Building a system that respects privacy

Building a system that protects privacy.

Protecting people and assets sometimes require you to collect personal data, as well as footage about individuals using public spaces in or around your facilities. But to meet regulations and public expectations, access to this data or footage often needs to be restricted. We make sure you don’t have to choose between protecting the privacy of individuals and their physical security.

Our solutions help you to define who has access to sensitive data and footage, without slowing down investigations and incident response. We ensure you have complete control over your data so that you can adjust your protection methods and processes to meet regulations, and more importantly build trust with your customers.

The data that is managed, transmitted and stored by our products is sensitive. We know it needs to be handled with care to ensure its confidentiality. That’s why we make sure our solutions comply with industry standards and give you full control and visibility over who can and has accessed you data. Find out more.

Privacy by Design

Control who sees what

Comprehensive privilege management allows you to restrict the scope of user’s access to your system. With precise controls over which resources, data or applications your users and user groups can access and modify, you have complete control over who sees what in your system.

Automate anonymization of video

Automate anonymization of video

The Security Center built-in KiwiVision™ Privacy Protector™ module helps you protect the identity of individuals caught within your cameras’ field of view. Our award-winning module automatically obscures individuals, so security operators only see what they need to see. 

Securely collect, manage and share evidence

Securely collect, manage and share evidence

Genetec Clearance™ allows you to gather and share reliable evidence that protects everyone’s privacy. With built-in video redaction and secure user management, the identity of victims, bystanders, witnesses and police officers will remain protected.

Are you ready for GDPR?

General Data Protection Regulation (GDPR) is one of the first official data protection acts, but it will be followed by many others. This new set of rules govern how data controllers and data processors collect, use, and share personal data. One of the main goals of GDPR is to protect EU data subjects’ personal data, and provide a new set of rights to individuals. Organizations have to build data and privacy protection into their system design and infrastructure. Non-complying businesses will face hefty fines.

25/05/18

The regulation will come to into effect on May 25th, 2018

4%

Companies will be fined up to 4% of annual revenue or €20 M, whichever is greater

78%

The percentage of IT decision makers who are unaware of GDPR or do not understand what’s coming

Source: IDC Survey for ESET

Adapting to GDPR can be easy. See how we can help →

The 6 pillars of GDPR

The 6 pillars of GDPR

1. Risk & impact assessment

Organizations have to perform a privacy impact assessment, which states what personally identifiable information (PII) is collected and how that information is maintained, protected and shared.

2. Privacy by Design

Systems and technology across the organizations need to be designed to limit data collection, retention and accessibility.

3. Consent

If personal data is to be collected, organizations have to get valid and explicit consent from the individuals.

4. Breach notification

Users have the right to be informed about data breaches involving their personal data.

5. Right to be forgotten

Organizations have to erase personal data at the subject’s request, without undue delay.

6. Data portability

Upon request, organizations have to provide individuals with their personal data in a structured and commonly used format.

Interested in participating in an event?

Let us know where you are to be notified of upcoming cybersecurity and privacy events in your area.