GDPR For Access Control Guide

Author: IPVM Team, Published on Jul 03, 2018

Electronic access control is common in businesses plus organizations are increasingly considering biometrics for access control. With GDPR coming into force this Spring, it is important to understand how this will impact these systems.

IPVM has already published an extensive guide about the GDPR’s effect on video surveillance. This new 13-page guide covers GDPR’s effect on the access control industry since much of the data collected for access control purposes – e.g., names, addresses, fingerprints – are personal data whose processing is clearly regulated by the GDPR.

The guide has the following core sections:

  • Where Access Control Providers Fit into GDPR categories of controllers and processors
  • Why Processors Aim To Keep Distance
  • Legal Basis for Processing Access Control
  • Impact of Biometrics on Access Control GDPR Requirements
  • Dealing With Employees Who Refuse Biometrics Consent
  • Access Control Systems Excluded From Biometrics Claim
  • Guidelines for Storing Access Control data
  • Handling Right to be forgotten/Right to information requests for access control systems
  • Encrypting / Anonymizing access control information
  • Concerns with AD / LDAP integrations
  • Data breach response for access control
  • Data Protection Impact Assessments for access control systems
  • Dealing with Data Specific to Access Control, e.g. Physical Activity Log
  • Manufacturer GDPR guides including Avigilon, Brivo, Genetec, Lenel, Paxton, RS2, S2, Tyco

Introduction

To start, it’s important to realize that the GDPR is a broad set of regulations which do not mention particular industries, including access control or its products.

Therefore, anyone claiming to provide “GDPR certification” for particular products in access control or any other industry is wrong. (See IPVM’s previous report: Dahua Products Are Not GDPR Compliant, No Products Can Be.)

Data Controller and Data Processors

The GDPR creates two distinct categories – data controllers and data processors. Controllers are the firms which gather and control the use of peoples’ personal data, and processors are the ones who process that data on behalf of controllers.

The distinction is important as data controllers typically have more responsibilities under the GDPR; for example, only controllers have a duty to report data breaches to authorities.

Access Control GDPR Category Examples

As in video surveillance, access control end users would typically be considered “data controllers.” For example, if a pharmaceutical company buys an access control system for a new building and its employees, the pharma company is the data controller.

Data processors are the companies which handle the personal data collected by end users. For access control, in most cases this means firms like Genetec, Lenel, Software House, S2 Security, etc..

Access control integrators/installers could also be considered data processors depending on whether they handle their end users’ personal data or not. For example, an integrator with temporary access to employees’ personal addresses for maintenance purposes would be considered a data processor in this instance.

Processors Keep Distance

Many data processors in the access control industry emphasize that they can only provide the means to comply with the GDPR’s provisions, rather than assuring compliance in and of themselves.

Because access control involves data which is very easy to immediately identify people with (unlike video surveillance), processors are keen to distance themselves from end users/data controllers in case those end users mishandle the data.

For example, S2 Security says in its public GDPR guide that it may not be considered a data processor in some cases because “on-premises deployments of access monitoring and video management systems often do not involve a Data Processor because the Data Controller handles all personal data.” S2 is correct when it comes to on-premise deployments.

However, it is worth remembering that firms providing cloud-connected access control solutions would be considered data processors under the GDPR. Moreover, as more systems are moving to the cloud, either for hosting, management or access, access control providers are more likely to fall under the data processor category.

Main Points of Compliance for Access Control

Legal Basis of Processing

********** ****** ******* ** ****** ** ********** **** ************* *** increasingly *********** ********** *** ****** *******. **** **** ****** **** force **** ******, ** ** ********* ** ********** *** **** will ****** ***** *******.

**** *** ******* ********* *********** ***** ***** *** ****’* ****** ** ***** ************. **** *** **-**** ***** ****** ****’* ****** ** *** access ******* ******** ***** **** ** *** **** ********* *** access ******* ******** – *.*., *****, *********, ************ – *** personal **** ***** ********** ** ******* ********* ** *** ****.

*** ***** *** *** ********* **** ********:

  • ***** ****** ******* ********* *** **** **** ********** ** *********** and **********
  • *** ********** *** ** **** ********
  • ***** ***** *** ********** ****** *******
  • ****** ** ********** ** ****** ******* **** ************
  • ******* **** ********* *** ****** ********** *******
  • ****** ******* ******* ******** **** ********** *****
  • ********** *** ******* ****** ******* ****
  • ******** ***** ** ** *********/***** ** *********** ******** *** ****** control *******
  • ********** / *********** ****** ******* ***********
  • ******** **** ** / **** ************
  • **** ****** ******** *** ****** *******
  • **** ********** ****** *********** *** ****** ******* *******
  • ******* **** **** ******** ** ****** *******, *.*. ******** ******** Log
  • ************ **** ****** ********* ********, *****, *******, *****, ******, ***, S2, ****

************

** *****, **’* ********* ** ******* **** *** **** ** a ***** *** ** *********** ***** ** *** ******* ********** industries, ********* ****** ******* ** *** ********.

*********, ****** ******** ** ******* “**** *************” *** ********** ******** in ****** ******* ** *** ***** ******** ** *****. (*** IPVM’s ******** ******:***** ******** *** *** **** *********, ** ******** *** **.)

Data ********** *** **** **********

*** **** ********** ******** **********– **** *********** *** **** **********. *********** *** *** ***** which ****** *** ******* *** *** ** *******’ ******** ****, and ********** *** *** **** *** ******* **** **** ** behalf ** ***********.

*** *********** ** ********* ** **** *********** ********* **** **** responsibilities ***** *** ****; *** *******, **** *************** * ****** ****** **** ******** ** ***********.

Access ******* **** ******** ********

** ** ***** ************, ****** ******* *** ***** ***** ********* be ********** “**** ***********.” *** *******, ** * ************** ******* buys ** ****** ******* ****** *** * *** ******** *** its *********, *** ****** ******* ** *** **** **********.

**** ********** *** *** ********* ***** ****** *** ******** **** collected ** *** *****. *** ****** *******, ** **** ***** this ***** ***** **** *******, *****, ******** *****, ** ********, etc..

****** ******* ***********/********** ***** **** ** ********** **** ********** ********* on ******* **** ****** ***** *** *****’ ******** **** ** not. *** *******, ** ********** **** ********* ****** ** *********’ personal ********* *** *********** ******** ***** ** ********** * **** processor ** **** ********.

Processors **** ********

**** **** ********** ** *** ****** ******* ******** ********* **** they *** **** ******* *** ***** ** ****** **** *** GDPR’s **********, ****** **** ******** ********** ** *** ** **********.

******* ****** ******* ******** **** ***** ** **** **** ** immediately ******** ****** **** (****** ***** ************), ********** *** **** to ******** ********** **** *** *****/**** *********** ** **** ***** end ***** ********* *** ****.

*** *******, ** ******** **** ***** ****** **** ********* ** *** *** ** ********** * **** ********* ** some ***** ******* “**-******** *********** ** ****** ********** *** ***** management ******* ***** ** *** ******* * **** ********* ******* the **** ********** ******* *** ******** ****.”** ** ******* **** ** ***** ** **-******* ***********.

*******, ** ** ***** *********** **** ***** ********* *****-********* ****** control ********* ***** ** ********** **** ********** ***** *** ****. Moreover, ** **** ******* *** ****** ** *** *****, ****** for *******, ********** ** ******, ****** ******* ********* *** **** likely ** **** ***** *** **** ********* ********.

Main ****** ** ********** *** ****** *******

Legal ***** ** **********

[***************]

*** ****’******** ******* ******* ***** ***** *** **** **********, ** ***** *** of *** ********* ***** ** ****** *******:

  • *** **** ******* *** ************** *** ********** ** *** ** *** ******** **** *** one ** **** ******** ********
  • ********** **necessary *** *** *********** ** * ********** ***** *** **** ******* ** *****
  • ********** ** ********* *** *** *********** ** * **** ******* outin *** ****** ********** ** *** ******** ** ******** ********* ****** ** *** controller
  • ********** ** ********* *** ***purposes ** *** ********** ********* ******* ** *** ********** ** ** * ***** *****, ****** ***** **** ********* *** ********** ** *** ********* or *********** ****** *** ******** ** *** **** ******* ***** require ********** ** ******** ****, ** ********** ***** *** **** subject ** * *****.

Biometrics *** *******

********** (************, **** *****, ****** ***********, ***) *** ** **** that **** ****** **** ****** ******* ***** ******* ** ****** with *** ****’* ********* ******* ************.

********** ********* ** ********** ***** *** **** **** ******* **********. The **** **** ***** ***** ** ****** ******* *** “*********** public ********” *** “******** *******.”(******* *).

*********, ****** ** ****** ******* **** *** *********** ***** ********** gathering *** * “*********** ****** ********,” ** ***** **** ** make *****, ******-*****, *** ******** ******* * ********. **** *****:

  • ******* ***** **** ** ********* * *******, ***********, ************ *** ****** ********** ****, ***** clear *** ***** ********(******* *)
  • **** ******** *** ******* *** ***“******** *** ** *** ******* ** *** ****” **** ****(******* *)
  • ** ****** ********* *, *** ******* ***** **** ******* **** **** ** ********** are ***** **** *** ***
  • ******* **** ** “****** *****”, *.*. “******* ****** *** ** ******** ** ****** ***** ** *** data ******* *** ** ******* ** **** ****** ** ** unable ** ****** ** ******** ******* ******* *********.” (******* **.)

**** ***** ** * ********** **** ** ********** ****** ******* for *** ********* ***** ******** **** *****, ** ***** ** obtain ********, *****, *** ******-***** ******* **** ****.

Refusing ******* *** **********

************* *** **** * ******* **** ********* ** ****** ** their *********-***** ****** ******* ****** ********* ********:

******* ****** *** ** ******** ** ****** ***** ** *** data ******* *** ** ******* ** **** ****** ** ** unable ** ****** **withdraw ******* ******* *********. [emphasis added]

** **** ***, ** ** ******** **** ** ************ *** fire ** ****** ***** *** ** *** **** ******* *** their ********* *********** ** ** ****. ** *********** *** ******* non-biometric ***** ****** ******* *** ***** *** **** *******.

**** *****, ** **** ** ** ***** *** ********** **** and ** **** ****** ******* ******* *********** **** ******** *** clear ******** ** **** ***********. *******, ************* ****** ********* ******** the ************ ** ******* ** **** ***** ********** *** ****** control.

Access ******* ******* ******** **** **********?

**** ****** ******* ****** ********* ******* **** ***** ******* ** not **** ***** **** ******* ******* **** **** ***** **** that ****** ** **** ** ******** ****** – ****** ******* a **** ***** ** * **** ** ***********, *** *******. This *** ** ****** ** * **** ** *************.*** **** ***** ********* ************, *** **** ********* *** ****** by *** ****** ** ******** ** *** ****** ******* ****** entirely, *** *** **** **** ******** ** *** ****** ****** is * ******* ** **** **** ****** *********** * **********.******, **** ********* ******* (**** ***** **** ** ‘************’ *****) may *** ***** ********* **** ** *** ****** ****** ** all, *** ****** ********* *** **** *** ****** ** ********** cards ** ****** ******-***** *********.

**** ** * ***** *** ******** ******** ** *** **** itself **** *** **** *** ********** ** **** ** ********* to ** ********* ****, ** **** ** ** ** “********* data *** *** ******* ** ******** *********** * ******* ******” (******* *) - ******* **’* ********** ** ***.

****** ******* ********* ****** *** ** *** **** ** ******* when ******* **** *** ********** ***** *** “******* ******** ** personal ****” ****** ** *** ****. ** *** **** * GDPR *********/******* ** ***** ******* ******* ****** **** **** **** strings *** ********** ********** ***** *** **** ** ***.

Storage ****** ******* ***********

*** **** *** ** ******* ********** ** *******, ********** ****** ** ***** **** ******** **** ****** *** ** ****** for "****** **** ** ********* *** *** ******** *** ***** the ******** **** *** *********".

** ****** *******, **** ***** **** ****** ***** ******** ***** storage *** ****** **** **'* *** **** ****** **** ** indefinitely ****** *** *** ***** **'* *** “****** ********, **********, or ********** ******** ********”. **** ***** ********* *** ***** * firm ****** **** ***** **** ******* ********.

**** ******* ** *** ********** ************ ***********, **** ** ****** logs ********* **** * ******** ****** **** ******* * **********. However, ** **** ****** **** ** *** **** ** * specific ******, ** ***** ****** *** **** ***** *** **** and **** ** ******** ******* **********. (*** **** ** ****, see***** ** **** ******** ** ****** *******.” *****)

Right ** ** *********/***** ** *********** ********

*** **** ***** ***** ****** *** ****** ** ****** *** delete ***** ******** **** ********** *******, ** ****** ******* ***** **** ** **** *********** ********** to ******* ***** ******** *** *** ***** **** ** ***** of *** ** *** ****.

***** *** **** ******** ** ****** ******** **** ******* **** justifications **** ****** ********* *** ****, *** **** ******* ** least *** ***********, **** ******* *** **** ** “** ****** necessary ** ******** ** *** ******** *** ***** **** **** collected” (******* **.)

*** ****** ******* **** **** **** **** **** ********** **** how ** ********* *** ****’* ****** *** ******** ************. ** would ********* **** ****** *** ***** *** ***** ****** ***** access ******* ******** ** ***** **** ******** ** *******, ****, and ****** ***** *** ****. *** *******, ******** **** **** company ****’* ******** ********** **** ****** ********** ********* ******** ***** “****** **” ********.

*** ****** ******* *******, **** ********* ** ****** ***** *** deletion ** *** **** *********** *** ********, ******** *** ***** needed ** ** **** *** ***** ****** ****** ‘**** *******’ functions ****** ********* *** ***** ** ********** *******.

*** ****** ** ‘*********** *******’ *** ******* ** * ****** may ******* * ***** ****, *************, ** ******* ********** ****** simple ******** ** ****** *******, *** ** ***** ******* *** shared **** ***** ***********, **** ** ‘**** & **********’ ** ‘Visitor **********’****, **** ******** ****** ******** *** ******* *********** **** multiple *******.

***** ********* **** *** ***** ** ** ********* *** *** right ** ***** ******** ****. *** **** ******* ** **** the **** ******** *** ****, *** *** **** *******’* ********** status. *******, **** ***** *** ** ******** ** *** ********’* personal **** *** **** ******* ********* *** ** *** ********* from * **** – ** ****** ** **** ** ********** with *** ****’* ******* *************** (*** “*******.”)

*******, **** ** **** **** ***** ***** ** **** ** respond ** *********** ********, **** **** * ***** ** ** so, ***** *** ** ******** ** ********** * ******. **** also ** *** **** ** ******* **** ** **** *** “manifestly ********* ** *********.” (******* **.)

Encryption *** *************

******* ****** ******* ********* ****** *********** ******* ** ********* *** special ******** ****, ****** ********** ** ***. *** **** ********** encourages ****** ********** ********* **** ****** *******’ ******** **** ** *********, ** **’* ****** important *** ****** ******* ********* *** ***** ** **** **** they *** ******** ***** ********* *** ******** ****-**** ********* **** General ****** **** **.******* **** ********** ***** ***-****** **************, ********* ***** ********, ** default *********, ***.

*******, **** ****** ******* ******* ******* ************ **** ********* ****** Directory ** **** ** ******** ***** *********, *** ***** ******* utilities *** *** ** ******* ** **********. ** *****, ****** control *******, ********** ***** **** ** ***** ********** *** *****-******** deployments **** *****, ******** *****, *******, **, *** ******** *** may ** ** ****.

*************/**************** ** **** ********** ** *** ****. ***** ***** **********, which ****** ****** **** ***’* ** *********** **** ** ****** people, ** ****** ** ** ******* ********* ************ ** **** of * ******. *** *******,******* *********** **** ********** **** ******** *** *** **** ** ** contacted ** *********** ************* ********** *** ****.

****** ******* ********* ***** *********/**** *********** **** ** ****** *** impact ** * ******, *** ********. ***** *** **** ** anonymized ** ********* **** ****** * ****** *** ******* ** referring ** **** ******** ** ***** **** ****.

Data ******** – ********** ***** *** ******* ******

****** **** ** ****** *******, *** ***** *** **** ****** to ** ********** **** ***********, ***** ****** ****** ******* ***** like ******* *** **** ****** ** ** ********** **** **********.

***** *** ****, *********** **** ** ***** ** ****** *********** in *** **** ** * ******. *********** **** *********** **** inform ********** **** ******** ** **** ** **** *** ****** poses* **** **** ** *** ****** *** ******** ** ******* persons”(******** **&**.)

**** *********** **** ****** ** * *** ************ ************* **** either ********** ** ****** **** *** ***** ** *******. ************* of **** ******** *** *** ********, ********, ** ****** ********** with ******* *************, *** **** **** ********* ********* *** ******* breach ************ ************.

****** ******* ********* ***** ********** ****** **** *** ******* ********* to ****** ********* ************, ** *** **’* ******* ** ******* Party, ** ******** ** ******** ****,*** ********* ****** ********* ********** ** ************ **** ****, **** ********* ************ of ********** **** ******** ***** **** ***********: “** ******* ********** ** ******** **** [**********] *** ********* ******, the ********** ****** *** ******* ***** ***** ** ******* *** breach *** ** *********** ** ** *** *********** *********.”

**** ********** **** **** ************** ** *** ***** **** **** are **** ******* ** ******* **** ***********, ****** **** *********** and **** ********, ****** ** ***** ** ******* ** * breach ***** ********* ******** **** **** ***********.

Data ********** ********

***** ** ** *** ********* *** *** ****** ******* ***** to ******* * *** (******* ****** **** ********** **** **********), an ****** ******* **** ***** ********** *** **** ** ** so.

*** **** **** *** * ********* ********* ****** **** **** ** ** *********, ********* **** “*** **** ********** ** *** ********** ** *** ********* ******* of ********** ** * ***** ***** ** ******* ********** ** data [**** ******** **********]”.

***** **** ****** ******* *********’ ********** *** ** ********* ***********, appointing * *** ***** ** ****. **** **** *** ** especially **********, ** *** **** ****** **** * *** *** be ********** ** ** ** ******** ******** ****** **** *** more ****.

Data ********** ****** ***********

******* ******** **** ***** *** ******** ** ***** “****** ** ****** ** * **** **** ** *** ****** and ******** ** ******* *******”, ********** **** "********** ** * ***** ***** ** ******* categories ** **** [*.*. **********]" ***** *****.

*******, ***** **** *** **** *****’* ****** “***** *****” *** that ********** ***** ** ******* ** “********** ********” – **** access ******* – ** *** ****** ** ****** ** * risk ** ******’* ********, ** ***** ******** ***** ***** ** required ** ***** ******** ** ****** *******.

******* ** ***** **** *** ** *** *** ** ********* will ***** ***** **** ************ ** ********, **** ***** ******. So *** **** *** **** ** ******** ** ****** ******* firms ********* *** ********* *****.

Data ******** ** ****** *******, *.*. ******** ******** ***

*** **** ********* ******** ****, ** "*********** ******** ** ** identified ** ************ ******* ******". (******* *). *******, ***** *** ***** ** **** ** ****** ******* which **** ***** * **** ****, ************ *** **** ** physical ******** **** ****** ***** **** ******* **** * ********* to ***** * ********, *** *******.

****** ******* ***** ********* ** **** **** **** *** *** consider **** **** ** **** ** ** ******** ** ********* data, ***** ** *** ***** ************* ** * ******** ****** and ***** *** ** **** ** ******** *******. **** ***, if *** ******* ** ******** ****** * *******, *** **** controller ***** ****** *** ******** *********** *** **** *** *********** anonymous ******** *** (** ** ******* *** ******** *** **** firms).

***** *** ********** ** ******** **** ***** ** *** ****, this ******** ***** *****. *******, ** ******* *** **** ********* realize **** *** **** **** ******* ***** *** ** **** to ******** * ******** ****** ***** ***** *** ****** ******* of *** ****.

GDPR ********** ** ****** ******* *****

**** ****** ******* ******** ********* **** ********* **** **********, ****** generally **** *** ***** ** *** ********* ** ****'* ****** on ****** ******* *******. ***** *** ***** ** ****** **** ********** ** ****** ******* *****, **** relevant **** **********:

******** **** *********:******** ********** (**** ** ******** ******* ****** (***) ***** ********** software) ****** ****** ** **** *********, *** ********** ********* **** consider *** ***** ******** *** ********* *** ****** *********** ** deploying *** ********* * **** ********* ******. ******** *** ***** care ** ****** **** *** ***** ******** ********* ******* ******** and ************* **** **** ******* **** **********.”

**** *******: ******** ********* ****** **** *** **** ** ** provide *** ***** ** **** ********** ****** **** *** ********** itself.

***** **** *********:“*********** **** **** ****** ** ***** ***** ** *********** ***** Brivo ************ *** ********** **** ********. ***** ***-***** *** ** some ***** ***** ********* *** ********** **** ***********. ***** ** a **** *********.”

**** *******: **** *** **** *********** ** *** **** ***** ******* ** ****** control. **** **** ***** ** *** *********, ***** ********* ** has ********* * *** *** ***** ** ***** ** ******* them **** **** *******.

******* ****** **** *****:“**** ******* *** ***** ************ *** ********* ***** ** ********* who ****** **** ******** **** ****** ***. ****** **** *** data *** ******* ** ********* ******* ************ ****** ** *** first **** ** ********* *** ****. *** ********* ******* *** the ***** *** **** ** ****** **** *** *** ******** and ****** ** *** ******** ******* ** ***** *******.”

“**** ****, *********** *** *** ******* ****** ** * **** of *** **** ** ************ *** ********* ***** ****. ********** *********™ ******* ******** ********** ******** ***** **** *** *** ***** to ******* ** ***** ********. ** ******** * ****** ***-***** portal ***** *** *** ****** *** *********** ***** ******* ****. It **** *** ******* *********** ****** ** ***** ******** *********** in * ********** *** ****** ******.”

**** *******: * ******** ** *******’* ***** ** *** ******* video ************ ****** **** ****** ******* *********, ******* ** ******** identifies *** ********** ** ****** ************* ********* *** ******** ******** to **** **** ********** ******.

***** **** *****: “***** *** ******** *** ******** ** ***** ********* ** *** them ** ****-********* ****. ***** ******* ****** ******* ****** ** security ** ******* *** ******** **** ** ********* *** ********. Respected ******** ********* *** ***-********* ********** ******* *** ** ********** in *** ***** ******* ****** **** ** ******* ******* **** and ******, **** ******* ****** *** **********, ****.* ******* ********** and ******, *** ***** *** * ****** ******** **********. ********, Lenel ******* ******** ************* ****** ************ ** ***** ****** ** authorised ********* *** ******** *** *********** ** ******* **** ******, to **** ***** ** ********* ******** *** *** ****** ** function.”

**** *******: *****'* ***** *** *** ** *** **** ******** and ******** ***** ****'* ****** ** ****** *******.

****** **** *********: “** **** **** **** **** *** ******** **** ******* *** tools ******** ** ***** ********** ** **** *********, *******, ****** is *** *********** *** * ****’* ********** **** **** *** do *** ***** ****** ** *** ** ** *********.”

**** *******: ****** **** ********* ***** **** ***** ** *** give *** ***** ** ****** **** ****, *** ******** ****** automatically ****** **.

*** **** *********: “** *** **** ** ****** ** ***** *** ***** ******** Data ** **** ***** ***, ** ** ******* **** ** delete *** *********** ***** ***, *** *** ******* ** ** emailing ***@***.***. ** **** *********** **** ******* ****** *******-*** (**) hours *** ****** ** ********. *** ******** *.*.*. **** ******* to ***** ******** ****** * *****, **** * *********** ** extend **** ****** *** ************ ******* ******** ** ********** **** Applicable ***. ** **** ****** **** *********** *** ** **** as **** ******* ** ******, ** ****** ** ******* *** services, ** ** ****** **** *** ***** ***********, ******* ******** and ******* *** **********.”

**** *******: **’* *** ******** ********* *** *********** ** ********** to ******* ** ***** ******** ****** ** *****, ***** ** the **** ******** ** ****** ********. *** **** ***** *********** and ********** ** ** * ****** ** ******* ** ***** requests.

** **** *****: “*** ******** ********** ****** ***** ** *** **** **********, *** entity **** ******* ***** ******** **** ** ******* *** *** the ******** ************** *** ************ **.”

“********* **** ****** ***** ********* ******** **** *** ******* ****** issues. ****** *** ***** ****** ** ******** **** *** **** for ******** **********. ****** **** *********** *** *** ******** ****** of **** *********. ***, ******* **** ***********, ** *********** ***** your ******** **** *********.”

**** *******: ***** *** *** ******* ********** *** ********* *** heavier ********** ****** *** ****** ******* *** *****/***********.

*** / **** ************ ******* *** ******** ***** ***** *** same **** ****** (*.*.*****) *** ***** ****** ******* ***** ****** ***** ** ** for ***** ************:“** ** ********* ** **** **** ******* ***/** ******* ********* are *** ** ********** **** *********. *** ******* **** ** subject ** *** **** **** **** ** ****** **** ******** and ********** *** ******** ** ****** **** ***** **************** ***** the **********, *** ** *******, ********* *** *** ******** ***/** product ********* ** * ****** **** ** *********.”

“******* ********’ ***** ******* ********* ******** * ****** ** ******** and ********* **** *** **** **** ******* ** **** ********** ************ *** ************ *** ******** *** ********** ** **** processed. **** ******** *** ******* **********, ****-***** ****** ******* ** limit ***** ***** *** ****** ****, *** **** ** ***** provide ***** ****** *** **** ****** *** *********. *******, ********** with *** **** *** **** ** ******** ******* ********** ******* and ******** ******** ******* ************ ** **** *** *********** ***** of **** ********** ********. *********, **** ********** ****** ** ****** by * *******’* ******* ***. ***** *** *******’* ******* *** can **** **** ********** ****** ** *******, ***** **** ********** be ********** ******** *** ******** ******** ******* ******** ** ****** compliance **** *** ****. **** ******* **** **** ******* ************ about ***** **** ** ******, **** *********** ** ****** *** user ******* ************ **** ******* ******** ****** *******.”

**** *******: **** ******* *** ******** *****, **** ***** ** Johnson ********, ***** *** ******* ******* ** ****** ******* ***** distancing ********** **** *** ***** **** ** ***** ** **** compliance, ****** **** ******* ******** ***** ****** ****** **********.

Future *******

**** **** ******* ******* ******* ** *** **** ******* ****** control *********** ****** *** ** ***** ********* **** *** ****** control *** *******.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...
Sublethal Camera Gun Examined on Dec 06, 2018
Sublethal is a South African company that manufactures a remotely-controlled, camera-enabled gun called the Boomslang, which is Afrikaans for tree...
UK ICO Denies IPVM GDPR Complaint Against IFSEC, Decides Each Exhibitor Responsible on Dec 06, 2018
The UK Information Commissioner's Office (ICO) has denied IPVM's complaint against IFSEC for misuse of facial recognition. Each Exhibitor...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
Cybersecurity Insurance For Security Integrators on Nov 29, 2018
Most security industry professionals carry insurance to cover themselves in the event of a general loss. However, most are not carrying cyber...

Most Recent Industry Reports

Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
DVR Examiner - Video Recovery from Recorder Hard Drives on Dec 13, 2018
Bypassing passwords and long download times on-site, DVR Examiner collects and organizes video evidence directly from a hard drive extracted from...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Huawei Hisilicon Quietly Powering Tens of Millions of Western IoT Devices on Dec 12, 2018
Huawei Hisilicon chips are powering, at least, tens of millions of Western IoT devices, such as IP cameras and surveillance recorders, a fact that...
FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact