0% found this document useful (0 votes)
588 views

RRL About Video Monitoring System

This document contains summaries of several articles discussing the use of video surveillance systems and security cameras using technologies like Raspberry Pi. Some key points discussed include using video surveillance to deter crime, identify intruders through face recognition, send alerts to owners or police if an intruder is detected, and allowing remote monitoring of surveillance areas through technologies like Raspberry Pi and computer vision algorithms. Motion detection, face recognition, and alert systems are proposed in several of the articles to automatically detect and identify intruders and notify security personnel.

Uploaded by

Dummy Fuzzy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
588 views

RRL About Video Monitoring System

This document contains summaries of several articles discussing the use of video surveillance systems and security cameras using technologies like Raspberry Pi. Some key points discussed include using video surveillance to deter crime, identify intruders through face recognition, send alerts to owners or police if an intruder is detected, and allowing remote monitoring of surveillance areas through technologies like Raspberry Pi and computer vision algorithms. Motion detection, face recognition, and alert systems are proposed in several of the articles to automatically detect and identify intruders and notify security personnel.

Uploaded by

Dummy Fuzzy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Title: “Importance of Video Surveillance System”

Kaylee Kolditz (March 3, 2020), a Business and Technology Writer, mentions in his blog that Video

surveillance systems can add next-level security to the company's efforts to deter crime. Strategically

placed cameras could mean would-be burglars bypass your business for an easier target. And if a crime

does occur, the video footage can provide important evidence for both the insurance company and the

police. Video surveillance systems involve strategic placement of security cameras, monitoring motion and

activity, generating alerts, transmitting footage, and storing that footage. Cameras can be both indoors and

outside.

Queen Denise P. Cuevas, John Carlo P. Corachea, Ederlina B. Escabel, Merwina Lou A. Bautista

(2016) says, as nations develop and their economies grow bigger, social problems also intensify. One great

concern deals with peace and order as well as safety and security of the people. Various psychologists

would render different explanations to the cases of crimes but what is apparent even to the most innocent

individual is that crimes are everywhere. Anyone can be a victim of crime; which fosters fear to a lot of

people. Knowing its responsibility, the government of different nations have launched various innovations

on how to prevent crimes. One of these innovations is the use of CCTV.

Title: “Benefits and Reasons for Business Security Cameras and Video Surveillance”

Martin Jones (n.d.) states 25 benefits and reasons for business security cameras and video

surveillance, when it comes to the overall safety and security of your business, video surveillance and

security cameras are a must. These are the reasons why: Security Cameras Increase Overall Safety; Video

Surveillance Can Help Prevent Shoplifting & Theft; Prevent Fraud; Can Prevent Employee Theft; Improve

Safeguards; Protects Against Burglary; Improved Perception of Concern for Costumer Safety; Improves
Outside Security for Costumer and Employees; Lower The Risk of Vandalism; Improve Employee

Productivity and Business Operations; Increase Sales; 24/7 Peace of Mind; Can Help Avoid Legal Claim

and Fraud; Provide Business Compliance; Aid Law Enforcement; Cost-Effective and Scalable; Provides a

Record of All Activity in Your Business; Reduce the Need for Hiring Additional Security Personnel; Can

Increase Business Profits; Monitors Customer Transactions; Makes Good Business Sense; Can Protect

Against Robberies; Can Reduce Monetary Losses; Become Proactive in Preventing Shoplifting; Recognize

Shoplifting & Deter Threats Before They May Happen.

Title: “SMART SURVEILLANCE MONITORING SYSTEM USING RASPBERRY PI AND PIR SENSOR”

Prasannajit Dash (June 2018) proposed the design and implementation of Smart surveillance

monitoring system using Raspberry pi and PIR sensor for mobile devices. It increases the usage of mobile

technology to provide essential security to our homes and for other control applications The proposed

home security system captures information and transmits it via a 3G Dongle to a Smart phone using web

application. Raspberry pi operates and controls motion detectors and video cameras for remote sensing

and surveillance, streams live video and records it for future playback. It can also find the number of

persons located with the help of the Infrared sensor. For example , when motion is detected, The cameras

automatically initiate recording and the Raspberry pi device alerts the owner of the possible intrusion

having a smart phone. Raspberry - Pi has two main components interacting with each other: one is the

Web Application that executes on the mobile device's browser and server -side scripts that run in a cloud

which will be operated by the Raspberry Pi Hardware tool component


Title: “Security System Using Motion Detection and Face Recognition”

The potential of image processing can be used to enhance the role of CCTV cameras to

generate an alert to the concerned owners or the police officials whenever an intruder is detected in the

owners’ area. The project aims at developing a security alert system based on motion detection and face

recognition techniques in image processing. The frames captured by the camera are analyze d to detect the

presence of any motion and if the motion is detected for a particular time frame, the intruder’s face is

matched with the authorized database of persons provided by the owner of the place using face recognition

techniques. If the intruder’s face is not matched with any other in the database, an alarm is generated and

the intruder’s image is sent to the concerned owners and security officials.

It begins with the general initialization of the software parameters and the configuration of the

objects. Then, once the program has started, the value of the indicator indicates whether the stop button

has been pressed or not checked. If the stop button is not pressed, it starts to read the images and then

processes them using one of the two algorithms when the operator is selected. If a motion is detected, it

triggers a series of actions, then restarts the next images, otherwise it will directly read the following

images. Each time you press the stop button, the indicator value will be reset and the program will stop, the

memory will be erased and the required results will be recorded. This terminates the program and returns

the control to the operator to collect the results

Title: “Motion Detection and Face Recognition using Raspberry Pi, as a Part of, the Internet of Things”

In accordance with the prevailing philosophy of ever-present communication, including machine to

machine communication, the IoT may be defined as a set of technologies designed to allow the connection

of heterogeneous objects through various networks and methods of communication. The main objective is
to position intelligent devices in different locations to capture, store and manage information, making it is

accessible, to anyone anywhere in the world.

This solution is standard, but from the point of view of security, it carries various risks. Therefore, a

classic HD webcam is used, connected it to a Raspberry Pi 3 micro-controller.

The structure of this system consisted of:  Simple devices (e.g. in this case HD cameras) that act

as sensors and are capable of collecting information about the patient’s health and the environment if

necessary. A decision element, that is a decision maker with more powerful computing resources, in this

case, the Raspberry Pi 3. Sensors can detect the non-standard movement or falls and also capture their

faces. When a person enters the room, the sensors detect activity. Depending on how the camera is

rotated and the person's face is captured, the person can be identified (conditions depend on the degree of

face rotation, light conditions, camera distance, etc.).

Title: “Video Surveillance Using Raspberry Pi Architecture”


This project is about a remotely monitor surveillance area using Raspberry Pi architecture.

Raspberry Pi B+ model is a credit card sized single board computers developed in the UK by the

Raspberry Pi Foundation, which provides all the basic features of a computer. Its core architecture is built

from ARM11 (Broadcom BCM2835 SoC). This project deals with Raspberry Pi processor, stepper motor,

webcam, PIR sensors and GSM module. Raspberry Pi which is heart of system collects surveillance data

through interfaces like webcam, PIR sensors. The video stream is locally as well as remotely visualized.

Role of a stepper motor is 3600 surveillance. Further, SIM900A module is used to interface GSM/GPRS

functionality with Raspberry Pi processor. The alert notification is sent to user, when Raspberry Pi detects

living body or motion of living body in surveillance area. Raspberry Pi transmits the real-time video through

internet as well as it sends notification message to the user though GSM module. The Raspberry Pi having

these all interfaces using communication ports like GPIO, Ethernet and USB.
Title: “Security System with Face Recognition, SMS Alert and Embedded Network Video Monitoring

Terminal”

This project is a novel system to prevent robbery in highly secure areas with lesser power

consumption. This system has face-recognition technology which grants access to only authorized people

to enter that area. If others enter the place without access using some other means, then the system alerts

the security personnel and streams the video captured by the security camera. The face recognition is done

using PCA algorithm. The video transmitted is compressed and transmitted by ENVMT. By using this

ENVMT, the video can play with lesser bandwidth consumption, latency and jitter.

The working of the ISS is explained in the latter half of the section. When the system is started, the

external sensor keeps sensing motion outside the door and the ISS is turned on as well. If the external

sensor detects motion, it triggers the face-recognition module, which in turn makes the camera take a

picture of the person in front of the door. The face-recognition module replies the micro-controller with a

binary result whether the person is recognized or not. If he/she is recognized, then the access is granted

else simply the access is denied, and the ESS after a few seconds, it resets itself. If the access is granted,

then the ISS is turned off and the access door is opened for 30 seconds. The timing can be adjusted

depending on the need. The person should enter the room and press the entry push button to notify the

system that the person has entered the room and if he/she fails to do that, then the access door will be

closed and the ISS will be turned on which would lead to the false alarm. When the person wants to leave

the room, he/she should press the exit 1 push button inside the door for the door to open and on exiting the

room he/she should press the exit 2 push buttonoutside the room to notify the system that the person has

left the room or the system will automatically close the door in 30 seconds which is also changeable and

the ISS will be turned On.


No
Start Motion?

Yes

Trigger
EVMT

SMS Alert

Title: “Smart Motion Detection System using Raspberry Pi”

In surveillance, CCTV camera is costly because of the use of computer. It reserves too much
Stop
space for continues recording and also require manpower to detect the unauthorized Activity. But
Figure 4 Software Implementation of ISS
compared to the existing system Raspberry pi system is much cheaper with better resolution and low

power consumption feature. Here pyroelectric infrared (PIR) sensors are used as a simple but powerful

people presence triggers. This system is suitable for small personal area surveillance. i.e. personal office

cabin, bank locker room, parking entrance. Whenever the motion is detected through PIR sensor inside the

room the image is captured through camera and temporarily stored in the raspberry pi module. Internet-of-

things based application can be used remotely to view the activity and get notifications when motion is
detected. System works standalone without the PC once programmed. One android Application is used to

get the notification on motion detection.

Title: “Motion Detection and Face Recognition for CCTV Surveillance System”

This research is designed with four main processes: motion detection process, fac e detection

process, data training process, and face identification process. In general, the architectural design of the

research can be seen in diagram of Figure 1. The first step is by acquiring video images from CCTV. Those

images will be used for motion detection process. If a motion is detected, the information of time stamp and

images with detected motion will be stored. Then, the motion value will be compared to face detection

threshold. If the motion exceeds it, the face recognition process will be committed. Images with detected

motion will be the input of face detection process. This process will decide if the face object exists. If it

exists, detection information will be recorded and continued to face identification process.
Title: “Smart Surveillance Monitoring System Using Raspberry Pi and PIR Sensor”

The design and implementation of Smart surveillance monitoring system using Raspberry pi and

PIR sensor for mobile devices. It increases the usage of mobile technology to provide essential security to

our homes and for other control applications. The proposed home security system captures information and

transmits it via a 3G Dongle to a Smart phone using web application. Raspberry pi operates and controls

motion detectors and video cameras for remote sensing and surveillance, streams live video and records it

for future playback. It can also find the number of persons located with the help of the Infrared sensor. For

example, when motion is detected, the cameras automatically initiate recording and the Raspberry pi

device alerts the owner of the possible intrusion having a smart phone. Raspberry - Pi has two main

components interacting with each other: one is the Web Application that executes on the mobile device's
browser and server-side scripts that run in a cloud which will be operated by the Raspberry Pi Hardware

tool component.

Title: “IoT Based Home Visitor Monitoring System Using Raspberry Pi”

In today’s world, face recognition is an important part for the purpose of security and surveillance.

Hence there is a need for an efficient and cost-effective system. Our goal is to explore the feasibility of

implementing Raspberry Pi based face recognition system using conventional face detection. This paper

aims at taking face recognition to a level in which the system can replace the use of passwords and RF I-

Cards for access to high security systems and buildings. With the use of the Raspberry Pi kit, we aim at

making the system cost effective and easy to use, with high performance. This paper details the design and

development of IOT based security surveillance system in buildings using Raspberry Pi single board with
Wi-Fi network connectivity. Upon detecting the face, the controller enables the camera for capturing the

event, alerts the user by placing the live video of that event on webpage that is displayed in android mobile.

Title: “Anti-theft Security System Using Face Recognition”

The design of anti-theft security system is based on human face recognition and remote monitoring

technology. It will verify the person identity that goes near to the camera within certain distance. Only the

people who match the identity with database and key in the correct password have the right to entry. A
mobile application telegram and image processing technique LBP based have been involved in this system.

Electric door lock solenoid, keypad and LCD display will combined operate the accessibility of door.

Title: “Design and Realization of Motion Detector System for House Security”

The design and realization of motion detector system for house security-based GSM network is

presents. The development of microcontroller carried out intruder detection that supports tracking

techniques to provide vital security with control and alert operation inside and outside the home. The pivot

of security on the integration the motion detector and cameras into web applications has become more

interested. The smart surveillance Pi camera obtain the input from the motion detector and controller which

is send the video to the web server allowing the homeowner to access this video by use web applications.
An intrusion alert sends to the owner by mean of message via mobile and buzzers alarms located at

suitable distance. This system is typified proficient video camera for remote sensing and tracking with live

video for succeeding play again to offers efficient and easy implementation with omnipresent surveillance

solution.

Title: “Solar-powered, Wireless Smart Camera network: An IoT solution for outdoor Video Monitoring”

In this project, presents SlugCam, a solar-powered, wireless smart camera network that can be

used in a variety of outdoor applications including video surveillance of public spaces, habitat and

environmental monitoring, wildfire prevention and detection, to name a few. SlugCam was designed such

that it can be deployed and left unattended for extended periods without requiring regular maintenance,

e.g., frequent battery replacement. The system is built with off-the-shelf components which not only keeps it

modular and low cost, but also facilitates its prototyping, rapid duplication, and evolution. SlugCam’s on-

board processing capability allows computer vision software to run locally and autonomously. Energy

efficiency in SlugCam is accomplished both in: (1) hardware by micro-managing low-power components; as

well as in (2) software by having the system’s operation duty cycles automatically adapt to the current state

of the battery in order to balance the trade-off between application-level requirements and power

awareness. For example, SlugCam’s smart camera node changes its monitoring behavior based on how

much battery charge remains. Additionally, using its computer vision software, the system only records and

transmits information upon event detection which contributes both to the system’s energy efficiency as well

as its low network bandwidth requirements. SlugCam’s networking functionality enables camera nodes to

transfer video files, as well as collaborate on tasks such as visual processing, event detection, and object

tracking. It allows node-to-node, as well as scoped- or full broadcast communication. For  point-to-point

communication, SlugCam uses on-demand power-aware multi-path routing to transfer video files efficiently.

Another important contribution of SlugCam is to provide an open-source wireless camera network that can
adapt to address the requirements of future outdoor video monitoring applications. SlugCam also includes

a Web-based server where video data is stored as well as a Web-based user interface that allows end

users to interact with the system, tag, query and retrieve video files, and manage SlugCam nodes remotely.

In addition to a detailed description of SlugCam, this paper presents an extensive power characterization of

the system’s operation and showcases its deployment in a lab testbed and a real world scenario.
The house alarm system includes sensors, event, motions and all system activities has been

designed and running in MATLAB as showing in Figure above. In this design, when the system detects an

intrusion permit a certain time for alarm to be disable and otherwise calls the house owners. This system

illustrates how to use output events to derive all blocks and how to use direct event broadcasting to

coordinate between parallel states. Additionally, this model could show how to use the function call trigger

to simulate the security system which required to be every so often triggered.

2.12. Title: “A Smart Security System with Face Recognition”

Web-based technology has improved drastically in the past decade. As a result, security

technology has become a major help to protect our daily life. In this paper, we propose a robust security

based on face recognition system (SoF). In particular, we develop this system to giving access into a home

for authenticated users. The classifier is trained by using a new adaptive learning method. The training data

are initially collected from social networks. The accuracy of the classifier is incrementally improved as the

user starts using the system. A novel method has been introduced to improve the classifier model by
human interaction and social media. By using a deep learning framework - TensorFlow, it will be easy to

reuse the framework to adopt with many devices and applications.

SoF system experimental architecture inside a smart home. The SoF system consists of a camera

node, a cloud server, a smartphone and smart devices for interacting with users. The SoF system is shown

in Figure above.

Title: “Development of Face Recognition on Raspberry Pi for Security System Enhancement of Smart

Home System”

Nowadays, there is a growing interest in the smart home system using Internet of Things. One of

the important aspects in the smart home system is the security capability which can simply lock and unlock

the door or the gate. In this paper, we proposed a face recognition security system using Raspberry Pi

which can be connected to the smart home system. Eigenface was used the feature extraction, while

Principal Component Analysis (PCA) was used as the classifier. The output of face recognition algorithm is

then connected to the relay circuit, in which it will lock or unlock the magnetic lock placed at the door.

Results showed the effectiveness of our proposed system, in which we obtain around 90% face recognition

accuracy. We also proposed a hierarchical image processing approach to reduce the training or testing

time while improving the recognition accuracy.


The proposed block diagram of face recognition system using Raspberry Pi. Raspberry Pi has the

same processing capability of a single core processor with built-in graphics which can support up to 1080p

video standard using its High Definition Media Input (HDMI) port. The ultrasonic sensor is used to detect

the human presence. The relay circuit is connected to Raspberry Pi and provides an interface to the high

voltage magnetic lock. The status could be shown using LED indicators and/or further send SMS using

GMS module, or email using internet connection, or as part of smart home system as proposed in. Finally,

the overall power required is less than 1 A, so that a compact power supply, i.e. smartphone charger, could

be used as the power supply.

Title: “Smart Surveillance System using Thing Speak and Raspberry Pi”

This paper proposes the Smart Surveillance System using Thing speak and Raspberry pi. This

design is a small portable monitoring system for home and office security. The model uses hardware

mechanism such as Raspberry pi (model B), Gyro sensor and Raspberry pi camera. This system will

monitor when motion detected, the Raspberry Pi will control the Raspberry Pi camera to take a picture and
sent out an alert email with the image to the user by using Wi-Fi adaptor according to the program written in

python environment. And at the same time the sensor real time data is visualized in the form of charts in

Thing speak. The proposed system will work in standalone mode without the requirement of PC once

programmed.

The system consists of Raspberry Pi, Gyro sensor, Raspberry Pi camera, power supply and Wi-Fi

adaptor.

Title: “IoT: Building a Raspberry Pi security System with Facial Recognition”

As IoT grows, devices become more cheaply available and facial recognition develops rapidly, the

need for a system using these three components arises. Combining these three technologies will allow

tackling a diversity of use cases, from replacing door locks to smart CCTV systems. The result of the

presented project is a working system using facial recognition with OpenCV, IoT over the MQTT protocol

and Clients on the Raspberry Pi as well as on an Android mobile application. The thesis builds a foundation
using these three components on a system applicable in many further scenarios of facial recognition in

combination with IoT on low-budget hardware.

Starting from the Raspberry Pi in the Figure above, the achieved system has a camera connected

to the Pi over USB. The Raspberry Pi is responsible for detecting the homeowner’s face. It will handle

dataset generation, machine learning and recognition. As soon as the owner’s face gets recognized or an

unknown face enters the apartment, a notification will be sent to the user’s mobile phone. For this

functionality a message is sent to an IoT hub/server which will then forward it to our mobile phone. When

the application receives a message from the server, it will then notify the user through notification on the

phone.

Title: “Strengths of the Raspberry Pi” - ZDNet


Nick Heath (July 9, 2019). The Raspberry Pi Foundation has invested years of work in improving

the Pi's core software, notably its default operating system, known as Raspbian. The bespoke OS is

designed to get the best out of the Pi hardware and loaded with free software -- both the everyday basics

like a web browser and office suite, but also tools for learning to code. Yet the official support is only half

the story, with much of the board's usability coming from the plethora of community-created guides and

tutorials -- with the answer to many questions only a Google away. Beyond the staunch community support,

the Pi can be augmented by a broad ecosystem of boards and kits that extend its capabilities, turning the

board into everything from a robot to a virtual assistant. The Pi also strikes a shrewd balance between price

and capability. 

Title: “Visitor Monitoring System with Raspberry Pi and Pi Camera”

One interesting innovation of Video Monitoring System made by Saddam (November 11, 2016)

is Visitors Monitoring System with Image capture functionality. Interfacing Pi camera with Raspberry Pi to

capture the image of every visitor which has entered through the Gate or door. In this project, whenever

any person is arrived at the Gate, he has to press a button to open the Gate, and as soon as he/she press

the button, his/her picture will be captured and saved in the system with the Date and time of the entry. This

can be very useful for security and surveillance purpose. This system is very useful in offices or factories

where visitor entry record is maintained for visitors and attendance record is maintained for employees.

This Monitoring system will digitize and automate the whole visitor entries and attendances, and there will

be no need to maintain them manually. This system can be either operated by the person himself or there

can be operator for pressing the button for very visitor.


Title: “Home Automation – Real Time Video Monitoring System Using Raspberry Pi”

Sameer Gode, Devendra Hande, Atharva Hinge, and Madhuri Ghuge (2019) proposed Embedded

Real-time video monitoring system based on ARM is designed, in which the embedded chip and the

programming techniques are used. The central computing microprocessor which uses Raspberry pi is the

core of the whole system. Real time video transmission is widely employed in police investigation,

conferencing, media broadcasting and applications that include remote assistance. First, Raspberry’s

Camera Module video data are collected by the embedded Linux system. All information is processed,

compressed and transferred by the processing chip. Then, video information is sent to the monitor client by

wireless network. This embedded observance system is to overcome the weak points of the traditional

video surveillance systems, such as complex structure, instability, and expensive cost. It can be widely

used in many fields.

Title: “The Importance of Motion Detectors” – Lloyd Security Inc.

According to the News Security Guides (April 23, 2021). A motion sensor is a security device that

is installed in buildings to detect unauthorized movement in restricted areas, particularly after hours. The

device is used in commercial and residential properties, as well as on industrial and military premises.

There are various types of motions sensors on the market today. Motion sensors for homes are

manufactured with personal security and convenience in mind, and motion sensors for businesses are

designed to protect property as well, just on a larger scale. Motion sensors have become more advanced

in recent years, and now, they can even work with smartphone apps for remote activation from any
location. With motion sensors for homes, households enjoy advanced levels of security that keep family

members safe and belongings protected from theft.

Title: “Smart Web Cam Motion Detection Surveillance System”

Tuscano, Cynthia; Lopes, Blossom; Machado, Stephina; Rane, Pradnya (April, 2013) The basic

idea behind “smart web cam motion detection surveillance system” is to stop the intruder to getting into the

place where a high-end security is required. This paper proposes a method for detecting the motion of a

particular object being observed. The motion tracking surveillance has gained a lot of interests over past

few years. This system is brought into effect providing relief to the normal video surveillance system which

offers time consuming reviewing process. Through the study and evaluation of products, we propose a

motion tracking surveillance system consisting of its method for motion detection and its own graphic user

interface. Various methods are used in motion detection of a particular interest. Each algorithm is found

efficient in one way. But there exits some limitation in each of them. In our proposed system those

disadvantages are omitted and combining the usage of best method we are creating a new motion

detection algorithm for our proposed motion tracking surveillance system. The proposed system in this

paper does not have its effect usage in office alone. It also offers more convenient, effective and efficient

usage where high-end security comes into picture.

Title: “Privacy Commission Lays Out Rules On CCTVs” – CNN Philippines

Metro Manila (CNN Philippines, November 17, 2020) — The National Privacy Commission

released guidelines on the use, access and storage of closed-circuit televisions, including the need to

determine their purpose before installing in establishments and properties.


The agency on Tuesday told entities that put up CCTVs in public places that the use, retention and

destruction of footage are considered processing of personal data under the Data Privacy Act. It said

establishments must have a legitimate purpose before affixing the devices. These include compliance with

a law or regulation, security of properties and protection of important interests, ensuring public safety,

among other specific uses. Processing CCTV data and determining its location must only be done to fulfill

that purpose, the commission stressed.

The agency's Advisory No. 2020-04 stated that establishments should also post visible notices in

points of entry or other conspicuous areas to inform the public that they are being monitored through a

CCTV. These entities should also have a CCTV policy that states who is authorized to use and access the

devices, and lays out the procedure for providing or disposing recordings.

Title: “Philippines: CCTV Use Guidelines Issued by the Philippine National Privacy Commission” -

LEXOLOGY

According to the Quisumbing Torres organization, mentions actions to consider in installing CCTV

systems that clients are advised to strictly comply with the foregoing Advisory to prevent any data privacy

and security issues arising from the use of CCTV systems, as well as to retain the trust of its clients and

employees. Clients which currently have or are intending to use CCTV systems are advised to implement

the security measures listed in the Advisory for CCTV operations, including the conduct of a Privacy Impact

Assessment (PIA), which considers the principles of lawful data processing in their CCTV operations.

Conspicuous CCTV notices, a CCTV policy which covers the matters required in the Advisory, as well as

an access request policy which states the forms, requirements, and procedures for data subject/third party
requests for access/copy of CCTV footage, should all be in place for any and all CCTV operations of the

company.

Title: “Requirements for CCTV Installation” – The Private Security Authority

According to the requirements for CCTV Installment by The Private Security Authority (n.d.). There

is no theoretical limit to the number of cameras and monitors which may be used in a CCTV installation but,

in practice, this will be limited by the efficient combination of control and display equipment and the

operators’ ability to manage the system. The location survey shall have, at least, sufficient detail to address

the security requirements of the client and shall lead to a site plan being prepared with the optimal

positioning points for cameras being indicated on the site plan. The purpose of the location survey and site

plan is to identify the best placings for cameras, the direction of natural light, potential and actual

environmental problems.

Title: “What Are The Different Types of CCTV Camera?” – Caught On Camera

The Caught On Camera website (n.d.) DISCREET CAMERAS. These types of cameras allow for

discreet placement which means you can capture good footage of theft and criminal damage. Discreet

CCTV cameras beneficial because criminals will be less likely to spot them and therefore, they are less

likely to be damaged in the process. Other benefits of discreet CCTV cameras include: Can be propped up

or mounted; Can be disguised in various objects; and Effective for indoor use.
Title: “How-To Use Central Monitoring Software to View Security Cameras at Multiple Locations” – Security

Camera And Video Surveillance Blog

Mike Haldas (February 8, 2018) There are many surveillance system applications that require

monitoring multiple locations remotely over the Internet so that security cameras can be centrally viewed.

CCTV Camera Pros has helped many types of customers that require this type of central monitoring

capability. Here are a few examples: Business owner with multiple locations needs to view all of their

cameras remotely from their office and home; Small business owner needs to be able to view their home

security cameras and business cameras on the same screen; Security company wants to offer remote

camera monitoring services to their clients and needs a system that supports it; Property management

company wants to remotely monitor multiple properties from their headquarters office.

You might also like