Genetec Shares Best Practices for International Data Privacy Day

Genetec encourages businesses and individuals to use International Data Privacy Day as an opportunity to enhance their data protection.

Genetec Shares Best Practices for International Data Privacy Day

Image courtesy of Genetec

MONTRÉAL—In support of International Data Privacy Day, unified security, public safety, operations, and business intelligence solutions provider Genetec shared best practices to help physical security leaders protect privacy, safeguard data and enable trust without compromising security.

Genetec encourages businesses and individuals alike to use International Data Privacy Day as an opportunity to evaluate and enhance their data protection strategies. By prioritizing privacy, organizations can effectively contribute to a safer digital and physical landscape for all.

“Organizations should never have to choose between data privacy and security,” says Christian Morin, chief security officer at Genetec Inc., in the company announcement. “That’s why Genetec solutions are built on privacy by design principles so that our customers can ensure the highest levels of security while respecting personal privacy and complying with privacy laws.”

Genetec recommends organizations ensure their security systems respect data privacy by:

Collecting and Storing Only What You Need: A fundamental rule of data security is to collect and store only essential information. The potential impact of a security breach can be reduced by minimizing stored data. It’s important to regularly review and audit data and dispose of unnecessary information responsibly.

Limiting Access to Sensitive Data: Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy.

Techniques for anonymizing personal information while retaining its utility include:

  • Randomization (adding noise to numerical values such as an individual’s age or income),
  • pseudonymization (such as replacing names with unique identifiers), tokenization (such as replacing credit card numbers with tokens that have no direct correlation to the original numbers),
  • generalization (such as converting exact birthdates to age ranges),
  • and data masking (showing only the first few digits of a phone number).

Ensuring Privacy without Compromising Evidence: By making use of technologies such as KiwiVision™ Privacy Protector, organizations can automatically anonymize images of people, so they can continue to survey surveillance footage while respecting privacy.

This technology also offers an additional layer of security that ensures only authorized users can “unlock” and view unmasked footage while maintaining an audit trail.

Being Transparent and Get User Consent: Building trust through transparency and user consent is essential. It’s important to clearly communicate with users about the data collection process, promoting informed decisions. Organizations should also gain explicit consent before collecting and processing data.

Choosing a Reliable Data Storage Provider: Organizations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. If using third-party services, organizations should demand strong security measures and reliable data handling practices.

Establish who “owns” any data stored in the cloud, and any rights/privileges associated with the use or disclosure of any information.

Establishing Strong Policies: To ensure long-term data safety, Genetec recommends putting in place robust policies across the organization. Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every stage of the data lifecycle.

Data security is an ongoing process, and organizations should regularly update protocols, stay informed about emerging threats, and continuously educate their teams on best practices.

For more on Genetec privacy protection initiatives, visit https://www.genetec.com/trust-cybersecurity.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters