittee is to review security needs relating to University personnel, students, visitors, buildings and grounds, events, research, information, and operations; review and recommend policies regarding security, priorities, and standards; provide guidelines to assist departments in monitoring adherence to policies and procedures designed to prevent breaches of security; monitor new information regarding security materials from federal, state, local, and University regulations and disseminate as appropriate; review and recommend training regarding security policies and procedures; review incidents involving security breaches; make recommendations to the main committee. Criminal investigation An organized effort, typically conducted by a law enforcement agency, for the purposes of gathering information concerning criminal intent. Law enforcement purposes The broad term used to describe efforts of law enforcement agencies targeted at insuring obedience to the laws. Public areas Areas maintained for and used by people for which there is no expectation of privacy.

Record series A group of records/files having similar characteristics. Names are provided for the record series, and retention times and destruction methods are established. Surveillance - The careful watch or recording of persons, places, things, and/or areas for the purpose of obtaining information concerning the activities and identity of individuals. Surveillance equipment The implements used for the purposes of surveillance. Surveillance Equipment Request Form (240a) The document that must be filled out and submitted to the University Police when an individual or department wishes to have surveillance equipment installed and used in their facilities. Visual surveillance - Close observation or recording of a person, group, or area attained or maintained by sight. University s Record Retention Schedule - An approved policy that lists common record series found in university departments. It provides retention guidelines for the office of record and copy holders based on administrative, fiscal, historical, and legal value. It also provides guidance on the proper disposal methods for each record series after the approved retention period has been met. Webcams -A camera designed to take digital photographs and transmit them over the Internet or other network. IV. General Principles A. The purpose of surveillance equipment is to deter crime and to assist in protecting the property of the University community. As a general policy, only visual recordings will be utilized. The exception to this policy is the possible use of both audio and visual surveillance equipment in a criminal investigation. A criminal investigation will be done by the University Police Department (UPD) or other trained law enforcement unit when approved by the Chief of Police. B. Any diversion of security technologies and personnel for other purposes would undermine the acceptability of these resources and is therefore prohibited by this policy. C. Prior to purchasing or installing any surveillance equipment, a Surveillance Equipment Request Form (see attached form 240a) must be completed and submitted to the UPD. The Surveillance Equipment Request Form will initiate the request for surveillance equipment, and will be routed by the UPD through the approval process. The Surveillance Equipment Request Form is available online at http://departments.und.edu/police/ D. The use of surveillance equipment for security purposes will be conducted in a professional, ethical, and legal manner. Personnel involved will be appropriately trained and supervised in the responsible use of this technology. Violation of the

use of surveillance equipment as outlined in this standard practice will result in disciplinary action consistent with the rules and regulations governing students and employees of the University. E. Information obtained through surveillance equipment will be used exclusively for security, law enforcement purposes, and enforcement of appropriate UND and North Dakota University System policies and procedures and is not intended for the enhancement of personal safety. F. The use of any surveillance equipment in public areas for security and law enforcement purposes will be conducted in a manner consistent with all existing University policies and legal requirements. G. The use of surveillance equipment for security and law enforcement purposes at the University is limited to uses that do not violate the reasonable expectations of privacy as defined by law. Surveillance equipment installed for security purposes will not be placed in such a manner that confidential or sensitive information is visible or recorded. H. Information obtained in violation of this standard practice may not be used in a disciplinary proceeding against a member of the University faculty, staff, or student body. I. All existing uses of surveillance equipment will be brought into compliance with this standard practice within twelve months of the approval of this standard practice. J. The UPD or their designee will post signage at appropriate locations. Signage will specify: VIDEO SURVEILLANCE ON PREMISES K. Data captured by surveillance equipment will be stored for a period not less than 7 days and not to exceed 30 days and will then be erased unless retained as part of a criminal investigation or court proceedings (criminal or civil), or other bona fide use as approved by the Campus Security Subcommittee. L. Portable hidden cameras with recording equipment will only be used for criminal investigation by trained law enforcement units with the approval of the Chief of the UPD or designee. M. Any data that is retained for investigations or proceedings as described in sections K and L of this standard practice will be held for the appropriate retention time in accordance with the University s Records Retention Schedule. The record series in which this data will be retained under will be determined by the nature of content, investigation, and/or processing.

V. Responsibilities A. The UPD has the responsibility for the following: 1. Receiving and processing Surveillance Equipment Request Forms through the established approval process. 2. Overseeing and coordinating the installation and use of surveillance equipment for security and law enforcement purposes at the University. All new installations will follow this standard practice and any supplemental operating procedures applicable to the installation. All existing surveillance equipment systems will be evaluated for compliance with this standard practice. 3. Disseminating information regarding the use of surveillance equipment and assisting other units in implementing this standard practice and supporting procedures. 4. Consulting with the UND Office of General Counsel to monitor new developments in the relevant law and in security industry practices to ensure that surveillance equipment use at the University is consistent with the highest standards and protections. B. The Campus Security Subcommittee has the responsibility for the following: 1. Establishing and maintaining this standard practice and any supplemental operating procedures. 2. Authorizing the use of surveillance equipment for security purposes at the University as described on Surveillance Equipment Request Forms. Campus Security Subcommittee approval not required for law enforcement purposes. C. Deans and Department Heads have the responsibility for the following: 1. Implementing this standard practice in their respective operations. 2. Coordinating specific duties relating to the daily operation and maintenance of surveillance systems installed in their departments as directed by the UPD or Security Subcommittee. 3. Providing the necessary financing for the proper installation, operation and maintenance of surveillance equipment present in their department. 4. Communicating any problems regarding the use of surveillance equipment to the UPD.

VI. Examples of use of surveillance equipment in public areas A. Legitimate security purposes include, but are not limited to, the following: 1. Protection of buildings and property - Building perimeter, entrances and exits, lobbies and corridors, receiving docks, special storage areas, laboratories, cashier locations, etc. 2. Monitoring of access control systems - Monitor and record restricted access transactions at entrances to buildings and other areas. 3. Verification of security alarms - Intrusion alarms, exit door controls, hold-up alarms, etc. 4. Criminal investigation - Robbery, burglary, and theft surveillance.

FORM 240a Surveillance Equipment Request Please Check One: New Request For Surveillance Equipment Change to Existing Surveillance Request Department Requesting Surveillance Equipment: Date: Building/Location for Equipment Installation: Room Number(s): Location within room: Departmental Contact: Phone: Reason for Surveillance Equipment Request: RETURN COMPLETED FORM TO UPD BOX 9035 FAX 777-6474 UPD/Security Committee use only below line Date Received by UPD: Received by: Date of design review by UPD Surveillance Equipment Coordinator: Signature: Design Approved Design Denied Design Tabled Date reviewed by Security Subcommittee: Signature of Security Subcommittee Chair: Approved Denied Tabled Date of final approval by UPD Surveillance Equipment Coordinator: Signature: Installation Approved Installation Denied Tabled