SIA Releases Privacy Framework For Security Technology

The Security Industry Association (SIA) is taking the lead on privacy protection issues with the release of a 12-item “Privacy Framework.”

The Framework was drafted to address privacy concerns related to the recording of video, the collection of personally identifiable information and the use of biometrics, RFID and other security technologies.

“While security without privacy is possible, privacy without security is impossible,” said Kathleen Carroll of HID Global, the chair of the SIA Government Relations Department’s State & Local Policy Working Group. “SIA has taken a significant step forward in providing guidelines as to how responsible protection of personal privacy can be practically applied throughout the security industry. HID Global is proud to have actively participated in the development of the Privacy Framework and is committed to offering secure identity solutions that adhere to the privacy protection principles laid out in the document.”

SIA has been active in promoting the responsible use of security technology. It has opposed legislative efforts in several states that would have sharply restricted the use of such technologies as biometrics and RFID, arguing that these moves are an inappropriate and ill-informed reaction to legitimate concerns about privacy that would result in the use of less reliable technologies that could make people less secure and make private information more vulnerable.

“Overly restrictive government privacy policies can lead to excessive litigation, prevent the delivery of cutting-edge security solutions to end-users, and impose unnecessary delays in the allocation of grant funds for critical infrastructure protection projects at our nation’s ports, transit systems, schools and universities, and other essential facilities,” the framework states. “SIA members know all too well how changes in technology occur much faster than legislatures and policy-makers can address those changes.”

The Framework identifies 12 guidelines to be followed in the deployment of electronic physical security solutions. The guidelines include:

  • Conducting privacy impact assessments.
  • Implementing privacy-enhancing solutions during the design phase of products, when possible.
  • Limiting access to personally identifiable information within an organization to those who have a “need to know.”
  • Adopting a security breach notification plan.

Establishing a retention policy for personally identifiable information and a procedure to ensure that such information is destroyed at the time stipulated by the policy.

The full Privacy Framework is available at http://www.siaonline.org/uploadedFiles/SIA/Government_Relations/Privacy%20Framework_v1.pdf.

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3