SIA Releases Privacy Framework For Security Technology

The Security Industry Association (SIA) is taking the lead on privacy protection issues with the release of a 12-item “Privacy Framework.”

The Framework was drafted to address privacy concerns related to the recording of video, the collection of personally identifiable information and the use of biometrics, RFID and other security technologies.

“While security without privacy is possible, privacy without security is impossible,” said Kathleen Carroll of HID Global, the chair of the SIA Government Relations Department’s State & Local Policy Working Group. “SIA has taken a significant step forward in providing guidelines as to how responsible protection of personal privacy can be practically applied throughout the security industry. HID Global is proud to have actively participated in the development of the Privacy Framework and is committed to offering secure identity solutions that adhere to the privacy protection principles laid out in the document.”

SIA has been active in promoting the responsible use of security technology. It has opposed legislative efforts in several states that would have sharply restricted the use of such technologies as biometrics and RFID, arguing that these moves are an inappropriate and ill-informed reaction to legitimate concerns about privacy that would result in the use of less reliable technologies that could make people less secure and make private information more vulnerable.

“Overly restrictive government privacy policies can lead to excessive litigation, prevent the delivery of cutting-edge security solutions to end-users, and impose unnecessary delays in the allocation of grant funds for critical infrastructure protection projects at our nation’s ports, transit systems, schools and universities, and other essential facilities,” the framework states. “SIA members know all too well how changes in technology occur much faster than legislatures and policy-makers can address those changes.”

The Framework identifies 12 guidelines to be followed in the deployment of electronic physical security solutions. The guidelines include:

  • Conducting privacy impact assessments.
  • Implementing privacy-enhancing solutions during the design phase of products, when possible.
  • Limiting access to personally identifiable information within an organization to those who have a “need to know.”
  • Adopting a security breach notification plan.

Establishing a retention policy for personally identifiable information and a procedure to ensure that such information is destroyed at the time stipulated by the policy.

The full Privacy Framework is available at http://www.siaonline.org/uploadedFiles/SIA/Government_Relations/Privacy%20Framework_v1.pdf.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”