SIA Releases Privacy Framework For Security Technology

The Security Industry Association (SIA) is taking the lead on privacy protection issues with the release of a 12-item “Privacy Framework.”

The Framework was drafted to address privacy concerns related to the recording of video, the collection of personally identifiable information and the use of biometrics, RFID and other security technologies.

“While security without privacy is possible, privacy without security is impossible,” said Kathleen Carroll of HID Global, the chair of the SIA Government Relations Department’s State & Local Policy Working Group. “SIA has taken a significant step forward in providing guidelines as to how responsible protection of personal privacy can be practically applied throughout the security industry. HID Global is proud to have actively participated in the development of the Privacy Framework and is committed to offering secure identity solutions that adhere to the privacy protection principles laid out in the document.”

SIA has been active in promoting the responsible use of security technology. It has opposed legislative efforts in several states that would have sharply restricted the use of such technologies as biometrics and RFID, arguing that these moves are an inappropriate and ill-informed reaction to legitimate concerns about privacy that would result in the use of less reliable technologies that could make people less secure and make private information more vulnerable.

“Overly restrictive government privacy policies can lead to excessive litigation, prevent the delivery of cutting-edge security solutions to end-users, and impose unnecessary delays in the allocation of grant funds for critical infrastructure protection projects at our nation’s ports, transit systems, schools and universities, and other essential facilities,” the framework states. “SIA members know all too well how changes in technology occur much faster than legislatures and policy-makers can address those changes.”

The Framework identifies 12 guidelines to be followed in the deployment of electronic physical security solutions. The guidelines include:

  • Conducting privacy impact assessments.
  • Implementing privacy-enhancing solutions during the design phase of products, when possible.
  • Limiting access to personally identifiable information within an organization to those who have a “need to know.”
  • Adopting a security breach notification plan.

Establishing a retention policy for personally identifiable information and a procedure to ensure that such information is destroyed at the time stipulated by the policy.

The full Privacy Framework is available at http://www.siaonline.org/uploadedFiles/SIA/Government_Relations/Privacy%20Framework_v1.pdf.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3