SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access And Monitoring For Data Centers

    KentixONE – IoT Access And Monitoring For Data Centers

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Voyant Helium: Revolutionizing Solid-State LiDAR
    • Zimperium Report On Mobile PDF Phishing Threats
    • Matrix Comsec Earns CII Award For STEM Excellence 2025
    • VITEC & Actelis Advance IPTV For RF Networks
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which Vertical Markets Have The Greatest Growth Potential For Security?
    • What’s Behind (Perimeter) Door #1?
    • Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft
    • Why Open Matters In The Age Of AI
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    eCLIQ Enhances Security At Marin Hospital Of Hendaye

    eCLIQ Enhances Security At Marin Hospital Of Hendaye

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Axis Communications Shares An Insight On Achieving Third-Party Privacy In Video Surveillance

2 Apr 2020

Axis Communications Shares An Insight On Achieving Third-Party Privacy In Video Surveillance
Contact company
Contact Axis Communications
icon Add as a preferred source Download PDF version

The introduction of the GDPR has deeply affected businesses using video surveillance. Striking a balance between the safety and security needs and safeguarding third-party privacy when processing personal data can be a challenge. But with planning, the right documentation, the right tools, and the right partner, it can be done.

The European Union General Data Protection Regulation, GDPR, was introduced in May last year to protect the privacy of individual citizens; how personal data is collected, processed, and shared. As the regulation isn’t just about written details, like names and addresses; it also applies to any information that can identify someone, which therefore includes video surveillance data such as pictures and videos.

Guidelines that help compliancy

As a business owner, there are some things that one needs to get straight when handling personal data. Trying to bring some clarity and helping companies do the right thing, the European Data Protection Board (EDPB) has published useful guidelines. These cover all GDPR compliance aspects, from planning and installing to running the video surveillance. For example, it includes what one may record, how long one can save it, and how and when one can export it.

A professional supplier should also be able to help, both with the information that one needs as well as the right hardware and software to protect third-party privacy.

Starting on the right foot

Let’s say that, as a store owner, one is in the process of installing video surveillance. It might be to protect the premises against vandalism or to keep track of what happens in the store to reduce thefts, or to improve staff and customer security. Generally, this will make one the data controller. Documentation and processes are critical to comply with GDPR

Documentation and processes are critical to comply with GDPR. The first step is to explain why one needs to install cameras that could potentially infringe on third-party individuals. This balance of interest is vital in the regulation, the legitimate interests versus those individuals whose personal data is being collected, held, or processed, also known as the data subjects.

Video surveillance – areas to consider

Once established the legitimate need to install video surveillance, it’s time to design the system. From an overall system perspective, there are a few areas that one needs to consider.

System design

When designing the video surveillance system, AXIS Site Designer helps to ensure that GDPR obligations are properly considered. Here one can define the retention time, define the camera's field of view and resolution to ensure the right images are captured.

AXIS Site Designer provides installation notes which can be used to inform the installer of GDPR considerations such as the need for privacy masks and specific installation requirements.

Data storage

Data storage covers two areas: how long one should store the data and how to protect it. In general, one is not allowed to store data for “longer than is necessary for the purposes for which the data are processed,” what the GDPR calls “storage limitation”. Depending on the purpose, three or four days is usually enough. The longer one wants to store the data, the greater legitimate interests must be.

To protect the data, one should secure physical access to the location where the video management system and data is stored. The video management system itself must be secured against unauthorized access to the stored recordings containing personal data.

Using AXIS Camera Station, one can easily set safe passwords, both for the VMS and the camera and they can even be randomized. User permissions can also be applied to limit functionality appropriate for the operator. Any leaks of personal data or security breaches must be reported to the relevant supervisory authority promptly.

Third-party privacy in VMS

Tools for the protection of privacy should be core functions of video management software. Sometimes one may need to mask objects and innocent bystanders or staff in a video to comply with regulations.

Using the inbuilt video redaction in AXIS Camera Station one can easily pixelate parts of the video before exporting. Any individuals’ requests to access any personal data can be met quickly and efficiently due to the simple export of masked video.

Documentation

The GDPR puts a strong focus on surveillance system documentation, during the planning as well as the operation. One should be able to provide information about how data is processed and who will have access to the collected data, and must keep a written record of the operation. AXIS Site Designer and the installation verifier and logs in AXIS Camera Station provide useful information to document the installation.

Camera placement

Axis PTZ cameras support for 3D masking allow masking to be maintained when the camera’s field of view changes It’s crucial that the cameras only cover relevant areas, what the GDPR calls “data minimization”. It states that personal data must be “adequate, relevant, and limited to what is necessary for the purposes for which they are processed”. For example, if one wants to protect the shopfront, the cameras shouldn't include irrelevant parts of the street.

Static privacy masks should be utilized to prevent viewing of public areas such as windows. Axis offers privacy masking in most cameras. It enables selected areas of a scene to be blocked or masked from viewing and recording. Axis PTZ cameras with support for 3D masking allow masking to be maintained even as the camera’s field of view changes through panning, tilting, and zooming as the masking moves with the camera’s coordinate system.

AXIS Live Privacy Shield offers dynamic privacy masking. It’s a camera analytic, which one can use to monitor live indoor activities without collecting any sensitive personal data. It safeguards privacy by anonymizing people in a video but allows monitoring of activities or movements.

Accurate information

One must put up clear signs to inform third-party individuals that the area is under camera surveillance. They have the right to know the details of why they are being recorded and how the data will be used.

Individuals also have the right to access any personal data that one has collected, both an overview and the actual data.

Additional considerations

In addition to the areas already covered, general IT system security should be considered as this could lead to a data breach:

  • Make sure that the system is secure by implementing strong passwords and policies for all devices and software
  • Choose equipment from companies that apply cybersecurity best practices
  • Consider and if possible, restrict internet exposure
  • Ensure that all devices are running with the latest firmware since the newest version could close vulnerabilities
  • AXIS Camera Station, will prompt the user for firmware updates and simplify the management of the video surveillance devices
  • Ensure that the system supports encrypted data communication between devices in the system, such as HTTPS
  • AXIS Camera Station supports HTTPS between the server-client and the cameras so that the system handles data safely

Get the right partner

Offering the required third-party privacy protection and complying with the GDPR may seem overwhelming. And while an individual, as the data controller, is generally responsible for GDPR compliance, installers, distributors, and manufacturers are there to help and support.

With the right surveillance supplier or partner, users will get equipment that safeguards personal data, but also support and services that will take the weight off the shoulders. They can help get the best of both worlds – GDPR compliance as well as the safety and security that one needs.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Shop security systems
  • Mall security
  • Shopping centre security
  • Security management
  • Security devices
  • Security cameras
  • PTZ cameras
  • Covert cameras
  • Security camera systems
  • Store security
  • Store surveillance
  • Network cameras
  • Security service
  • Green security
  • Covert Surveillance
  • Video Management System
  • Network Video Recorders
  • GDPR
  • Video surveillance
  • Related links
  • Axis Communications Intruder detectors
  • Axis Communications Network Video Recorders (NVRs)
  • Infrared Surveillance cameras
  • Real Time Network Video Recorders (NVRs)
  • Thermal Surveillance cameras
  • Wireless Surveillance cameras
  • Related categories
  • Intruder detectors
  • Surveillance cameras
  • Network Video Recorders (NVRs)
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Related articles
AI Transformation In Video Surveillance By Hanwha Vision

AI Transformation In Video Surveillance By Hanwha Vision

Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft

Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft

HikCentral Lite V1.1.2: Streamlined SMB Security

HikCentral Lite V1.1.2: Streamlined SMB Security

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec