securitylinkindia

Bosch FLEXIDOME video cameras with remote commissioning

Reliable video cameras for construction sites monitored by Kooi Construction sites often require video monitoring to secure the area and prevent vandalism or theft. Kooi Camera Surveillance equips such sites with temporary video surveillance solutions. The company provides customers – such as solar farm developer Powerfield – with mobile masts fitted with high-tech video cameras. The solutions capture footage while a remote monitoring team responds when an alarm is triggered. Proof of concept to find the best fit Costly, complicated false alarms had become a major pain point for Kooi. The company set out to find a new video camera partner that offers an intelligent video camera concept. A proof of concept ensured the solution selected would lower the number of false alarms Kooi had been facing. Their requirements for the new solution were clear: Bosch video cameras emerged as the winner. They reduce false alarms even in challenging weather conditions. Reliable on-the-edge Intelligent Video Analytics (IVA) ensures minimal data usage. Seamless Genetec integration & best-in-class security Before selecting a camera provider, Kooi had already chosen Genetec software for alarm controls. The chosen cameras not only support Genetec technology, but also seamlessly integrate it into the ecosystem. This means cameras and alarm processing are fully in sync for a streamlined security solution. Moreover, the cameras are designed to uphold high security standards, keeping the data they capture safe and sound. Clients rave about video surveillance that always works Kooi’s client Powerfield immediately noticed the benefits of the upgraded mobile masts with new video cameras. “The image quality of the FLEXIDOME cameras is really good,” said Henk Haaksma from Powerfield, “Thanks to live viewing of images I can check in anytime, anywhere. The AI delicately filters out unnecessary alarms. If something serious happens, the operator sees it, understands it, and responds immediately. It just always works.” Henk Haaksema is satisfied with overall solution. The switch from the FLEXIDOME IP starlight 7000 to the 8000i series also brought a significant reduction of unnecessary alarms. And the system is ready for whatever comes next. A partnership built on trust Success of this rollout didn’t happen by chance. It was built on a strong partnership with Kooi. The team worked closely with Kooi from day one – listening, adjusting, and ensuring the solution truly met their needs. Kooi didn’t just get a product, but a partner who supports them, today and tomorrow. Main benefits Read More

Read More

Protection Against Harm to property : Dominion, Deprivation, Prop-tech and Remedies

Introduction: The Shifting Sands of Property Protection In this article we discuss briefly about the concept of property. ‘Property’ lies at the heart of both economic organization and individual liberty. Property represents not merely material possessions but also the social, legal, and moral recognition of ownership and control over tangible and intangible assets. In legal terms, property entails a bundle of rights – possession, enjoyment, and transfer that define the individual’s relationship with things and society’s recognition of those relationships. According to the Allianz Global Wealth Report 2025, in a study, covering nearly 60 countries, it was revealed that financial assets of Indian households rose strongly to 14.5% in 2024. The structure of Indian households’ financial savings has deposits, gold as well as instruments such as stocks, small savings and government bonds, and provident and pension funds. The structure of the assets primarily has deposits, gold and silver, immovable property (residential or commercial), market shares, and to some people, intellectual property. About 73% of households own a house, 50% own a two-wheeler and 8% own a car as property.1 This article hence, puts effort to address cardinal laws governing both movable and immovable property along with brief discourse on various aspects critical to their legal attributes. Dominion: Charting the Evolution of Property and Ownership In ancient India, private land ownership, including the right of alienation, was primarily held by the priestly elite and acquired through formal land grants. Over time, the notion of private land ownership evolved into a vital social institution based on confluence of factors, including economic challenges of the period and allocation of land to officers, religious institutions, and other entities in exchange for services rendered. Historically, the evolution of ‘property’ as a legal concept can be traced to the colonial imposition of English common law through the Indian Penal Code, 1860 (IPC). Under the Constitution, the right to property was originally enshrined as a fundamental right under Articles 19(1)(f) and 31 of the Constitution in 1950, protecting citizens against arbitrary deprivation of property. However, due to socio-economic reform needs especially in land reforms along with its redistribution, and conflicts between individual rights and public interest the right to property underwent several constitutional amendments. The most significant change occurred with the 44th Amendment Act of 1978, which removed the right to property from the list of fundamental rights and relegated it to a legal right under Article 300A. This shift empowered the state to acquire private property for public purposes under authority of law, while still protecting owners from arbitrary deprivation. The judicial system has also played a key role in interpreting and reshaping these rights through landmark rulings over the years, balancing development needs and individual rights. Case of Kesavananda Bharati vs. State of Kerala (1973), while primarily concerned with the scope of Parliament’s amending power under Article 368, significantly illuminated the constitutional dimension of property. Though the right to property ceased to be a fundamental right after the 44th Constitutional Amendment (1978), it remains a vital constitutional and statutory right under Article 300A. The judgment reaffirmed the notion that property, though modifiable by the state, cannot be arbitrarily deprived, and that the rule of law forms an immutable part of the basic structure of the Constitution. In international law, Article 17 of the Universal Declaration of Human Rights (UDHR) asserts that every individual has the right to own property and cannot be arbitrarily deprived of it. Notably, the right to property was excluded from the 1966 International Covenants, making it one of the few rights articulated in the UDHR not incorporated into legally binding treaties. Furthermore, the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD) (1965) and the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) (1979) refer property rights, underlining the principle of non-discrimination. The Property Landscape Under Indian Law The Transfer of Property Act, 1882 establishes the framework for property transfer in India, using terms such as movable, immovable, tangible, and intangible to categorize property types. While these terms are not defined in this Act, they are clarified in the Registration Act, 1908. Movable and Immovable Property Unlike immovable property – such as land or buildings – movable property can be physically relocated from one place to another without altering their essential character or value. Tangible and Intangible Property Tangible property has a physical presence and economic value, including items like jewelry and vehicles. In contrast, intangible property, which lacks physical existence, includes securities, software, and intellectual property. Intellectual property arises from creative endeavors and are governed by laws that are distinct from general property law. Corporeal and Incorporeal Property Corporeal property has physical existence and can be owned such as jewellery and electronics unlike incorporeal property that consists of rights like copyrights and lease rights. Public and Private Property Public property is owned by the government for public use, including parks and hospitals, while private property is owned by individuals or entities for personal use, such as land and houses, trademarks, etc. Property in Indian Penal Code, 1860 and Bharatiya Nyaya Sanhita, 2023 The Indian Penal Code, 1860 (IPC) Chapter XVII, titled ‘Offences Against Property,’ encapsulated this protection through provisions on theft, extortion, robbery, dacoity, criminal misappropriation, and criminal breach of trust. However, the rise of the digital economy, cyber assets, and intangible property forms such as data, cryptocurrency, and intellectual content have blurred the traditional boundaries between ‘things’ and ‘information.’ This called for a re-examination of how ‘harm’ to property is conceptualized in modern law. The Bharatiya Nyaya Sanhita, 2023 (BNS), enacted to replace the IPC, attempts to modernize this approach by reclassifying and redefining several offences against property. While maintaining the structural resemblance to Chapter XVII of the IPC, the BNS incorporates technological realities that increasingly define harm in the 21st century. Recognition under BNS of electronic data and digital assets Hacking (i.e., unauthorised access) Section 378 IPC is now Section 303 BNS, that provides – although digital data is intangible,…

Read More

VIVOTEK’s AI Solutions Proactively Enhance Campus Safety

Safer Learning Environments: Drive Global Market Expansion In recent years, campus safety and student mental health have drawn growing attention. Government data in Taiwan show a rise in emotional and stress-related issues among students aged 15-24. Unauthorized attempts to enter campuses still occur, unsettling students and staff. Strengthening security management and proactive alerting has therefore become a priority for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions, VIVOTEK (3454-TW), the leading global security solution provider, has been promoting its AI-driven education security solutions, designed to proactively detect risks and safeguard school environments. According to a report by research firm GII, the global education security market is projected to reach USD910 million in 2025 and grow to USD1.6 billion by 2030, representing a compound annual growth rate (CAGR) of 11.96%. As AI video analytics, edge computing, and cloud management platforms mature, security systems are evolving beyond passive video playback into an era of real-time detection and proactive response. In education settings, AI can automatically detect intrusions into restricted zones and trigger instant alerts, enabling security personnel to make swift and informed decisions. In recent years, campus safety and student mental health have drawn growing attention. Government data in Taiwan show a rise in emotional and stress-related issues among students aged 15- 24. Unauthorized attempts to enter campuses still occur, unsettling students and staff. Strengthening security management and proactive alerting has therefore become a priority for schools Recently, VIVOTEK deployed a comprehensive education security solutions at a renowned national university in Taiwan, installing hundreds of AI Bullet and Fixed Dome cameras across entrances, rooftops, classrooms, corridors, walls, elevators, and parking areas. Integrated with the VAST Security Station (VSS) Pro platform, the system delivers: With comprehensive, AI-enabled coverage, schools can monitor in real time and avert risks, fostering safe, welcoming, and sustainable learning environment. Beyond Taiwan, VIVOTEK’s education security solutions are also used in the United States, Belgium, and Indonesia, tailored to local needs to build a global network of smart, sustainable campuses. Read More

Read More

The Tangible Advantages of Flir Nexus

While many security professionals are becoming increasingly aware of Flir Nexus, some remain unclear on the tangible advantages this advanced innovation can offer. So, who better to provide a few key insights than Flir Security Software Architect and all-round Nexus Guru, Ignacio Vilches Rojo? Flir Nexus: What is it and what tangible gains does it provide in thermography and perimeter security applications? A good way to understand Flir Nexus is to first grasp the central challenges facing security managers today. According to Ignacio, the primary one here is the need for greater situational awareness. “This includes understanding a given circumstance, collecting and analysing relevant information, and making informed decisions to address any potential risks,” he explained. In thinking about a conventional design for perimeter security, many would expect the system to include a variety of detection and data handling/ processing technologies. Flir typically works with customers to create a virtual barrier that comprises a combination of thermal and visible cameras, and radar-which are then coupled with detection analytics. These cameras work together, using Nexus as the communication protocol, and provide accurate information to track people, animals or vehicles. It’s the action that follows a perimeter breach that determines how a security team should respond. Unfortunately, this is where we see gaps in security system designs which ultimately mean the operator does not have total situational awareness But there is one key point to consider here: “It’s the action that follows a perimeter breach that determines how a security team should respond. Unfortunately, this is where we see gaps in security system designs which ultimately mean the operator does not have total situational awareness.” Reading the Situation: How Flir Nexus Enhances Situational Awareness Flir Nexus is a software and proprietary communication protocol for thermal imaging systems that helps bridge the gap between devices and systems, ensuring a more complete understanding of the environment outside and inside a security perimeter. To execute a high level of situational awareness, a customer typically requires some form of advanced software that collects the geodata presented by different sensors before co-ordinating proper hand-offs as the target moves. Flir Nexus meets this ambition in a different way. It allows edge devices to communicate in a server/client format without the need for any software or a server in the middle, reducing the cost of ownership. Right now, Nexus is the only protocol that permits access to all the different features and settings required to achieve a high level of integration with Flir sensors, providing you with the best image. Notably, the camera becomes a server by definition because it provides functionality that can be connected to and used. It also becomes a client of other cameras using the Nexus protocol. I see this as a further differentiator that allows us to really ‘explode’ Nexus features for use by the cameras themselves, providing access to a whole new world of possibilities Flir Nexus devices facilitate straightforward installation since all edge devices communicate in real-time, only requiring simple configuration. “When combined with our camera analytics for detection, Nexus can identify, locate and track targets at the edge,” continued Ignacio, “As a potential threat moves through the scene, Nexus-enabled devices communicate the geodata to other Nexus devices and provide seamless hand-offs for continuous tracking. This capability ensures you have complete situational awareness to make informed decisions.” Another advantage is that Nexus allows customers to extend their coverage over large areas using fewer devices, making the provision of total situational awareness far more affordable. The Flir Nexus Difference: Futureproof, Modular, and Intelligent Nexus’s modular architecture is a major market differentiator. Its strategic building block approach forms a robust, multi-layered, and fully integrated security solution. Always employing the same base structure to help create the optimal solution ensures backwards compatibility, simplifying the task of making future additions or changes, even if they take place many years down the line. This level of futureproofing ensures Nexus retains its considerable capability advantages. “By combining thermal, visible and ground-based radar imaging with Flir’s classification analytics, the multi-layered Nexus helps detect, identify, track and act over a long range and in any weather conditions,” added Ignacio, “Notably, you can detect threats in real time, which is important for rapid response and the ability to adapt continuously in the face of security breaches.” While many other communication protocols exist, some of which are open, most were developed and defined before the widespread adoption of thermography processes in the security arena. At that time, developers were instead focusing on visible spectrum cameras. “Right now, Nexus is the only protocol that permits access to all the different features and settings required to achieve a high level of integration with Flir sensors, providing you with the best image. Notably, the camera becomes a server by definition because it provides functionality that can be connected to and used. It also becomes a client of other cameras using the Nexus protocol. I see this as a further differentiator that allows us to really ‘explode’ Nexus features for use by the cameras themselves, providing access to a whole new world of possibilities.”   A Sense of Space: How Flir Nexus Integrates Radar and Geodata A good example involves the integration of radar. By providing detection from radars as points in space (latitude and longitude), it becomes possible to show them on a map, point to them with cameras, or simply provide alarms – a major advantage in security. “Why not create a ‘window’ from a video and make objects appear in the real world through latitude and longitude co-ordinates,” explained Ignacio, “It required advanced mathematics, and you need good calibration to ensure accuracy, but using Nexus ultimately means a target in the video now becomes a target in the real world, where things happen and make sense. Seeing an object on a map means you really see it moving towards you. It has more meaning.” He added, “Nexus is the software… is the protocol… is a way of working. It’s far more than a translator,…

Read More

New Report Reveals Brazilians Face 252 Scam Encounters Annually Despite High Confidence in Spotting Fraud

State of Scam Brazil Report Shows R$99 billion Lost;Cross-Sector Webinar to Address Growing Crisis The Global Anti-Scam Alliance (GASA) has released its State of Scam Brazil Report 2025 revealing an alarming disconnect between confidence and vulnerability – while 75% of Brazilians believe they can recognize scams, 70% have fallen victim to at least one within the past year. The report estimates total losses at R$99 billion, underscoring the urgent need for coordinated action across sectors. Part of a landmark global study covering 42 markets and interviewing 46,000 people worldwide, the Brazilian findings from 1,000 adults paint a troubling picture of daily vulnerability. Brazilians encounter scams on average once every day and a half – totaling 252 encounters per person annually. These encounters occur most frequently through phone calls (65%), text messages (55%), and email (55%), with shopping scams emerging as the most common type of fraud. “Scams have become part of everyday life in Brazil. The fact that most people feel confident spotting scams, yet continue to fall for them, shows how sophisticated and convincing these schemes have become,” said Renata Salvini, GASA Chapter Director Brazil, “Education, prevention, collaboration, and accountability must go hand in hand if we want to stop this cycle.” The human cost beyond financial loss The report reveals that 86% of scam victims felt very or somewhat stressed by their experience, while 59% reported significant or moderate impacts on their mental wellbeing. On average, each victim has been scammed 1.9 times in the past year, demonstrating how repeat victimization compounds both financial and psychological harm.Despite the prevalence of scams, reporting remains disappointingly low. While just over two-thirds of those exposed have reported an incident, 60% of those who did report said either no action was taken (44%) or they were unsure of the outcome (16%). Among those who never reported, 44% cited the belief that reporting wouldn’t make a difference – reflecting a troubling perception that the problem is unmanageable. Read More

Read More