CIOApplications
  • Home
  • Applications
      • 3D Scanning
      • Bioinformatics
      • Blockchain
      • BPM
      • Business Continuity
      • Business Intelligence
      • Collaboration
      • Configuration Management
      • CPQ
      • Container Management
      • CEM
      • Data Platform
      • Data Preparation
      • DMS
      • e-Discovery
      • Employee Engagement
      • EAM
      • Enterprise Communications
      • Enterprise Mobility
      • ERP
      • GIS
      • GRC
      • Human Resource
      • Innovation Management
      • Inventory Management
      • IT Infrastructure
      • IT Service Management
      • IT Services
      • Low Code
      • Managed IT Services
      • Marketing
      • Master Data Management
      • Mobile Application
      • Portal Software
      • Procurement
      • Project Management
      • Remote Monitoring
      • Remote Support
      • Sales
      • Software Asset Management
      • Software Testing
      • Supply Chain
      • Task Management
      • Unified Communications
      • Voice Recognition
      • Workflow
  • Verticals
      • Aerospace & Defense
      • Automotive
      • Banking
      • BioTechnology
      • Casino
      • Construction
      • Contact Center
      • E-commerce
      • Education
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Insurance
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Media and Entertainment
      • Oil & Gas
      • Retail
      • Space Tech
      • Telecom
      • Travel and Hospitality
      • Utilities
  • Technologies
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Big Data
      • Chatbot
      • Cloud
      • Content Delivery Network
      • Cyber Security
      • Data Center
      • DevOps
      • Distributed Technology
      • Drone
      • Enterprise Architecture
      • Enterprise Search
      • Enterprise Startups
      • Graphics
      • HPC
      • IoT
      • Java
      • Load Balancing
      • Machine Learning
      • Machine to Machine
      • Machine Vision and Imaging
      • Nano Tech
      • Predictive Analytics
      • Robotic Process Automation
      • Robotics
      • Security
      • Telematics
      • Testing
      • Video Surveillance
      • Virtual Assistant
      • Wireless
  • Partner Network
      • Adobe
      • Amazon
      • Avaya
      • ESRI Partner
      • IBM
      • Infor Solutions
      • Microsoft
      • Mitel Partners
      • National Instruments
      • NetSuite
      • Nintex
      • Oracle
      • Progress
      • Riverbed
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
  • News
  • conferences
  • Newsletter
  • About us
×
news

Subscribe to our Newsletter

Become a member of our mailing list for the latest articles, news, and exclusive insights.

news
news

Enter Your Email Address:

Thank you for subscribing with us. We sent you an email regarding this.

loading
SUBSCRIBE
  • Home
  • Video Surveillance
Editor's Pick (1 - 4 of 8)
left
A CIO Basic: A Real Road Map

A CIO Basic: A Real Road Map
Darren Cockrel, CIO, Coyote Logistics

IT as an Enabler for Retail Industry

IT as an Enabler for Retail Industry
Armin Roeseler, CIO, Swanson Health Products

Video Surveillance Technology for a Safer Environment

Video Surveillance Technology for a Safer Environment
Paul Hopingardner, Deputy CIO, City of Austin

Outdoor Video Surveillance at the Florida East Coast Railway

Outdoor Video Surveillance at the Florida East Coast Railway
Lester Hightower, VP and CIO, Florida East Coast Railway

How the Cloud is Enabling Video Surveillance Advancements

How the Cloud is Enabling Video Surveillance Advancements
Chris Shipp, CISO, Fluor Federal Petroleum Operations

Technology Broadening a CIO's Standpoint

Technology Broadening a CIO's Standpoint
Dan Cremins, Global Leader of Product Management, March Networks

Sustainability Strategy: A Path to Success

Sustainability Strategy: A Path to Success
Billy Ingram, Director of Lean Product Development, Interface

Assurance, not Compliance - Using the 20 Critical Security Controls

Assurance, not Compliance - Using the 20 Critical Security Controls
Randy Marchany, CISO, Virginia Tech IT Security Office and Lab

right

Eye Spy: Understanding Your Video Surveillance Technology Risks

By Keith Burkhardt, VP, Kraus Anderson Insurance

Tweet
content-image

Keith Burkhardt, VP, Kraus Anderson Insurance

George Orwell almost had it right: You are being watched. But it’s not just Big Brother that’s watching you. It’s your home security vendor, your employer, monitoring the front lobby, the security webcam at the parking ramp, your church nursery, your work computer, your phone.

On a macro and micro level, from fetal 4D ultrasounds to gravesite mapping American lives are being recorded as never before. Government entities, schools and colleges, public and private corporations and nonprofits are routinely relying on VS for safety and security reasons: as a crime deterrent; to protect proprietary methods and materials, and in short, to ferret out the bad guys.

Yet for all its benefits, VS technology poses some potentially devastating risks. With the typical velocity of our exploding Internet of Things, VS technology is outrunning our capacity to adequately grasp all the implications of its use and abuse; both to individual rights and to the greater society. Along with the increasingly common news of cyber hacks and attacks, we’ve all seen the rising tide of incidents involving real or perceived privacy or human rights violations tied to surveillance. Witness Samsung’s recent smart TV debacle; or community demands for the release of police video documentation after an officer-involved shooting.

But let’s say you own a company and just want to end the pilfering in the supply room. Your friend’s cousin can set you up with a CCTV and it’s only $100 a month. A no-brainer, right?

Not so fast.

Your VS technology program deserves the same proactive, interdisciplinary approach you've applied to your cyber resilience program


Before you set up that CCTV, the key thing to remember is that, while the fact of video surveillance alone doesn’t violate privacy, unauthorized access to it does.

But let’s say you did sign up with your friend’s cousin, without checking with Legal, or HR. Take a look at those surveillance files from last night. You may discover more than you bargained for: Illegal, illicit, or unsavory activity. You do know that if you become aware of a crime, you become part of that crime if you don’t report it, right? Yet who has access to the tape? You? The service provider? What if you turn over the data, but there’s other activity on the file that compromises someone’s privacy or damages their reputation?

This is not the time to call Legal and HR.

Instead, your VS technology program deserves the same proactive, interdisciplinary approach you’ve applied to your cyber resilience program, outlined in CIO Review’s June 2015 Cyber Security Issue. Bring in your team of Security, IT, HR, Legal, and Finance officers (and maybe others as appropriate), for a 360-degree perspective including answers to these questions:

• Does your VS procurement process account for Compliance, Legal and Financial Risks incurred when VS is implemented?
• Where does the VS Data go? How is it stored and managed? Who has access?
• What’s your VS disposal policy and process?

And, how secure is the VS software? The question of whether the software code has been compromised in a way that leaves it open to tampering is a real concern, say experts.

“Absolutely, it’s a problem, there are no guarantees on who will control the data and how well they control it,” says James Ryan, founder and principal of cyber security firm Litmus Logic. “The more advanced cyber attacks become, the more assurances firms should demand from their suppliers to verify that software and cloud systems are resilient to hacks, and that suppliers manage data and infrastructure with prudence and transparency,” Ryan said. Litmus Logic performs independent assurance services for software and services that have passed the most stringent tests, i.e. those of the Department of Defense and its suppliers.

While burgeoning technologies like VS provide us with more information than we’ve ever had, there’s still a lot to learn. Caveat Emptor: To the extent that we are poor consumers of technology, there will be unintended consequences.

Read Also

How the Cloud is Enabling Video Surveillance Advancements

How the Cloud is Enabling Video Surveillance Advancements

Chris Shipp, CISO, Fluor Federal Petroleum Operations
Technology Broadening a CIO's Standpoint

Technology Broadening a CIO's Standpoint

Dan Cremins, Global Leader of Product Management, March Networks
Sustainability Strategy: A Path to Success

Sustainability Strategy: A Path to Success

Billy Ingram, Director of Lean Product Development, Interface
Assurance, not Compliance - Using the 20 Critical Security Controls

Assurance, not Compliance - Using the 20 Critical Security Controls

Randy Marchany, CISO, Virginia Tech IT Security Office and Lab

Video Surveillance Special

  • Smartvue: The Era of Visual Intelligence

Featured Vendors

  • AIREAL: Designing Digital Content to Coexist With Reality
    AIREAL: Designing Digital Content to Coexist With Reality
  • Myrtle Beach Communications: Video Surveillance Through State-of-the-art Technology
    Myrtle Beach Communications: Video Surveillance Through State-of-the-art Technology
  • Virtalis: VR for Better Business Understanding
    Virtalis: VR for Better Business Understanding
  • Smartvue: The Era of Visual Intelligence
    Smartvue: The Era of Visual Intelligence

Copyright © 2019 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://video-surveillance.cioapplications.com/cxoinsights/eye-spy-understanding-your-video-surveillance-technology-risks-nid-1046.html