Your current location:News > Industry dynamics
The legitimacy of the CCTV system
Publishing Time:2005-8-30 09:47  No.of Visits:2276

The UK Data Protection Act 1998 consists of eight data protection laws and regulations, which directly affect the CCTV system design, installation and operation of the five areas, including: registration (registration), logo, signage, system design, system design, the record (recording) and safety (security).

Data protection laws and regulations

These regulations included in the Data Protection Act of 1998, the requirements of the personal data is refers to all the information related to an individual activities, must follow when handling the following provisions:

Has had a fair legal procedures;, the data processing can be used for limited purposes only;adequacy, relevance, use appropriate; accuracy;, if no necessary, data should be removed promptly;, in accordance with the raw data for processing, do not jump to change; security;, if no proper protection measures, do not pass the data to countries outside the European economic area.

Register    

In accordance with The law, The Information Commissioner's Office, The Office of Information Commissioner) requires that all processing of personal data "" The use of CCTV system must be registered, including all of The electronic monitoring and storage system, either analog or digital, is embedded, is connected to The Internet or based on IP.

Registration means that adds an entry to China central television (CCTV) system, and provide a copy of the document, including the following statement:

monitoring content;monitoring purposes, such as reducing crime or monitoring the behavior of the staff;, responsible for data processing;, all the people who can access the system.

All the people who can access the system including the installer or IT staff and maintenance company, these have to be published. To register for these information when installation, will be more conducive to make sure that all after commissioning of the system test will be conducted in accordance with the law.

Identifier (Signage)

Information council rules of operation rules, points out that people must be at the scene of the operation will notice CCTV system is running. Usually adopts the way is posted on the appropriate size of the notice, let people can see into the monitoring area.

Identity, however, are not simply declared "CCTV is running, the requirements that must be notice the following information:, responsible for the monitoring and control system of an individual or organization's information;monitoring purposes;Detailed information of the contact, a monitoring system.

But if the monitoring system is designed under the environment of hidden, can don't need to post signs. CCTV operation code provisions, however, hidden records only in the surveillance system operator has identified certain crime, only when you need to use the monitoring means to obtain evidence may be approved, and the need to identify whether get in the way of obtaining evidence, as well as the monitoring time for evaluation.

In addition, although the above mentioned three certificates and documents has become the mark content, the example of China central television (CCTV) operation rules are also asked to prepare a proper logo, but, as expected, the success of criminal prosecution is don't need that.

Design (system design)

Data protection is an important principle of the use of the information should have relevance, relevance and modest. The Human Rights Act (the Human Rights Act) of a core requirement is to protect the personal, this means that the engineering installation contractor must pay attention to the following:

, the number and Angle of the camera should be appropriate to meet the monitoring purposes but never too much;

Camera range should not be involved without record of personal privacy;

, the position of the camera should respect personal privacy in the adjacent buildings, can be done by physical shielding and private partition, if a private area within the camera's field of vision, you must ask for the opinions of the parties.Finally, the image quality must be clear enough to achieve a certain purpose.

Record    

CCTV images recorded there are four main problems - traceability , retention, access and privacy .

Traceability    

In order to ensure confidentiality, all images must be fully traceable. This means that each image must be able to provide record of the date and time, recording device and the media, as well as the head of the record data. Those records can be good operation diary and tagged magnetic tape.

Retention

Some records can be used as evidence, the records of the query index must be complete. Including the operation in the diary to record the image extracted from system, used as a legal action time, cause, executor, and location of the operation.

Usually, CCTV images keep no more than 31 days. However, in addition to the Data Protection Act suggested in images should not keep "unnecessary" for a longer time, and there is no mandatory time limit. Standard of 31 days has already formed the practice.

The appropriate time limit can be due to different industries have different, but should make its appear reasonable. In the health care system and environmental safety, such as leisure places or factory, the time period could reach two months; In the retail industry, may be only two weeks; The public bar, may be a week or less.

Access and privacy    

Was involved in the record image of each person has the right to contact the image data. There is only one exception: the request might interfere with or prevent crime investigation, or they may hinder the ability of the criminal arrest or prosecution.

Follow this rule is not as simple as it sounds, access may be CCTV system users' heavy burden. Data protection provision in the act, the organizers to record images of each application can only charge US $18 per refer to maximum. Provide your visitor with the cost of these images, whether it's record and print, probably is much higher than this, because the images provided could not identify a third party, and therefore need to be edited.

Security  

Information security is an important protection principles, including the following two points:, physical security of the system, and data storage of the environment and access to its records;, a system of electronic security, especially the network and system based on IP.

Tape should be stored in a locked cupboard, access to records, including maintenance personnel should strictly fill in the diary.