article thumbnail

Understanding Different Types and Uses of Video Surveillance Data

Security Industry Association

Workplace privacy: Will the company need to consult with its workforce? In all video surveillance uses, there must be transparency about the authority, purpose and justification, along with proportionality and reciprocity, as outlined in the SIA Privacy Code of Conduct. Who are the new stakeholders in the business?

article thumbnail

The 9 Best Books for Disaster Recovery Managers in 2022

Solutions Review

OUR TAKE: Authors John Rittinghouse and James F. Rittinghouse is a management consultant for large enterprises as well as a member of the Federal Communication Commission’s Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity. ” GO TO BOOK. Ransome has a Ph.D. ” GO TO BOOK.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIA New Member Profile: IXP Corporation

Security Industry Association

New Security Industry Association (SIA) member IXP Corporation provides emergency communications consulting, technology and managed services for public safety, governments, campuses and private industry. A true partner with staying power, not just a drive-by consultant.

article thumbnail

Audit Checklist for SOC 2

Reciprocity

Companies that manage, assist, or consult on money or accounting processes. Processing integrity: System processing is complete, valid, accurate, timely, and authorized to meet your service organization’s objectives. Providers of corporate intelligence, analytics, and management services. Availability. Processing integrity.

Audit 52
article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

Embrace Access Control: Implement strong authentication and authorization protocols to ensure only authorized applications and users can access data. For example, the shift towards cloud computing is creating new security and privacy challenges, as organizations migrate data and applications from on-prem or between cloud environments.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

Embrace Access Control: Implement strong authentication and authorization protocols to ensure only authorized applications and users can access data. For example, the shift towards cloud computing is creating new security and privacy challenges, as organizations migrate data and applications from on-prem or between cloud environments.