SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What Are The Biggest Ethical Considerations Of Security Technology?

4 Apr 2024

What Are The Biggest Ethical Considerations Of Security Technology?
Larry Anderson
Larry Anderson
4 Apr 2024
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security technology's ethical issues include data privacy and algorithmic bias.
  • Emerging technologies in security require careful ethical consideration to avoid misuse.
  • The security industry must prioritize ethical principles to minimize societal risks.

Editor Introduction

Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimizes risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security? 


Card image cap
Steve Bell Gallagher Security

Physical security is focused on people and how to keep them safe while allowing authorized and authenticated people access. Emerging Technology, especially AI-based, involves the training of machine learning systems with large datasets, and those datasets mustn't discriminate against any groups in the community based on race, gender, or varying abilities. Ensuring fairness and transparency in AI algorithms is essential. The manufacturer, integrator, and system owner also have the added responsibility to ensure that the embedding of a physical security system into an enterprise does not have any unintended consequences, such as the leaking of private information. This means implementing robust encryption, access controls, and secure storage mechanisms to ensure data collection and storage are secure and mitigate any potential threats of breaches.  

Card image cap
Fredrik Nilsson Axis Communications

Before development even begins, manufacturers should always be aware of a product’s potential for misuse. Once a piece of technology is made available, enforcing how it is used can be extremely difficult, but manufacturers must clearly define and communicate its intended applications. Now more than ever, businesses need to be forward-thinking, ensuring their products and services are not placed in the hands of those likely to use them in unethical ways. The stakes are particularly high in the physical security industry. When manufacturers are exploring ways to integrate AI into new and existing products, they need to avoid working with customers and partners who have a history of irresponsible behavior with emerging technology. As regulators around the world begin enforcing new guidelines around AI, it is increasingly vital for ethical behavior to be made a high priority. 

Card image cap
Daniel Reichman Ai-RGUS

Many of the emerging technologies in physical security revolve around collecting data, analyzing data, and making decisions based on that data. This brings up considerations of data privacy and whether it is important to identify people in images or whether knowledge of there is a person or a car at a certain place and time is enough. It also brings up whether decisions are automatically made based on this data and how fair the rules engine is in making its decisions, e.g., how is the decision made to grant a person access to a building based on an image of the person trying to enter? 

Card image cap
Hiroshi (Huey) Sekiguchi i-PRO

When exploring ethics in physical security, a predominant concern is around privacy. Video surveillance devices can collect detailed information about people which can be used to analyze behaviors and potentially identify individuals. As manufacturers, we must enable our customers to comply with the ever-evolving ethical landscape around AI-based data collection and privacy. While the metadata typically captured from AI-based cameras is anonymous, it’s important to adopt a privacy-by-design development standard that includes complete transparency about what data is collected, how it is used, and who has access to it. For example, some organizations and geographies may require opt-in face recognition while it remains illegal in others. Machine learning algorithms can inject bias into analytics if they have been trained on skewed data sets. Detection based on race or ethnicity should never be allowed. As tools continue to evolve, so must our ethical use of them. 

Card image cap
Kayne McGladrey Hyperproof

Algorithmic bias is one of the primary risks associated with emerging physical surveillance technologies. While the risks of facial recognition software are well known and documented, efforts are being taken to adapt computer vision to new and novel use cases. For example, one of the more deeply flawed failures was an attempt to detect aggressive behavior or body language, which was unfeasible as there was not enough training data available. Other physical security systems will face a similar challenge of not discriminating against individuals based on protected factors due to a lack of training data, or more likely, a lack of gender or racially unbiased training data. Companies considering purchasing advanced or emerging physical security systems should enquire about the training data used in the development of those systems to not be subject to civil penalties resulting from discrimination caused by using said systems. 

Card image cap
Alan Stoddard Intellicene

When we talk about physical security, we also must talk about cyber security. How companies are keeping themselves protected from cyber threats can be just as critical as how they are protecting your environment from physical security threats. This is where we can see some emerging technologies skimping. Emerging technologies often rely on collecting and processing vast amounts of data, and ensuring the security of this data against cyber threats is crucial in preventing breaches that could compromise both physical security systems, the enterprise network itself, and the privacy of countless individuals. A data breach could be detrimental to environments including hospitals, retailers, cities, government entities, and airports. We must continue holding all technology companies in the physical security industry accountable for protecting not only our people and assets but our data by focusing on the security of the software, devices, users, and network connections across the operation. 

Card image cap
Andy Cease Entrust Inc.

According to the World Bank, 850 million people globally do not have a physical identity – many of whom are members of marginalized groups, and the majority are children whose births have not been registered. Today, identity, whether that be a driver's license, passport, or birth certificate, is key to accessing the fundamentals of life such as school registration, getting a job, opening a bank account, buying a house, or receiving social assistance payments. It's foundational to social and economic mobility, which presents significant regulatory, ethical, and practical implementation concerns. Physical security continues to blend with digital for hybrid security, meaning there is an even greater need for secure and convenient identity verification, online or in-person. With this increased reliance, ethical considerations around access and inclusion are paramount. This could mean improving access to mobile smartphones, ensuring apps use basic language instead of technical, offering setup assistance at major travel points, etc.

Card image cap
Igal Dvir BriefCam

Physical security has entered a transformative area, catalyzed by advanced AI models. While these technologies enhance safety, their deployment raises discussion-worthy questions – especially regarding individual rights. The potential collection and analysis of personal data, for instance, causes unease about the extent to which surveillance for the public good infringes on individual freedoms. Moreover, considerations around algorithmic biases, suboptimal equipment, poor environmental conditions, and even faulty camera placement raise another wave of concern regarding the reliability of technology for supporting sensitive decisions. Balancing the trade-off between individual rights and enhanced safety is a delicate endeavor and must be handled judiciously to ensure that security measures do not overshadow fundamental human rights. Instances of successful, responsible implementation of AI-based technologies support the fact that these challenges are not insurmountable. For instance, identity verification at passport control extracts and compares biometric features in real time without storing any data, preserving privacy while enabling streamlined security. Similarly, differentiating real-time and post-incident data processing is another way end users minimize potential invasiveness: Instead of indiscriminately collecting data, a more targeted approach that compares a specific identity with recorded footage can mitigate unnecessary privacy breaches. 


Editor Summary

Ethical use of technology is about harnessing its power for good while minimizing the potential for negative consequences. It's an ongoing conversation as physical security technology develops, but it's essential for building a future where everyone can benefit from technological advancements. 

  • Related links
  • Axis Communications Video Surveillance software
  • Axis Communications Digital video recorders (DVRs)
  • Genetec Video Surveillance software
  • Axis Communications Access control readers
  • Gallagher Access control readers
  • Gallagher Access control cards/ tags/ fobs
  • Axis Communications Video signal devices & accessories
  • Bar Code Access control readers
  • Networkable Access control readers
  • Magnetic Stripe Access control cards/ tags/ fobs
  • ANPR Software Video Surveillance software
  • Passive Infrared detector Video motion detectors
  • Card Access control cards/ tags/ fobs
  • Control Software Video Surveillance software
  • Intelligent motion detection Video motion detectors
  • Biometric Access control readers
  • PC-based Access control readers
  • Card Swipe Access control readers
  • Fob Access control cards/ tags/ fobs
  • Standalone Access control readers
  • Detection Software Video Surveillance software
  • Proximity Access control cards/ tags/ fobs
  • Drawing Software Video Surveillance software
  • Smart Card Access control cards/ tags/ fobs
  • Contact Access control readers
  • Tag Access control cards/ tags/ fobs
  • IP Surveillance Software Video Surveillance software
  • Management Software Video Surveillance software
  • Mifare Access control readers
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • RFID Access control readers
  • Smart Card Access control readers
  • Transmission Software Video Surveillance software
  • Video Detector Video signal devices & accessories
  • Related categories
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • Access control readers
  • Access control cards/ tags/ fobs
  • Video motion detectors
  • Video signal devices & accessories
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

"Discover the top ethical considerations in using emerging technologies in physical security, including data privacy and potential algorithm bias. Essential read for decision makers in the security industry."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec