Table of Contents
- Who is the data controller when CCTV is integrated with access control?
- Why does linking footage with entry logs increase risk?
- When does entrance footage become biometric data processing?
- How should entrance footage be anonymized before sharing it with security staff or an auditor?
- Faces and license plates: what usually needs to be blurred
- Table: typical decisions when sharing recordings from entry points
- On-premise software and integration with building infrastructure
- How should a compliant process be described in policies and procedures?
- FAQ - video surveillance and access control systems with IP cameras