Data Privacy Requires a Security Response

GDPR affords EU residents more control over personal information

Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk. Data intended to remain private is showing up for sale on the internet, privacy has become a worldwide concern, and citizens are losing faith in the way their data is collected, stored and protected.

The European Union took a big step last year to ease its citizen’s concerns with the enaction of the General Data Protection Regulation (GDPR). EU residents now have much more control over their personal information. The GDPR requires they know what data is being collected, how it is being used and how they can opt in, not out, of a company’s database.

What constitutes personal data? That’s broadly defined to include just about anything that could be used to identify a person, including name, home and email addresses, birthdate, driver license number, gender, race, political affiliations and much more.

Although the GDPR specifically applies to nations within the EU, it has worldwide implications. Any organization, no matter where it’s based, that collects data gathered from an EU citizen must comply with the regulation. Failure to do so can result in penalties of up to €20 million or 4 percent of a company’s annual global revenue.

The European privacy movement has sparked a worldwide response. In the U.S., more than 10 states have enacted tougher regulations to protect its citizens’ personal data. Perhaps the most GDPR-like will take effect on January 1 in California. Online sites will be required to conspicuously post a “Do Not Sell My Personal Information” link. Parental consent will be required before selling data about a child under the age of 13.

The security industry was not a prime target of the GDPR, but it will feel an impact in the way organizations collect and use video surveillance and access control data. In the EU, video is considered to be personal data belonging to those captured in live or recorded images. By its nature, access control requires personal information from employees and vendors in return for a pass to enter facilities.

Organizations must have clearly defined goals for its security functions. That means being ready to explain camera placements, what images they expect to capture, and how the video will be used, stored and shared. How video will be shared may be the most critical component.

Strict cybersecurity controls are required to ensure securityrelated data can be viewed only by authorized personnel that may include corporate staff, law enforcement or even a hosted or managed service provider or central monitoring station.

It is obvious passwords protecting data can be hacked. They can also be shared.

Adding a card reader or keypad to a workstation provides a second layer of security. Yet there’s no guarantee the person using the card or entering a Personal Identification Number (PIN) has been authorized to do so.

This is where biometrics can play an important role in securing databases. Passwords, cards and PINs can be hacked, shared or stolen; a biometric identifier cannot. Biometrics offer a way for our industry to meet security goals for the protection of data while also restoring public confidence.

Biometrics involve the measurement of physical characteristics, something only the owner can possess. The most commonly used biometrics include iris patterns, fingerprints and facial recognition. Combining biometric and access readers or a keypad at the PC creates true two-factor authentication. Passwords can be eliminated while the database remains accessible only to authorized users.

The use of biometric technologies is now commonplace worldwide. You see them embedded in smartphones, at border crossings and in use for time and attendance, national ID cards, voter registration and more. Biometric readers can also authenticate consumers registering for websites or making purchases on the internet.

Among the major biometric technologies, iris recognition is widely considered the most accurate. No two people, even identical twins, have the same iris patterns. The technology works with people wearing glasses, contact lenses and safety goggles. It’s not affected by grease, dirt or scars as are fingerprint readers. Iris technology works with very large databases where facial recognition has been shown to be less effective.

GDPR and its goals have arrived with the simple concept that citizens have a right to know the information being collected about them, how it is used and be provided with an easy way to delete their data at any time.

The security industry should see GDPR and efforts at the state level in the U.S. as driving positive changes and eliminating inefficient data protection efforts. At the same time, we need to employ tools readily available to restore citizens’ sense of privacy whether they are completing an online transaction or engaging with a security system. A failure to act now may result in a more severe backlash that could negatively impact how we protect people and their personal data.

This article originally appeared in the October 2019 issue of Security Today.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.