Video Camera Monitoring and Recording Standard Al Arboleda Associate CIO for Information Security.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Northside I.S.D. Acceptable Use Policy
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
SECAM Systems Product Presentation SECAM Systems © 2010.
Garfield County Temporary Employee Housing May 3 rd, 2007 Energy Advisory Board.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Property Management Overview
Student Code of Conduct Revision Process Student Code of Conduct Committee Assistant principals, parents, interventionists, AEA representatives.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Management of Communication and Information Chapter -MCI
Training on Data Protection Roles of the Data Protection Office.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
The laws Organizations are covered by lots of different laws
Adelina Rucker EDLD 5362 Lamar University Pearland I.S.D. Technology Plan 2011.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
(Edited) WORKPLACE PRIVACY.
Designing Smart Cities Conference University of Strathclyde, Glasgow 31 st March 2015 “Regulating Smart Cities: Policing & Privacy” Paul Mackie Chief Executive.
Sutton Public Schools Anti-Bullying Law Overview.
SBSTECH SBSTech (SBS Technical Services)SBSTech (SBS Technical Services) provides innovative, reliable and accessible technology.
“Crosswalking” Hospitals for a Healthy Environment (H2E) & the Joint Commission for the Accreditation of Healthcare Organizations (JCAHO) Catherine Zimmer,
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
VIDEO SURVEILLANCE AND DATA PROTECTION 8th Meeting of the Central and Eastern European Commissioners Euxinograde (Varna), May 2006 Neringa Kaktaviciute.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Information Governance Policies. Business Support and Corporate Information Resources Team… Working to create a knowledge led organisation Information.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Think Safe. Act Safe. Be Safe. UC Davis Safety Spotlight, October 2010 Circle the right answer for the 10 questions below on Injury and Illness Prevention.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Information Security Training for People who Supervise Computer Users.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
Laboratory Laboratory (29 CFR ) (29 CFR ) Standard Hygiene Hygiene.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Students will be educated annually about appropriate online behavior, including interacting with other individuals on social networking websites and in.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
TECHNOLOGIES SECTION VI UNIT 2. INFORMATION TECHNOLOGY IN THE NURSING HOME Use of Technology in Resident Care computer charting medication delivery systems.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Prepared by Jennie Yeung Summer School Safety Never leave school with anyone without a Parent Pass. May I see your Parent Pass? Although this did.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
School of Health Sciences Unit 3 Legal Aspects of Health Information and Health Care Statistics HI 135 Instructor: Alisa Hayes, MSA, RHIA, CCRC.
A Health and safety law training programme for employers This programme has been set up to guide employers on some of the basic H&S legislation in the.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Amcrest security systems are part of a generation of advanced high quality remote monitoring and video security systems which are bridging the gap between.
Regulations Related to Video Surveillance in Georgia Sarajevo, 18 th Meeting of CEEDPA The Office of the Personal Data Protection Inspector.
Presented By: Chris M. Wright, CPP IIA Spring Conference 2016 IRVINE, CA March 17, 2016.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Advantage of Security Systems.  Today security camera is a much needed thing to protect us and to preserve valuable properties.  Along with the home.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Surveillance in Care Homes
Training Module Preparation for “AERB norms, licenses and signage”
This lecture is being recorded using ReView
Providing Access to Your Data: Handling sensitive data
Recce Preparation.
POLICY ON INSTALLATION AND USE OF VIDEO CAMERAS
Telehealth Recommended Room Setup
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Telehealth Recommended Room Setup
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Medication Management Policy & Procedure
AUP, EDP, & Centralized Printing
Parker domnick hunter. Safety of Electrical and
Presentation transcript:

Video Camera Monitoring and Recording Standard Al Arboleda Associate CIO for Information Security

Recommendation To ensure the protection of individual privacy rights in accordance with the university’s core values and state and federal laws, the working group recommends that this standard be adopted to formalize procedures for the installation of surveillance equipment and the handling, viewing, retention, dissemination, and destruction of surveillance records. The purpose of this standard is to regulate the use of camera systems used to observe and record public areas in the interest of safety and security

Background This standard will apply to all personnel, departments, and auxiliary organizations in the use of security cameras and their video monitoring and recording systems unless a memorandum of understanding (MOU) has been established. The campus standard will be the default. Security cameras may be installed in situations and places where the security and safety of persons and property owned or leased by Cal Poly Pomona would be enhanced. Cameras will be limited to uses that do not violate the reasonable expectation of privacy as defined by law. Where appropriate, the cameras may be placed campus-wide, inside and outside buildings.

Three Main Categories Property Protection: Where the main intent is to capture video and store it on a remote device so that if property is reported stolen or damaged, the video may show the perpetrator. Examples: an unstaffed computer lab, an unstaffed science lab, or a parking lot. Personal Safety: Where the main intent is to capture video and store it on a remote device so that if a person is assaulted, the video may show the perpetrator. Examples: a public walkway, or a parking lot. Monitor: Where the main intent is to have the live video stream in one area monitored by a staff member in close proximity. In this case video may or may not be recorded. Example: a computer lab with multiple rooms and only one staff member.

Standard Identifies who is responsible Who and what it applies Allows for exceptions What can be done with the video recording content The need to keep the content secure Where cameras can be placed

Provided Input to Standard Al Arboleda Sharon Reiter Anita Jessup Bruce Kennedy Bruce Wilson Debbi McFall Joice Xiong Randall Townsend Melissa Riordan