securitylinkindia

JK Tyre

JK Tyre Selects Matrix T & A Solution

JK Tyre & Industries Ltd. is an automotive tyre, tubes and flaps manufacturing company based in Delhi, India. The company is the only tyre manufacturer offering the entire range of four-wheeler radials for trucks, buses and cars. JK Tyre has a worldwide customer base in over 80+ countries. With production facilities in nine plants, total production capacity is almost 20 million tyres per annum. Challenges J K Tyres has its biggest manufacturing setup in Mysore. The premise comprises a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for thecompany. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tire some process. JK Tyres was looking for a vendor who could offer them a complete solution related to time-attendance and visitor management. Offered solution Matrix offered a time-attendance solution which centrally handles multiple shifts of workers and employees. Numerous shifts were created to manage the time-attendance of over 500+ workers. Moreover, they provided employee self service, which helped the employees view day-to-day attendance, apply for leave/ tour etc. JK Tyres further required a record of visitors so Matrix delivered visitor management software, which would help them create a visitor pass, fetch visitor records and generate reports of the same. Results Reduction in cumbersome HR tasks. Automatic maintenance of visitor records on day-to-day basis. 40% increase in productivity of employees and workers.  

Read More

The Proxim Advantage Video Security via Wireless

Over the years there have been two distinct trends that have combined to boost the video surveillance or monitoring market evermore into the forefront of discussions. The first has been the rise in terrorism, vandalism, refugee populations crossing borders and additional global turmoil. The second trend has been the advancement in video camera technology – from analog NTSC or PAL standard definition video formats to IP based cameras supporting full frame rate (30fps) 1080p HD video. The technology behind video security has progressed significantly in the last 10 years. With these new resolutions has come advanced technology, functions that were not possible before or were only available off a server in the central monitoring station are now done routinely, often in the cameras themselves. This refers to features such as facial recognition, automatic license plate readers, automatic red light cameras and more. What all these new smart, HD video cameras need is connectivity. Most of these applications require outdoor cameras While all these applications may seem to be unique, there are a few things all of them have in common. First, these deployments and features require good to excellent video definition quality. Standard definition is no longer acceptable, and running at 10 frames per second vs. a full rate of 30fps, is not acceptable. Second, almost universally these applications will have a high percentage of cameras being deployed outdoors, where the environment is harsh, units are unguarded and connectivity is seldom available. For video security the camera needs to be placed where it can perform it’s desired function, and not where there is a convenient fiber or Ethernet cable handy. Having a fiber strand within 10 feet of the desired location of a camera is not much better than being a mile away. It still requires permits, right of way negotiations and some level of digging. Market With all of these factors combined, the wireless video surveillance market is forecasted to reach $1 Billion in 2019. These numbers do not address the latest shifts in the video security market being driven by orthogonal applications. For example, cities deploying intelligent traffic systems use wireless to connect signaling lights in intersections. In many cases the decision is made to add a camera to the deployment, using the wireless network to support both the signaling traffics as well as the video traffic. When carriers or municipalities decide to deploy public Wi-Fi or hot spots, increasingly the request is bundled with a desire for adding a video camera to the hot spots deployment. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More

The Proxim Advantage Video Security via Wireless

High capacity With a typical security camera consuming up to 8 Mbps, to be effective the wireless network will likely be supporting more than one camera per network. Proxim offers a variety of Tsunami® products that support 10Mbps, 25Mbps, 50Mbps, 100Mbps, 240Mbps up to 633Mbps of useable bandwidth. Reliable video communications There are three main factors to reliable video communications: The network must have high availability (as much as 99.999%) The Tsunami® product line of outdoor wireless networking systems offer a full two year warranty. Proxim has customers who have deployed radios from ten years ago, have never been touched, and are operating today. With an field determined MTBF of well over 1 million hours for some product lines, up to over 2 million hours of MTBF for others, this equates to 1.5 to 3 seconds outage per year. The network must ensure the quality of the video stream in the face of radio frequency impairments or other traffic being carried on that wireless link In this application poor image quality is absolutely not allowed. It is no exaggeration to state that in many deployments lives are at stake, and the video system and in particular the network must be top quality. From a radio frequency performance perspective, Proxim builds into every unit it’s suite of interference mitigation technologies known as Proxim ClearConnect™ ensuring reliable wireless connectivity. While basic connectivity is a must, it is not enough to ensure ‘Reliable Video Communications.’ To meet this standard the wireless technology beyond the radio frequency layer must deliver high quality video images. This relates to the MAC layer used, and Proxim has spent the last 15 years developing, improving and delivering to the market the premier outdoor QoS MAC protocol – WORP®. With WORP® users of a Proxim Tsunami® network have the ability to set jitter and latency service level agreement for the traffic. Minimum data rates for video traffic can be reserved, and all of this is implemented in a network that can be supporting more than just the video, Voice over IP and sensor data can also be supported on the same wireless network with WORP® running. Video is unique in another way from typical data traffic, and in that it is almost all upstream. Meaning the vast majority of the traffic is coming from the camera and being uploaded to the network. Many systems are designed to be asymmetric, supplying more data capacity in the downstream, in the reverse. With Proxim the system is dynamic in it’s upstream/ downstream ratios and can easily move to 80% upstream lending support for this application. A large amount of video traffic is now transmitted as multicast, which most wireless vendors transmit as multiple unicast with massive increases in required bandwidth. Proxim supports multicast and IGMP snooping to ensure multicast streams are properly and efficiently transported over the wireless connections. The network must be secure – Video security traffic is mission critical and as such has work and it has to be secure. Proxim delivers on this requirement in multiple ways Over the air format – Unlike many wireless video systems that are based on and use standard Wi-Fi protocols, WORP® on Tsunami® networks is a Proxim owned, developed and secured protocol. It is impossible for example to use a Wi-Fi sniffer on Tsunami® traffic, unlike mesh systems which use common WiFi frames. The enclosures used in the Tsunami® product line are die cast aluminum, not plastic, and come with tamper proof seals. Encryption – every packet sent over a Tsunami® link is encrypted with AES 128 encryption.   Mobility Security is not required just on the street corner, or in a stadium, it must also operate on trains, trams, buses and even ferries. When looking at backhauling video traffic off of any of these platforms, the bandwidth demand from even one camera can reach gigabits per day. Assuming a 720p camera from the previous table is used, multiplying that by four or even more cameras per train car, per bus yields an instantaneous data rate requirement of 8Mbps and 700Gb per day. The options for transporting this traffic off of a mobile platform are typically restricted to Mesh Wi-Fi, Advanced cellular (LTE) or Proxim. Mesh: In the first case, as noted mesh is not secure and has a very difficult time supporting the necessary QoS required for quality video imaging. In addition handoffs between nodes in a Mesh network can be problematic, especially when confronted with hidden node issues. LTE: While the network can support this traffic, it is cost prohibitive. If a 720p camera is used, this equates to 700 Gb per day, and at a typical $10/Gb its cost can equate to $7,000 per day, per camera. With 2Mbps for standard def video @86k minutes/ day =175Gb of data per camera per day. Outdoor deployments With a significant percentage of the video security deployments taking place outdoors, the equipment has to be able to pass stringent specifications including a rating of IP66 or more. Proxim Tsunami® products are all IP67 rated, meaning they can be submerged in 1 meter of water for 30 mins with no water ingress. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More
puneet_bhasin

Role of Data Protection Officer (DPO) under General Data Protection Regulation (GDPR)

After four years of preparation and debate the General Data Protection Regulation (GDPR) was finally approved by the EU Parliament on 14 April 2016. The Regulation was adopted and published on 27 April 2016 and will be enforceable on and from 25 May 2018. The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU) whilst addressing the export of personal data outside the EU. It regulates the EU citizen data in every part of the world and in every organization processing or storing an EU Citizen’s data. The EU GDPR replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. This new law will have a profound impact on the operational and control environment of the organisations, not only within EU but also within the organisations based outside the EU including India. It extends the scope of EU data protection law to all foreign companies processing data of EU residents. It provides for a harmonization of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations. However, in some areas, the precise interpretation of the GDPR remains unclear, and businesses therefore face uncertainty in terms of their compliance obligations. To address this issue, the GDPR is supplemented by guidance issued by the Article 29 Working Party (WP29), an advisory body made up of representatives of the national Data Protection Authorities of each EU Member State. Provision for Data Protection Officer (DPO) The GDPR has a mandatory provision for the appointment of Data Protection Officer by pertinent organisations. The role of Data Protection Officer (DPO) is an important GDPR innovation and a cornerstone of the GDPR’s accountability-based compliance framework. In addition to supporting an organisation’s compliance with the GDPR, DPOs will have an essential role in acting as intermediaries between relevant stakeholders e.g., supervisory authorities, data subjects and business units within an organisation. All organisations who will be required by the GDPR to appoint a DPO should do this as soon as possible and well in advance of May 2018. With the authority to carry out their critical function, the Data Protection Officer will be of pivotal importance to an organisation’s preparations for the GDPR and meeting the accountability obligations. A DPO may be a member of staff at the appropriate level with the appropriate training, however, GDPR also provides for an option of an external DPO who will be shared by a group of organisations. It is important to note that DPOs are not personally responsible where an organisation does not comply with the provisions of GDPR. The GDPR makes it clear that it is the Controller or the Processor of the organisation who is required to ensure and to be able to demonstrate that the processing is in accordance with the GDPR. Data protection compliance is ultimately the responsibility of the Controller or the Processor. Who needs a DPO For the first time Data Controllers as well as Data Processors are required to appoint a Data Protection Officer in three situations as per Article 37(1) of the GDPR. Where the processing is carried out by a public authority or body Any organisation that is a public authority or a public body must appoint a DPO. However, the GDPR does not define the expression ‘public authority or body.” Rather, the GDPR leaves it to each EU Member State to determine which organisations are public authorities and public bodies. Where a private business performs outsourced public functions on behalf of a public authority or a public body, the WP29 recommends that such business should appoint a DPO, not merely in relation to those outsourced public functions, but also in relation to all of the other data processing activities of that business, including processing activities that are unrelated to the outsourced public functions. Where the core activities of the Controller or the Processor comprise processing operations, which require regular and systematic monitoring of data subjects on a large scale Under this provision companies whose primary activities involve processing personal data on a large scale for the purposes of behavioural advertising, online tracking, fraud prevention, detection of money laundering, administering loyalty programs, running CCTV systems, monitoring smart meters etc., will be caught by the DPO requirement. Core activities can be defined as the key operations necessary to achieve an organisation’s (Controller or Processor’s) goals. For example, a private security company which carries out surveillance of private shopping centres and/ or public spaces using CCTV would be required to appoint a DPO as surveillance is a core activity of the company. On the other hand, it would not be mandatory to appoint a DPO where an organisation undertakes activities such as payroll and IT support, as while these involve the processing of personal data, they are considered ancillary rather than core activities. Where the core activities of the Controller or the Processor consist of processing on a large scale of special categories of data or personal data relating to criminal convictions and offences Article 37(1)(b) and (c) requires that the processing of personal data be carried out on a large scale in order for the designation of a DPO to be triggered. Article 37(1)(c) addresses the processing of special categories of data pursuant to Article 9, and personal data relating to criminal convictions and offences set out in in Article 10. Qualifications Article 37(5) of the GDPR provides that a Data Protection Officer shall be designated on the basis of professional qualities, and in particular, expert knowledge of data protection law and practices, and the ability to fulfil the tasks referred to in Article 39. “It is important to note that DPOs are not personally…

Read More

The Proxim Advantage Video Security via Wireless

Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More

The Proxim Advantage Video Security via Wireless

Over the years there have been two distinct trends that have combined to boost the video surveillance or monitoring market evermore into the forefront of discussions. The first has been the rise in terrorism, vandalism, refugee populations crossing borders and additional global turmoil. The second trend has been the advancement in video camera technology – from analog NTSC or PAL standard definition video formats to IP based cameras supporting full frame rate (30fps) 1080p HD video. The technology behind video security has progressed significantly in the last 10 years. With these new resolutions has come advanced technology, functions that were not possible before or were only available off a server in the central monitoring station are now done routinely, often in the cameras themselves. This refers to features such as facial recognition, automatic license plate readers, automatic red light cameras and more. What all these new smart, HD video cameras need is connectivity. Most of these applications require outdoor cameras While all these applications may seem to be unique, there are a few things all of them have in common. First, these deployments and features require good to excellent video definition quality. Standard definition is no longer acceptable, and running at 10 frames per second vs. a full rate of 30fps, is not acceptable. Second, almost universally these applications will have a high percentage of cameras being deployed outdoors, where the environment is harsh, units are unguarded and connectivity is seldom available. For video security the camera needs to be placed where it can perform it’s desired function, and not where there is a convenient fiber or Ethernet cable handy. Having a fiber strand within 10 feet of the desired location of a camera is not much better than being a mile away. It still requires permits, right of way negotiations and some level of digging. Market With all of these factors combined, the wireless video surveillance market is forecasted to reach $1 Billion in 2019. These numbers do not address the latest shifts in the video security market being driven by orthogonal applications. For example, cities deploying intelligent traffic systems use wireless to connect signaling lights in intersections. In many cases the decision is made to add a camera to the deployment, using the wireless network to support both the signaling traffics as well as the video traffic. When carriers or municipalities decide to deploy public Wi-Fi or hot spots, increasingly the request is bundled with a desire for adding a video camera to the hot spots deployment.   Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. High capacity With a typical security camera consuming up to 8 Mbps, to be effective the wireless network will likely be supporting more than one camera per network. Proxim offers a variety of Tsunami® products that support 10Mbps, 25Mbps, 50Mbps, 100Mbps, 240Mbps up to 633Mbps of useable bandwidth. Reliable video communications There are three main factors to reliable video communications: The network must have high availability (as much as 99.999%) The Tsunami® product line of outdoor wireless networking systems offer a full two year warranty. Proxim has customers who have deployed radios from ten years ago, have never been touched, and are operating today. With an field determined MTBF of well over 1 million hours for some product lines, up to over 2 million hours of MTBF for others, this equates to 1.5 to 3 seconds outage per year. The network must ensure the quality of the video stream in the face of radio frequency impairments or other traffic being carried on that wireless link In this application poor image quality is absolutely not allowed. It is no exaggeration to state that in many deployments lives are at stake, and the video system and in particular the network must be top quality. From a radio frequency performance perspective, Proxim builds into every unit it’s suite of interference mitigation technologies known as Proxim ClearConnect™ ensuring reliable wireless connectivity. While basic…

Read More