Expert Speak
Genetec Highlights Top Data Privacy Practices for Physical Security Leaders

Genetec has shared a comprehensive set of data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security. This initiative comes as a response to the escalating importance of data security in an increasingly interconnected digital landscape. By prioritising privacy, organizations can effectively contribute to a safer digital and physical landscape for all.
“Organisations should never have to choose between data privacy and security. By equipping physical security professionals with these essential strategies, Genetec is spearheading a paradigm shift towards a more resilient and trustworthy security ecosystem. It is an ongoing process, and organizations should regularly update protocols, stay informed and continuously educate their teams on best practices”, said Firas Jadalla, Regional Director – Middle East, Turkey and Africa (META) Genetec.
Genetec recommends organizations ensure their security systems respect data privacy by:
Collecting and Storing Only What You Need: A fundamental rule of data security is to collect and store only essential information. The potential impact of a security breach can be reduced by minimizing stored data. It’s important to regularly review and audit data and dispose of unnecessary information responsibly.
Limiting Access to Sensitive Data: Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy. Techniques for anonymizing personal information while retaining its utility include:
- Randomisation by adding noise to numerical values such as an individual’s age or income)
- Pseudonymisation such as replacing names with unique identifiers
- Tokenisation such as replacing credit card numbers with tokens that have no direct correlation to the original numbers
- Generalisation such as converting exact birthdates to age ranges
- Data masking shows only the first few digits of a phone number
Ensuring Privacy without Compromising Evidence: By making use of technologies such as KiwiVision Privacy Protector, organisations can automatically anonymise images of people, so they can continue to survey surveillance footage while respecting privacy. This technology also offers an additional layer of security that ensures only authorized users can “unlock” and view unmasked footage while maintaining an audit trail.
Being Transparent and Getting User Consent: Building trust through transparency and user consent is essential. It’s important to communicate with users about the data collection process, promoting informed decisions. Organizations should also gain explicit consent before collecting and processing data.
Choosing a Reliable Data Storage Provider: Organisations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. If using third-party services, organisations should demand strong security measures and reliable data handling practices. Establish who “owns” any data stored in the cloud, and any rights/privileges associated with the use or disclosure of any information.
Establishing Strong Policies: To ensure long-term data safety, Genetec recommends putting in place robust policies across the organization. Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every stage of the data lifecycle.
Cyber Security
Addressing Challenges in Artificial Intelligence Security and Supply Chain Management

Written by Eng. Abdulaziz Al Nuaimi, Chief Security Officer, Huawei UAE (more…)
Expert Speak
Talking to the C-Suite About Cybersecurity

Written by Filippo Cassini, Global Technical Officer, SVP of Engineering at Fortinet (more…)
Cyber Security
The Human Factor: Why Cybersecurity is as Much About People as Technology

Global Entrepreneur Roman Ziemian explores why organisations must prioritise human awareness and culture to build a truly secure future. (more…)
-
Artificial Intelligence1 week ago
DeepSeek-R1 AI Poses 11x Higher Harmful Content Risk
-
Artificial Intelligence6 days ago
DeepSeek Popularity Exploited in Latest PyPI Attack
-
Artificial Intelligence6 days ago
SentinelOne to Spotlight AI-Driven Cybersecurity at LEAP 2025
-
Cyber Security3 days ago
Employees Are the First Line of Defense
-
News5 days ago
Sophos Completes Secureworks Acquisition
-
Homeland Security1 week ago
Daimler Truck Focuses on Growth in the Defence Sector
-
Cyber Security3 days ago
Proactive Threat Intelligence Can Keep Threats at Bay
-
Cyber Security1 week ago
Tenable Plans to Acquire Vulcan Cyber