securitylinkindia

titelbild_vectron

Vectron and MOBOTIX Heightened Security and Improved Prevention

Vectron, a leading provider of point of sale systems for bakeries and restaurants, and MOBOTIX, a leading provider of digital, high-resolution and network-based video security systems, are offering a joint video solution for retail establishments, restaurants and bakeries. This involves linking the transaction data from the Vectron point of sale system for each sales process with video data from the MOBOTIX IP camera and storing it. This allows POS discrepancies to be quickly resolved, increases on-site security at retail locations, bakeries and restaurants, and boosts sales by enabling optimized shop planning based on integrated MOBOTIX video analysis tools. Joining forces to resolve inventory variances Nearly €4 billion is lost yearly as a consequence of annual inventory differences in the retail sector in Germany alone, according to the EHI Retail Institute. In light of this, using the latest video security technology is a better option than ever. Moreover, when combined with classic protection measures, it opens up entirely new opportunities. This is where the joint solution from Vectron and MOBOTIX comes in. Transaction data from a point of sale is continually sent to a MOBOTIX camera in the form of POS events and linked with the camera footage in an intelligent way. The MOBOTIX Management Center (MxMC) 1.7 can be used to conveniently search through the saved POS data based on individual criteria, and the respective corroborating image can be shown for each event. Users can evaluate video images saved in encrypted form from their office as well as from any additional MxMC workplace around the world – such as one at company headquarters – through a secure Internet connection. POS processes can be analyzed based on item, price or employee, among other criteria. MxMC displays the relevant camera footage for the respective transaction and includes practical search functions. This enables users to securely document and review disputed cash transactions. In addition to using the features provided by MxMC, users can also directly view the latest transaction in the browser of the Vectron POS system. As such, the joint solution from Vectron and MOBOTIX helps users quickly resolve POS differences, and also has a loss preventative effect. Optimizing sales and security I f a company is using a hemispheric MOBOTIX camera with MxAnalytics (such as the Q26), objects as well as people can also be counted, and their movements can be depicted in a heat map. This provides retailers with additional customer-specific information such as the duration of stay, movements in the opposite direction, turns, very fast movements or entry into defined areas. This information provides retailers with key added value. Based on the optimal overview they receive, as well as the movement heat map and the transaction data, companies can optimize personnel deployment and shop design. All in all, companies benefit from this solution: It increases on-site security, minimizes costs and helps boost sales by enabling optimized shop planning based on video analysis data. The solution was also specially developed to accommodate the requirements of the new European General Data Protection Regulation (GDPR). As such, it enables companies to carry out POS analysis compliant with this new data protection legislation. Technical specifications The solution can be used with MxManagement Center 1.7 or later and is compatible with all current Vectron POS systems and MOBOTIX Mx6 cameras (firmware version MX-V5.0.2.14 or later). The MxAnalytics video analysis tools are part of the complete solution and do not require any additional costs or infrastructure.

Read More

Reducing Downtime for the Surveillance System

It seems that everywhere you look, there is a surveillance camera looking back at you. Video surveillance has become an absolute necessity for every type of organization – whether it be retail, hospitality, gaming, education, infrastructure or government – or any other type of business. When a crime is committed or a tragedy occurs, there is now an expectation that it will have been recorded on video, and this usually proves to be true. As a society, we have come to depend on this video to provide us with the documentation we need in many different types of situations. However, our video surveillance systems are under constant attack. Every day, thousands of video cameras are knocked out of service, not by criminals with evil intent, but by something much more lethal and simple i.e., power surges. In fact, between normal fluctuations of power, lightning strikes and other power disruptions, virtually every video surveillance camera is at risk of going out of service either temporarily or permanently. When your surveillance system experiences a power surge, there are three possible negative outcomes: damage, destruction and downtime. A damaged or destroyed system requires repair or replacement, which can be extremely costly and time-consuming. But the downtime caused by this damage or destruction is by far the worst consequence of power surges. When a video surveillance system is no longer functional, it has much wider consequences for the organization that put it into place. When surveillance systems stop functioning, it becomes more difficult for security teams to do their jobs effectively. If there is a theft or other crime committed while video cameras are down, it will be much more difficult to identify the criminal without video of the incident. Hazardous situations like an ice patch on an outside walkway could go unnoticed while numerous individuals lose their footing on the spot, until someone falls, breaks an arm and sues the company. Liability will rise accordingly without video to confirm whether a claim is false. Facilities must be evacuated when the fire alarm systems stop functioning. When security systems are out of service, parking lots, doors, and secure areas may need to be patrolled by temporary guards at an additional cost. There is also a loss of productivity if staff is delayed by congestion and manual processes at entrances, or if their work equipment and/ or work data is damaged or lost. Downtime can also cause a potential loss of customer confidence and business volume. If a customer uses social media to complain about a website being down for a few hours, the resulting negative impact can be detrimental to a business for an extended time. To help avoid this type of situation, there are steps security professionals can take, both during the installation process and after systems are in place. Installing surge protection to keep systems up and running in the event of a power surge is simple, and as these examples show, the ROI is immense. As surveillance systems are the eyes and ears of a business, it’s crucial to keep downtime as minimal as possible. Downtime and its impact on specific verticals Billions of dollars are lost each year by businesses and other organizations due to theft, false injury claims, vandalism and more, highlighting the importance of maintaining fully operational video surveillance systems. Beyond the shared concerns of identifying criminals, providing evidence etc., downtime presents a number of different specific threats to various vertical markets. Safe cities In the past few years municipalities have become enormously dependent on surveillance video to help with in vestigations. Often this video provides the only evidence to identify individuals and prove criminal action. As more and more cities deploy video surveillance, the number of incidents where it is proven to be irreplaceable as a security resource will only continue to grow. And because so much of the infrastructure for municipal surveillance is installed outdoors in exposed locations, it is more vulnerable to the risk of downtime due to lightning strikes and other unprotected surge sources. Casinos and gaming For casinos and other gaming establishments, compliance regulations require video surveillance to be up and running 100% of the time. If video is interrupted at any time, business operations must be shut down completely, causing total loss of business revenue until the system can be repaired or replaced. No casino could survive a complete business stoppage for long – making downtime a virtually fatal situation. Higher education and K-12 The number of risk factors present on school campuses is immense – from abduction of students to vandalism or theft, and much more. For every one of these adverse events, video surveillance is of vital importance for apprehending thieves, kidnappers and other criminals; and with so many different life safety and other electronic/ electrical systems in place, the possibility rises for a power strike or surge that would cause devastating downtime. Retail Stores, malls and all types of retail establishments absolutely require their video surveillance systems to be up and running in order to protect them against losses from shoplifting, sweet-hearting, vandalism and more. Without a working surveillance system many of these crimes would simply go undetected, though their negative effect on the bottom line would be unmistakable. Retailers literally cannot afford downtime. A simple step to protect devices To avoid the possibility of downtime for the video surveillance system, it is imperative to include surge protection devices in your planning right from the start, and anytime you expand, improve or install a surveillance system. Surge protection is quite easy and reasonable in cost to add, and it is an insurance policy for your organization, providing protection from every type of power event. For video surveillance systems, it is recommended that surge protection be installed at every external camera, including outdoor PoE or PoE+ IP cameras. Surges can travel through cabling from a remote device, damage or destroy a network switch, and possibly cause further issues with other switch-connected devices such as servers running VMS software. If…

Read More

The Influence of Lens Selection

Image resolution versus field of view One important, but often neglected consideration in video surveillance systems design is the trade-off between image resolution and field of view. With any given combination of camera and lens the native resolution from the camera is spread over the entire field of view of the lens, determining pixel density and image resolution. The wider the resolution is spread, the lower the pixel density, the lower the image resolution or image detail. The images below, taken with the same camera from the same distance away, illustrate this trade-off. The widest field of view allows you to cover the widest area but does not allow you to see high detail, while the narrowest field of view permits capture of high detail at the expense of wide area coverage. The next series of images, each taken with the same high resolution camera from the same distance away similarly illustrates the trade-off of high detail and ability to identify a person when using a wide angle of view lens and the ability to cover a wide area. Other ways to improve image detail So now you see the trade-off. You would like to cover the whole area, but unfortunately you are not able to read the license plate. What to do? At this point, there are a few other variables that you may be able to change in your system design to improve image detail. First is the distance from the camera to the subject. If possible, the installer could improve the image detail by moving the camera closer to the subject. This may be feasible in a new installation, but in an existing system this may be limited by the physical constraints of the location and the system, as well as costs associated with re-cabling. Moving closer improves the image detail, but field of view is reduced. The second variable that may be changed is the camera resolution. By selecting a higher resolution camera with a higher starting number of pixels and spreading them over the same field of view as before, the pixel density will be higher and the resulting image detail will be better. Of course, this assumes you can make that change in your system and you can support the likely higher priced hardware and data storage needs required with higher resolution systems. The higher resolution, data intensive cameras will also lower the frame rate of the system which must also be kept in mind especially with industry specific standards and requirements. Use available tools There are many useful tools available to help support systems design and correct equipment selection. One of those is Theia’s own image resolution and lens calculator. The calculator allows you to input some important details of your application and potential equipment, then quickly calculates image resolution with those assumptions. You input the camera resolution and sensor size you intend to use, the lens field of view you believe you need, then input your key project variables – either how much resolution you think you need in terms of pixel density, how much coverage you need in distance (feet or meters), or how far away the camera is from the subject. The tool then calculates the other variables for you. For example, you indicate you plan to use a 5 megapixel 1/2.5” sensor camera, a 3mm lens and you will be 50 feet away from your subject. The tool will calculate your pixel density – in this case 27 pixels/ foot, and coverage width – here 97 feet wide. The tool then provides an image that represents the level of image resolution you would get for your selected variables allowing you to quickly see if you have enough resolution to meet the needs of your application. The newest iPhone and iPad versions of Theia’s calculator App include enhancements that allow users to input the camera height and/ or camera angle so that one can tell if a person’s head, for example, will be covered in the image given different distances from the camera. The latest version also allows the user to introduce a level of jpeg noise so that the resulting image more accurately reflects real world conditions. The importance of lens selection If you decide to increase your image resolution by increasing the camera resolution, you must also consider lens selection. The lens needed for an IP/ megapixel camera is much different than the lens needed for a traditional analog camera. These higher resolution cameras demand higher performance lenses in order to take full advantage of the increased resolution. For instance, in a megapixel camera, the focal plane spot size of the lens must be comparable or smaller than the pixel size on the sensor (Figures A and B below), otherwise the light falls off the pixel resulting in a fuzzy image.Using a standard resolution lens with a 5 megapixel camera will produce a blurry image. Most often if you want to take advantage of all the pixels a multi megapixel camera provides, a high quality lens with matching resolution is needed otherwise the money spent on a high resolution camera is wasted. One would assume, then, that all someone specifying a megapixel camera needs to do is specify a megapixel lens. However, it’s not that simple and in many cases it can be quite difficult to ensure that the lens needed is the lens being offered. Traditionally, just about any decent lens would do the job for traditional analog cameras so specifying the lens wasn’t a problem. As a result, too many designers and integrators are still unaware that for megapixel cameras not all lenses are created equally. In megapixel cameras the pixel size and the required lens spot size varies depending on the size of sensor and quantity of pixels it contains. You can have 2 different cameras, both 1.3 megapixel, but if the sensor size is not the same the pixel size will be different. The figures below illustrate this. In selecting a lens it…

Read More

E-attendance BI’s Knock on the Door

In 1865 Richard Miller Devens, while talking about the then banker Sir Henry Furnese, in the book ‘Cyclopaedia of commercial and business Anecdotes,’ coined the term ‘Business Intelligence.’ The book states that Sir Furnese would maintain a complete and perfect train of business intelligence, throughout Holland, Flanders, France, and Germany. This resulted in him gaining various profits owing to his early receipt of information. In 1989 Howard Dresner proposed Business Intelligence as an umbrella term, to describe concepts and methods to improve business decision making by using fact based support systems. Later, Dresner became a Gartner Group Analyst, and today Business Intelligence is defined as an umbrella term in Gartner’s Glossary that includes the applications, infrastructure and tools, and best practices that enable access to, and analysis of information to improve and optimise decisions and performance. Pulling together these definitions, the analysis of information for profitability can be framed as the core purpose of Business Intelligence (BI). On the basis of the information available in our surroundings and definitions, it can be perceived that an organisation looking for business intelligence might have to go through heavy transitions in order to implement it. The required tools along with the information flow, need to be verified. The perception moves against BI for small scale industries, and when it comes to private security providers, BI struggles to find a seat among various operational requirements. BI and private security organisations Musselman and Jackson in 1992 defined business as an activity that meets the needs of society and the economy, and the company that is organised to engage in these activities. For private security sector the definition summarises business as the activities involved in providing security to customers and their belongings. Griffin and Ebert extended the business definition to providing goods and services to earn profit. This definition includes the business owners’ or managers’ interest. The organisations’ aim to maximise their profit makes it necessary for the decision makers to think out of the box. The usual practises are being challenged with the change of technology, and technology is evolving on day to day basis. Recently, some out of box solutions have been introduced around the world. Google, in an event recently had introduced a new level of artificial intelligence (AI) solution which can make calls on behalf of the user. Alexa, the amazon’s virtual assistant is now easily available in the market. Microsoft has been talking about the power of AI for a while. AI is filling gaps between human imagination and reality. Business is a different game altogether. Imagination has different meanings and definitions in business and therefore BI, as has been highlighted above, is business’s answer to profitability. The private security sector has a complex operational process. Remoteness is a crucial factor with its respective impact on every business step, from recruitment to delivery of services. While we mention the various business steps we shall not overlook the point that all the steps have the delivery of services as their epicentre. After all, it’s the delivery of services, i.e., the guards’ presence at the customer location that turns into earnings. This makes the attendance and allocation of guards, the front-runner for BI in the private security sector. BI is dependent on data and its utilization. In case of attendance, there are numerous solutions now available in the market which can help the agency to sail towards BI and profitability. Some of the possibilities and solutions are as follows. Biometrics A common practise apart from the pen and paper is the use of biometrics. The staff can punch their movement time, but the biometric’s output needs to be merged with the existing system before it turns into a meaningful resource. Biometrics, though low cost, is more of an old age solution, and the attendance process at the time of shift change, at customer’s location, can become messy. Also, it requires installing the machine at the customer’s premises. Looking from the future perspective, biometrics and BI do not gel-in as a solution. Video cameras Video cameras have now become an integral part of the security industry. Usually, it is considered as an agent to serve customers, but video cameras can help with attendance marking as well. Video analysis, a new trend in the market, is a technique of automatically analysing video and determining events like guards entering the premises, leaving the premises etc. Though the solution sounds interesting, it faces challenges on the cost front. Video analytics is an expensive option and organisations would prefer this kind of solution at high end locations only. RFID Radio frequency identification, popularly known as RFID, uses electromagnetic fields to detect the object. The common practise is to use RFID tags as identification cards and whenever the person holding the card enters the premises, their attendance is marked automatically. The RFID is useful when the agency can ensure that the guards will enter and leave from the specified gate or the RFID reader only. Also, the malpractices such as a guard giving his card to another fellow and leaving his duty cannot be controlled through RFID. The control measures for such malpractices can again be expensive or may even struggle with feasibility issues. GPS based attendance An interesting solution that has evolved with the growth of mobile phones is GPS based attendance. The agency can ethically track their guards and their movement. The solution’s usefulness is not just restricted to attendance marking, but can be used for various other services also. Various agencies have tried this method through either their telecom provider or through other service providers. With telecom providers, due to the established infrastructure, the cost might look to be on the lower side but connectivity emerges as an issue. Along with the connectivity, the low cost solution may give only brief information, which might fail the main purpose of having GPS based system. The service providers dealing in GPS can provide meaningful data, but then, the solution needs to be implemented at the bottom of…

Read More

The Proxim Advantage Video Security via Wireless

Over the years there have been two distinct trends that have combined to boost the video surveillance or monitoring market evermore into the forefront of discussions. The first has been the rise in terrorism, vandalism, refugee populations crossing borders and additional global turmoil. The second trend has been the advancement in video camera technology – from analog NTSC or PAL standard definition video formats to IP based cameras supporting full frame rate (30fps) 1080p HD video. The technology behind video security has progressed significantly in the last 10 years. With these new resolutions has come advanced technology, functions that were not possible before or were only available off a server in the central monitoring station are now done routinely, often in the cameras themselves. This refers to features such as facial recognition, automatic license plate readers, automatic red light cameras and more. What all these new smart, HD video cameras need is connectivity. Most of these applications require outdoor cameras While all these applications may seem to be unique, there are a few things all of them have in common. First, these deployments and features require good to excellent video definition quality. Standard definition is no longer acceptable, and running at 10 frames per second vs. a full rate of 30fps, is not acceptable. Second, almost universally these applications will have a high percentage of cameras being deployed outdoors, where the environment is harsh, units are unguarded and connectivity is seldom available. For video security the camera needs to be placed where it can perform it’s desired function, and not where there is a convenient fiber or Ethernet cable handy. Having a fiber strand within 10 feet of the desired location of a camera is not much better than being a mile away. It still requires permits, right of way negotiations and some level of digging. Market With all of these factors combined, the wireless video surveillance market is forecasted to reach $1 Billion in 2019. These numbers do not address the latest shifts in the video security market being driven by orthogonal applications. For example, cities deploying intelligent traffic systems use wireless to connect signaling lights in intersections. In many cases the decision is made to add a camera to the deployment, using the wireless network to support both the signaling traffics as well as the video traffic. When carriers or municipalities decide to deploy public Wi-Fi or hot spots, increasingly the request is bundled with a desire for adding a video camera to the hot spots deployment. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More

The Proxim Advantage Video Security via Wireless

High capacity With a typical security camera consuming up to 8 Mbps, to be effective the wireless network will likely be supporting more than one camera per network. Proxim offers a variety of Tsunami® products that support 10Mbps, 25Mbps, 50Mbps, 100Mbps, 240Mbps up to 633Mbps of useable bandwidth. Reliable video communications There are three main factors to reliable video communications: The network must have high availability (as much as 99.999%) The Tsunami® product line of outdoor wireless networking systems offer a full two year warranty. Proxim has customers who have deployed radios from ten years ago, have never been touched, and are operating today. With an field determined MTBF of well over 1 million hours for some product lines, up to over 2 million hours of MTBF for others, this equates to 1.5 to 3 seconds outage per year. The network must ensure the quality of the video stream in the face of radio frequency impairments or other traffic being carried on that wireless link In this application poor image quality is absolutely not allowed. It is no exaggeration to state that in many deployments lives are at stake, and the video system and in particular the network must be top quality. From a radio frequency performance perspective, Proxim builds into every unit it’s suite of interference mitigation technologies known as Proxim ClearConnect™ ensuring reliable wireless connectivity. While basic connectivity is a must, it is not enough to ensure ‘Reliable Video Communications.’ To meet this standard the wireless technology beyond the radio frequency layer must deliver high quality video images. This relates to the MAC layer used, and Proxim has spent the last 15 years developing, improving and delivering to the market the premier outdoor QoS MAC protocol – WORP®. With WORP® users of a Proxim Tsunami® network have the ability to set jitter and latency service level agreement for the traffic. Minimum data rates for video traffic can be reserved, and all of this is implemented in a network that can be supporting more than just the video, Voice over IP and sensor data can also be supported on the same wireless network with WORP® running. Video is unique in another way from typical data traffic, and in that it is almost all upstream. Meaning the vast majority of the traffic is coming from the camera and being uploaded to the network. Many systems are designed to be asymmetric, supplying more data capacity in the downstream, in the reverse. With Proxim the system is dynamic in it’s upstream/ downstream ratios and can easily move to 80% upstream lending support for this application. A large amount of video traffic is now transmitted as multicast, which most wireless vendors transmit as multiple unicast with massive increases in required bandwidth. Proxim supports multicast and IGMP snooping to ensure multicast streams are properly and efficiently transported over the wireless connections. The network must be secure – Video security traffic is mission critical and as such has work and it has to be secure. Proxim delivers on this requirement in multiple ways Over the air format – Unlike many wireless video systems that are based on and use standard Wi-Fi protocols, WORP® on Tsunami® networks is a Proxim owned, developed and secured protocol. It is impossible for example to use a Wi-Fi sniffer on Tsunami® traffic, unlike mesh systems which use common WiFi frames. The enclosures used in the Tsunami® product line are die cast aluminum, not plastic, and come with tamper proof seals. Encryption – every packet sent over a Tsunami® link is encrypted with AES 128 encryption.   Mobility Security is not required just on the street corner, or in a stadium, it must also operate on trains, trams, buses and even ferries. When looking at backhauling video traffic off of any of these platforms, the bandwidth demand from even one camera can reach gigabits per day. Assuming a 720p camera from the previous table is used, multiplying that by four or even more cameras per train car, per bus yields an instantaneous data rate requirement of 8Mbps and 700Gb per day. The options for transporting this traffic off of a mobile platform are typically restricted to Mesh Wi-Fi, Advanced cellular (LTE) or Proxim. Mesh: In the first case, as noted mesh is not secure and has a very difficult time supporting the necessary QoS required for quality video imaging. In addition handoffs between nodes in a Mesh network can be problematic, especially when confronted with hidden node issues. LTE: While the network can support this traffic, it is cost prohibitive. If a 720p camera is used, this equates to 700 Gb per day, and at a typical $10/Gb its cost can equate to $7,000 per day, per camera. With 2Mbps for standard def video @86k minutes/ day =175Gb of data per camera per day. Outdoor deployments With a significant percentage of the video security deployments taking place outdoors, the equipment has to be able to pass stringent specifications including a rating of IP66 or more. Proxim Tsunami® products are all IP67 rated, meaning they can be submerged in 1 meter of water for 30 mins with no water ingress. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More
puneet_bhasin

Role of Data Protection Officer (DPO) under General Data Protection Regulation (GDPR)

After four years of preparation and debate the General Data Protection Regulation (GDPR) was finally approved by the EU Parliament on 14 April 2016. The Regulation was adopted and published on 27 April 2016 and will be enforceable on and from 25 May 2018. The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU) whilst addressing the export of personal data outside the EU. It regulates the EU citizen data in every part of the world and in every organization processing or storing an EU Citizen’s data. The EU GDPR replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. This new law will have a profound impact on the operational and control environment of the organisations, not only within EU but also within the organisations based outside the EU including India. It extends the scope of EU data protection law to all foreign companies processing data of EU residents. It provides for a harmonization of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations. However, in some areas, the precise interpretation of the GDPR remains unclear, and businesses therefore face uncertainty in terms of their compliance obligations. To address this issue, the GDPR is supplemented by guidance issued by the Article 29 Working Party (WP29), an advisory body made up of representatives of the national Data Protection Authorities of each EU Member State. Provision for Data Protection Officer (DPO) The GDPR has a mandatory provision for the appointment of Data Protection Officer by pertinent organisations. The role of Data Protection Officer (DPO) is an important GDPR innovation and a cornerstone of the GDPR’s accountability-based compliance framework. In addition to supporting an organisation’s compliance with the GDPR, DPOs will have an essential role in acting as intermediaries between relevant stakeholders e.g., supervisory authorities, data subjects and business units within an organisation. All organisations who will be required by the GDPR to appoint a DPO should do this as soon as possible and well in advance of May 2018. With the authority to carry out their critical function, the Data Protection Officer will be of pivotal importance to an organisation’s preparations for the GDPR and meeting the accountability obligations. A DPO may be a member of staff at the appropriate level with the appropriate training, however, GDPR also provides for an option of an external DPO who will be shared by a group of organisations. It is important to note that DPOs are not personally responsible where an organisation does not comply with the provisions of GDPR. The GDPR makes it clear that it is the Controller or the Processor of the organisation who is required to ensure and to be able to demonstrate that the processing is in accordance with the GDPR. Data protection compliance is ultimately the responsibility of the Controller or the Processor. Who needs a DPO For the first time Data Controllers as well as Data Processors are required to appoint a Data Protection Officer in three situations as per Article 37(1) of the GDPR. Where the processing is carried out by a public authority or body Any organisation that is a public authority or a public body must appoint a DPO. However, the GDPR does not define the expression ‘public authority or body.” Rather, the GDPR leaves it to each EU Member State to determine which organisations are public authorities and public bodies. Where a private business performs outsourced public functions on behalf of a public authority or a public body, the WP29 recommends that such business should appoint a DPO, not merely in relation to those outsourced public functions, but also in relation to all of the other data processing activities of that business, including processing activities that are unrelated to the outsourced public functions. Where the core activities of the Controller or the Processor comprise processing operations, which require regular and systematic monitoring of data subjects on a large scale Under this provision companies whose primary activities involve processing personal data on a large scale for the purposes of behavioural advertising, online tracking, fraud prevention, detection of money laundering, administering loyalty programs, running CCTV systems, monitoring smart meters etc., will be caught by the DPO requirement. Core activities can be defined as the key operations necessary to achieve an organisation’s (Controller or Processor’s) goals. For example, a private security company which carries out surveillance of private shopping centres and/ or public spaces using CCTV would be required to appoint a DPO as surveillance is a core activity of the company. On the other hand, it would not be mandatory to appoint a DPO where an organisation undertakes activities such as payroll and IT support, as while these involve the processing of personal data, they are considered ancillary rather than core activities. Where the core activities of the Controller or the Processor consist of processing on a large scale of special categories of data or personal data relating to criminal convictions and offences Article 37(1)(b) and (c) requires that the processing of personal data be carried out on a large scale in order for the designation of a DPO to be triggered. Article 37(1)(c) addresses the processing of special categories of data pursuant to Article 9, and personal data relating to criminal convictions and offences set out in in Article 10. Qualifications Article 37(5) of the GDPR provides that a Data Protection Officer shall be designated on the basis of professional qualities, and in particular, expert knowledge of data protection law and practices, and the ability to fulfil the tasks referred to in Article 39. “It is important to note that DPOs are not personally…

Read More

The Proxim Advantage Video Security via Wireless

Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More

The Proxim Advantage Video Security via Wireless

Over the years there have been two distinct trends that have combined to boost the video surveillance or monitoring market evermore into the forefront of discussions. The first has been the rise in terrorism, vandalism, refugee populations crossing borders and additional global turmoil. The second trend has been the advancement in video camera technology – from analog NTSC or PAL standard definition video formats to IP based cameras supporting full frame rate (30fps) 1080p HD video. The technology behind video security has progressed significantly in the last 10 years. With these new resolutions has come advanced technology, functions that were not possible before or were only available off a server in the central monitoring station are now done routinely, often in the cameras themselves. This refers to features such as facial recognition, automatic license plate readers, automatic red light cameras and more. What all these new smart, HD video cameras need is connectivity. Most of these applications require outdoor cameras While all these applications may seem to be unique, there are a few things all of them have in common. First, these deployments and features require good to excellent video definition quality. Standard definition is no longer acceptable, and running at 10 frames per second vs. a full rate of 30fps, is not acceptable. Second, almost universally these applications will have a high percentage of cameras being deployed outdoors, where the environment is harsh, units are unguarded and connectivity is seldom available. For video security the camera needs to be placed where it can perform it’s desired function, and not where there is a convenient fiber or Ethernet cable handy. Having a fiber strand within 10 feet of the desired location of a camera is not much better than being a mile away. It still requires permits, right of way negotiations and some level of digging. Market With all of these factors combined, the wireless video surveillance market is forecasted to reach $1 Billion in 2019. These numbers do not address the latest shifts in the video security market being driven by orthogonal applications. For example, cities deploying intelligent traffic systems use wireless to connect signaling lights in intersections. In many cases the decision is made to add a camera to the deployment, using the wireless network to support both the signaling traffics as well as the video traffic. When carriers or municipalities decide to deploy public Wi-Fi or hot spots, increasingly the request is bundled with a desire for adding a video camera to the hot spots deployment.   Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. High capacity With a typical security camera consuming up to 8 Mbps, to be effective the wireless network will likely be supporting more than one camera per network. Proxim offers a variety of Tsunami® products that support 10Mbps, 25Mbps, 50Mbps, 100Mbps, 240Mbps up to 633Mbps of useable bandwidth. Reliable video communications There are three main factors to reliable video communications: The network must have high availability (as much as 99.999%) The Tsunami® product line of outdoor wireless networking systems offer a full two year warranty. Proxim has customers who have deployed radios from ten years ago, have never been touched, and are operating today. With an field determined MTBF of well over 1 million hours for some product lines, up to over 2 million hours of MTBF for others, this equates to 1.5 to 3 seconds outage per year. The network must ensure the quality of the video stream in the face of radio frequency impairments or other traffic being carried on that wireless link In this application poor image quality is absolutely not allowed. It is no exaggeration to state that in many deployments lives are at stake, and the video system and in particular the network must be top quality. From a radio frequency performance perspective, Proxim builds into every unit it’s suite of interference mitigation technologies known as Proxim ClearConnect™ ensuring reliable wireless connectivity. While basic…

Read More