{"id":10207,"date":"2021-03-03T07:33:28","date_gmt":"2021-03-03T07:33:28","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=10207"},"modified":"2021-03-03T07:33:30","modified_gmt":"2021-03-03T07:33:30","slug":"genetec-solutions-help-ensure-organizations-dont-have-to-choose-between-privacy-and-security","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/genetec-solutions-help-ensure-organizations-dont-have-to-choose-between-privacy-and-security\/","title":{"rendered":"Genetec Solutions Help Ensure Organizations Don&#8217;t Have To Choose Between Privacy And Security"},"content":{"rendered":"\n<p><strong>\u2014<\/strong>\u201cOrganizations should never have to choose between protecting the privacy of individuals and their physical security,\u201d said Pierre Racz, President of&nbsp;<a href=\"https:\/\/www.genetec.com\">Genetec Inc.<\/a> (\u201cGenetec\u201d), a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Putting these principles into practice, Genetec provides the necessary tools for security professionals to responsibly gather and manage data, particularly video, while supporting compliance with privacy laws around the world.<\/p>\n\n\n\n<p>Genetec believes that the respect for individuals\u2019 privacy should be the foundation of responsible and innovative design. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Privacy_by_design\">Privacy by Design&nbsp;<\/a>methodologies provide an essential road map for forward-thinking, ethical developers to build those principles into the products they create. This involves proactively embedding privacy into the design and operation of IT systems, networked infrastructure, and business practices from the first line of code to the third-party vendors selected for partnership and integration.<\/p>\n\n\n\n<p>With this methodology in mind, Genetec solutions are designed to help customers <a href=\"https:\/\/www.genetec.com\/support\/resources\/trust-center\/protecting-privacy\">enhance cyber hygiene and respect privacy<\/a> by making data and privacy protection features more accessible and configurable.<\/p>\n\n\n\n<p>In the physical security industry, protecting people and assets often requires organizations to collect personal data, as well as footage about individuals using public spaces in or around their facilities. But to meet the public\u2019s expectations of privacy, and to comply with global regulations, access to this data or footage needs to be restricted and protected.<\/p>\n\n\n\n<p>Available on-demand for the Genetec\u2122Security Centerunified platform, the <a href=\"https:\/\/resources.genetec.com\/en-product-brochures\/kiwivision-privacy-protector-brochure\">KiwiVision\u2122 Privacy Protector\u2122<\/a>automatically obscures individuals\u2019 faces caught within a camera\u2019s field of view,so security operators only see what they need to see.&nbsp;Being able to access unobscured footage requires an additional layer of access permissions that is only used when an event warrants an investigation. An audit trail is then maintained that shows who accessed the additional information, and why.<\/p>\n\n\n\n<p>\u201cProtecting the identity of people captured on video is an essential step in protecting their privacy,\u201d said Florian Matusek, Genetec Product Group Director. \u201cKiwiVision\u2122Privacy Protector\u2122is a great example of how we help our customers to meet privacy first standards of operation, and work to comply with local regulations.\u201d<\/p>\n\n\n\n<p>Just as protecting the anonymity of people captured on video security footage is an essential step in protecting their privacy, the ability to securely share information during investigations is also fundamental in protecting data integrity and individuals\u2019 privacy.<\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.genetec.com\/solutions\/all-products\/clearance\">Genetec Clearance\u2122<\/a>digital evidence management system allows law enforcement organizations to gather and share reliable evidence that protects everyone\u2019s privacy. With built-in video redaction and secure user management, the identity of victims, bystanders, witnesses and police officers remains protected at all times.<\/p>\n\n\n\n<p>Genetec Clearance helps end users define who has access to sensitive data and footage without slowing down investigations and incident response. This way, end-users have control over this data so that they can adjust&nbsp;protection methods and processes to comply privacy legislations around the world such as the European General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), Canada\u2019s Personal Information Protection and Electronic Documents Act (PIPEDA) and Brazil\u2019s General Protection Data Law (LGPD).<\/p>\n\n\n\n<p>\u201cAs a society, the invasion of&nbsp;privacy&nbsp;buys us very little and costs us very much,\u201d said Racz. \u201cAt Genetec we do our job by making tools that society needs, but most importantly, we make these tools to conform with the social contract of the societies in which we operate.\u201d<\/p>\n\n\n\n<p>To hear more about Pierre Racz\u2019s thoughts on the importance of privacy, listen to the <a href=\"https:\/\/resources.genetec.com\/engage-a-genetec-podcast\/engage-a-genetec-podcast-episode-1-first-principles-3\" target=\"_blank\" rel=\"noreferrer noopener\">Engage podcast episode<em>\u201cFirst Principles\u201d.<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2014\u201cOrganizations should never have to choose between protecting the privacy of individuals and their physical security,\u201d said Pierre Racz, President of&nbsp;Genetec Inc. (\u201cGenetec\u201d), a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Putting these principles into practice, Genetec provides the necessary tools for security professionals to responsibly gather and manage [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10208,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-10207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo-300x300.jpg",300,300,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",400,400,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Genetec-Logo.jpg",100,100,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"\u2014\u201cOrganizations should never have to choose between protecting the privacy of individuals and their physical security,\u201d said Pierre Racz, President of&nbsp;Genetec Inc. (\u201cGenetec\u201d), a leading technology provider of unified security, public safety, operations, and business intelligence solutions. Putting these principles into practice, Genetec provides the necessary tools for security professionals to responsibly gather and manage&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/10207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=10207"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/10207\/revisions"}],"predecessor-version":[{"id":10209,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/10207\/revisions\/10209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/10208"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=10207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=10207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=10207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}