Katherine Xavier, Author at Verkada

5 Video Camera Market Predictions for 2019

As we move through the beginning of another year, it is also great time to look forward at what’s to come in the wider industry landscape. To break down the biggest trends looming over the horizon, the following represent five video camera market predictions for the year ahead.

1. Cloud Migration

As with many technologies, video cameras have been moving to the cloud. However, the uptake has lagged the capability in some respects over the past few years—often due to largely unfounded fears about cyber security.

This anxiety is starting to dissipate. End users are realizing that the benefits are too great to postpone, and IT departments are increasingly looking toward cloud-based and hybrid cloud systems.

Outside of the enterprise space, more consumers are installing cloud-enabled video cameras in their homes. Many leading manufacturers are embracing cloud-first operations, a development that will only create more expectations for this method of storage and connectivity.

BIS Research predicts that the global video surveillance market will expand at a compound annual growth rate (CAGR) of 16.14% through 2023 and sees economic factors continuing to push the industry toward cloud-based systems. “The reduction in the cost of cloud storage solution has surfaced as a key opportunity for service players in the video surveillance market,” stated the research firm in its December Global Video Surveillance Market report.

Technological innovations are also driving migration. Two of the major drawbacks of cloud security cameras include bandwidth limitations and internet disruptions. Verkada’s cameras, however, record footage directly onto their solid state storage and then send metadata to the cloud in a way that can help optimize and lower the bandwidth footprint of each camera to as low as 5kbp/s in their steady state. This enables Verkada systems to function well, even in areas where limited internet connectivity prevents IP cameras from other manufacturers from operating. On-camera storage also means that Verkada cameras continue to record in the event of a network outage—providing cloud camera benefits without the typical drawbacks.

Other manufacturers have been moving to newer codecs to save on bandwidth needs. “Known as High Efficiency Video Coding (HEVC), H.265 can encode video files twice as efficiently, at a lower bitrate, than its predecessor,” states IFSEC Global in its Video Surveillance Report 2018. “Slashing bandwidth and storage consumption by about 50%, it’s a vital step forward given growing storage demands.”

2. Simplified Video Security Infrastructure

IT teams are being asked to manage more Internet of Things (IoT) devices and machine-to-machine (M2M) connections. According to Cisco, this trend is merely beginning. It projects that M2M connections will grow by 19.6% per year through 2022.

“A growing number of M2M applications, such as smart meters, video surveillance, healthcare monitoring, transportation, and package or asset tracking, are contributing in a major way to the growth of devices and connections,” states Cisco’s latest Visual Networking Index. “By 2022, M2M connections will be 51% of the total devices and connections.”

To stay on top of the growing workload, infrastructure simplification is critical. For similar reasons, companies no longer want to devote significant time and resources to running a massive video surveillance installation. Plug-and-play solutions have become the new mantra. Simply put, this is now what clients expect from providers.

This wasn’t always possible. In the past, complex setups once relied on a network video recorder (NVR) or digital video recorder (DVR) that served as a central hub that connected an array of cameras to on-site monitors and the wider network. Such systems were inherently complicated with many moving parts.

But hybrid cloud solutions, as well as other quick-to-implement and easy-to-operate options, have changed the marketplace for the better. It means users have more alternatives and legacy manufacturers are being forced to evolve. They recognize that they must deploy more-user-friendly operations or watch their clients sign a contract with someone who can.

These same market forces are also pushing companies to roll out better UI platforms. As we have seen with software-as-a-service (SaaS) models, simplification is also the goal here. In 2019 and beyond, expect camera software to start becoming more intuitive.

Not only will this make system operation more manageable, but it will also cut down on training costs and cause less disruption due to IT department employee turnover.

3. More Intelligent Cameras

The coming year will witness the introduction of smarter camera applications. It has been several years since motion detection became widespread, and we will see a similar expansion of intelligent capabilities in 2019.

This has already been occurring in the mass consumer markets. In an ongoing battle to outperform each other, mobile phone manufacturers have been unveiling advances in terms of facial recognition, augmented reality and other cognitive technologies. New consumer drones have also introduced sophisticated tracking capabilities. As we are seeing in other areas, features like these, potentially including weapon detection and sensors that can detect depth in three dimensions, will start to become more visible in the enterprise security space as well.

Such innovations mean that those in the security space will be demanding more—and soon. Increasingly, end users will insist that their eyes in the sky have the intelligence to match. The more that cameras can analyze the footage they record, the less oversight will be needed to monitor for common events.

This will further extend to more robust artificial intelligence and analytics capabilities as well, according to Scott Schafer, Chairman of the Security Industry Association (SIA).

“Today, modern physical security solutions are comprised of IoT devices and sensors that generate high volumes of security data,” said Schafer in a recent SIA report. “Applying analytics and artificial intelligence systems makes this data more actionable and increases responsiveness for security systems users.”

4. Cybersecurity Risks Continue to Mount

Cybersecurity remains a constant threat, and the financial impact only continues to grow. The Ponemon Institute 2018 Cost of a Data Breach Study found that the average cost of a data breach across the world last year was a staggering $3.86 million, representing a 6.4% jump from firm’s findings in 2017.

The video security industry is not immune. Like many other firms, companies in the sector face daunting challenges to safeguard networks and devices from attacks.

But the stakes are likely to get even higher in 2019. In addition to malicious actors seeking illicit financial gains, state-sponsored exploits are becoming ever more common. The Chinese government, for example, was reportedly the mastermind behind the data breach that exposed the personal information of some 500 million clients of hotel giant Marriott, according to the New York Times.

Just Security, the digital publication of the Reiss Center on Law and Security at New York University School of Law, has highlighted the severity of this incident. “The 2018 Marriott hack should be a wake-up call for Western countries, corporations, and citizens that soft cyber targets face a new threat from powerful cyber actors, with stakes which may be bigger than we or even those launching these attacks are yet able to realize,” wrote expert contributors Joshua Geltzer and Bryan Jones. “The result of such threats is that the private sector is now on the front lines of national security interests, with data vulnerabilities exposing risks beyond simple identity theft.”

Such developments will continue to be of concern to organizations, which have seen surveillance-specific exploits hit camera manufacturers including Hikvision and other Chinese brands. The last thing any company wants is to become known for having sensitive footage leaked to the public.

Given the danger that is now coming from all sides, expect both industry providers and clients to put an increasing focus on cybersecurity over the next 12 months.

5. Continued Market Disruption

The marketplace for video cameras and related surveillance solutions is fragmented. Consolidation means that some of the bigger industry players now control a larger percentage of the industry than they previously did. But many startups have also entered—and disrupted—the space.

The big three providers do now account for 40% of the market, according to IHS Markit, but two of those were not even among the top 10 as recently as 2005. Moreover, “there are still hundreds of relatively small video surveillance equipment vendors, many of them with a market share much lower than 1%.”

Given these dynamics, some consolidation is to be expected in 2019. But the research firm stated in its annual trend report that it does not foresee “a spree of large-scale mergers and acquisitions” to come any time soon.

Instead, IHS Markit predicts that “there will be more new entrants in 2019” and that “perhaps some of them will be among the market leaders of the future.”

Trends to Watch

Despite all the innovations so far, the cloud and smart technologies are only just now really upending the industry. This and increasingly sophisticated devices mean that it is easier than ever to implement simplified systems as well. And as cybersecurity challenges and startup mojo continue to alter end-user expectations, the entire landscape may start to look very different by the time 2020 rolls around.

For a deeper look at this topic, check out one of Verkada’s latest video security eBooks: The Future of Enterprise Surveillance.

Why Your NVR Is Probably Less Secure than a Hybrid Cloud Video Surveillance Solution

Video security systems have traditionally relied on a network video recorder (NVR) to capture footage. These devices, which serve as a central hub connecting an array of cameras, have long been billed as a highly secure system.

Although this reputation persists, it is largely unearned. NVRs, as well as digital video recorders (DVRs), are now routinely attacked and fail to provide anything close to the level of protection most IT professionals expect.

The “secure NVR” myth comes from the fact that an actual, air-gapped NVR is indeed incredibly secure. But this is less a function of specific equipment capabilities and more due to the fact that almost any device that is cut off from the wider network will be challenging for hackers to exploit.

NVRs: Only Secure in Theory

Unfortunately, few enterprises use NVRs in this manner. Most modern companies will want to have remote access to their footage. Whether for monitoring in real time at a central location or simply transferring archives of individual incidents, this is usually a must-have feature.

Some very small organizations may just want a single screen, or cluster of screens, for on-site viewing. But, by and large, even most small businesses—and especially larger corporations with multiple locations—will want a way to access what is being captured off site.

As soon as an NVR is connected to a network, vulnerabilities are introduced. Doing so requires opening or forwarding ports not to mention establishing a VPN, which are exploited by hackers all the time.

Attacks Are Common

In recent years, we have seen a trend of hackers targeting video cameras and NVRs. A NUUO brand NVR was targeted by the Reaper IoT Botnet in 2017, for example, and the exploit reportedly opened up the system’s cameras to similar botnet attacks.

This year, security research firm Tenable also found an exploit called Peekaboo that could affect the company’s NVRMini2 model. “Once exploited, Peekaboo would give cybercriminals access to the control management system, exposing the credentials for all connected video surveillance cameras,” wrote Tenable. “Using root access on the NVRMini2 device, cybercriminals could disconnect the live feeds and tamper with security footage.”

Disconcertingly, it isn’t just NVRs. Video cameras from certain manufacturers have proven unreliable as well. The U.S. Senate deemed the risk significant enough that it barred the federal government from using cameras from manufacturers Hikvision, Dahua and Hytera Technologies.

As codified in the 2019 National Defense Authorization Act, agencies are now prohibited from buying any surveillance equipment from these brands for the sake of “public safety, security of government facilities, physical security surveillance of critical infrastructure and other national security purposes.”

Poor Vigilance, Slow Updates

The confusion between reputation and reality is another key reason that NVRs can actually be less secure than other options. Many veteran IT workers who may have started working with video surveillance decades ago have fallen for the this security fallacy. Consequently, they don’t practice the same level of vigilance that they would when working with a modern, cloud-based surveillance solution.

Less vigilance leads to slower reaction times. Blinded by this false sense of security, operators tend to be lax about detecting vulnerabilities and installing critical firmware updates.

In practice, this typically makes the alternative much more secure. Most IT departments have moved on from the notion that anything connected to the internet will ever be 100% secure. Instead, they recognize that some level of risk will always exist, prioritize quick reaction times to mitigate known exposures and continually look for new vulnerabilities.

Hybrid Cloud Advantages

While the traditional NVR option is falling out of favor among today’s security pros, for more than just security reasons, there are other options. Cloud-based alternatives, while once held back by security fears, are now being seen as having several differentiating advantages.

Learn more about hybrid cloud video surveillance in our next webinar

In the case of Verkada, for example, the company provides ongoing support for clients with its team of security experts and constant penetration testing. Given everything the company has at stake, it is much more likely to stay on top of vulnerabilities than any single organization’s IT team.

Moreover, Verkada’s cloud-based cameras use advanced, end-to-end encryption—at rest and in transit. Transport security is provided by TLS 1.2. As for stored video, each camera is associated with a unique RSA keypair. The cameras are issued a public key, which they use to encrypt video and the private key is encrypted with AWS KMS before being stored.

These cameras and have outbound-only connections, drastically reducing the possibility of any unauthorized users accessing the network. Video security solutions that are built with security in mind from the ground up, have significant advantages over NVRs.

When you put it all together, the rationale for using hybrid cloud systems becomes clear. While the public relations for NVRs can talk a good game, they ultimately cannot live up to their reputation.

For additional information about this topic, check out our latest eBook, How to Choose the Right Video Security System for your Organization.

How Security Buyers and Vendors Can Create an Effective Partnership

Two Persons Hand Shake

Security buyers and sellers need each other. But when both parties don’t approach the relationship in the right way, it can become problematic. Buyers aren’t sure what solutions are right for their business. Vendors have the challenge of helping buyers understand their products, without scaring them off.

Filip Kaliszan, Co-Founder and CEO of Verkada, recently shared his insights on this topic in a CISO Security Vendor Relationship webinar. Here’s a quick look at some of the highlights.

What makes buying and selling security products so difficult?

A variety of elements contribute to the complexity of the security marketplace. First, there are so many different products. Security is a hot topic and plenty of companies are jumping into the space. So, there are almost as many vendors out there as there are products. This makes determining which of these are worthwhile, and eliminating those that aren’t, challenging.

For vendors, one of the main challenges is that security and its associated concerns are constantly evolving. Just a few short years ago, cameras were everywhere, but anxiety about them was lower. People weren’t thinking as seriously about privacy and the consequences of how data is captured, stored and moved. Today, there are more conversations about these topics. Organizations want to better understand who has access to surveillance recordings, when they are being accessed and what purposes they are being used for. This makes it critical for vendors to address these concerns as part of their sales process.

What tactics should vendors avoid when selling their products or solutions?

There are many different approaches vendors can take to sell their products or solutions. However, across the board, there are some methods that are generally not well-received. One popular, but ultimately ineffective, way to sell security solutions is with fear tactics.

Selling fear is a major turn off in the CISO community. The danger of using it as a selling strategy is that your message simply becomes noise. Buyers learn to block out these techniques because they don’t speak to actual needs. There are some instances where using fear can be appropriate. However, it shouldn’t be where the conversation begins.

Filip discussed his stance on this topic by saying, “There are certainly compelling events within organizations that drive decisions and often those compelling events are very scary things that happen in the physical world. We generally stay away from using fear tactics and techniques to drive our sales. We don’t think that’s an effective approach.”

Instead of using fear tactics, vendors should focus their attention elsewhere. Some start with a conversation about other aspects of the industry. Opening a dialog about the state of the industry, privacy and video surveillance is powerful. This increases trust with buyers by driving the conversation forward. Many of the most successful vendors choose to highlight how their products and solutions can impact the buyer’s business in quantifiable ways. Regardless of the specific approach, vendors should endeavor to share their insights, as opposed to pushing the fear and doubt angle.

Woman Sitting in Front of Man

How can buyers be confident when choosing their security products?

There are different contingencies involved for each organization that purchases a security product. Some have concerns about the physical placement of cameras. Others are more concerned with the IT aspects. Ultimately, buyers need a vendor to provide a security product that satisfies both physical and cyber security standards.

How can vendors build trust and create partnerships with potential buyers?

One way that vendors can build trust is to be transparent with their buyers. Let them dive deep into the technology and identify possible use cases. The more that a buyer is able to understand about what the vendor offers and how the process works, the more likely they are to choose that solution or product. From there, one happy customer can have a big impact. As buyers share what has worked for them, word spreads about the vendor and new accounts start coming in.

In order for buyers and vendors to have a successful partnership, the focus should be on approaching problems collaboratively. This way, the buyer is having their needs met. In turn, this gives vendors the opportunity to solve problems, show their value to buyers and improve their products.

There are many factors that go into developing effective partnerships. Even though it can sometimes be challenging, creating opportunities for cooperation is a worthwhile endeavor that can ultimately reward both parties. Buyers and vendors should aim to stay open to connecting with each other in order to solve the real-world problems that come with making and keeping our world secure.

Want to find out more about how buyers and vendors can work better together? Check out the Building Effective Partnerships Between Security Experts and Security Vendors webinar to get more insight on this topic and the state of the industry.

3 Ways to Hack CCTV Cameras (and How to Prevent It from Happening to You)

Though advances have been made in recent years, many CCTV cameras remain troublingly vulnerable to attack. Malicious actors have developed a wide range of techniques to circumvent security protocols and gain access to video surveillance systems.

Some use very simple exploits (that take mere minutes), while others prefer more sophisticated intrusions (that infiltrate even hardened systems). Though their methods may vary, talented hackers can make their way into your home security or enterprise surveillance network. Once inside, they can use remote access to watch the world through your cameras—or potentially even take control of them.

Raising the bar on security is the whole point of installing CCTV cameras in the first place. So, these vulnerabilities largely defeat the purpose of investing in a surveillance system.

TThe entire industry received a wake-up call to this reality following the revelation in 2017 that more than half a dozen Hikvision brand wifi cameras were being accessed through a backdoor password reset flaw.

The problem created embarrassing headlines (the hashtag #hakvision circulated on social channels). And ICS-Cert, an agency within the U.S. Department of Homeland Security, characterized the vulnerability as “remotely exploitable” with a “low skill level to exploit.”

Despite this incident raising overall awareness, many organizations are still woefully behind when it comes to safeguarding their camera systems. To better prepare, all enterprises should understand the following three methods that are among the most commonly used by criminals to gain unauthorized access to CCTV cameras.

Hack Method #1: Default Password Access

Anyone looking to break into CCTV cameras can start by simply looking for its IP address online and logging in. By using engines such as angryip.org or shadon.io, they can obtain that signature information and begin trying passwords that will grant access to the wireless camera itself or, if a router is attacked, entire security systems.

In theory, this should be difficult and IP security should protect network data, but the shocking reality is that these passwords are often identical to the default factory settings provided by the manufacturer. In the case of the Hikvision hack, it was known to be “12345” with a username of “admin.”

Changing default passwords for a new security camera system should be a no-brainer in this day and age. So the lesson here is to not overlook the small details. All the firewalls and hardened network protocols in the world won’t help if an unauthorized user can simply log in with a commonly-used or factory-set password to gain remote access to indoor outdoor surveillance.

Hack Method #2: Find the User ID

When CCTV cameras are harder to breach, malicious actors can instead look for the user ID. This was easy to find in a cookie value for Hikvision. Hackers could then reset the account to take over and have full run of the device, its hard drives, and perhaps the wireless security system as a whole.

“While the user id is a hashed key, we found a way to find out the user id of another user just by knowing the email, phone, or username they used while registering,” wrote Medium user Vangelis Stykas earlier this year even after Hikvision had worked to fix its known flaws.

“After that,” the writer continued, “you can view the live feed of the cam/DVR [digital video recorder], manipulate the DVR, change that user’s email/phone and password and effectively lock the user out.”

Hack Method #3: Finding Command Lines

A key flaw in the Hikvision case was a “backdoor” command line of code in the system that granted admin-level access when exploited.

Once this became common knowledge, the Chinese company recognized and patched the flaw. The patch was then included in subsequent firmware updates for all its security cameras with known vulnerabilities. Hikvision stated publicly that the code was a holdover from the testing phase, which developers neglected to remove before launch.

Despite all the press in the security community, many operators never bother to install the latest firmware onto their surveillance cameras. So, this flaw is an issue that even novice hackers will likely continue to leverage.

Understanding the Threat

Hikvision is not alone, but its failings showed that weak spots exist in even some of the most widely-used indoor and outdoor surveillance cameras on the market. This doesn’t mean that enterprises should simply change the model of their wireless security camera and expect to be protected.

Constant vigilance mixed with security intelligence is a powerful combination. All organizations should look to bolster these critical components—both internally, and when it comes to partnering with companies worthy of their trust. By working with vendors that put security at the top of their agenda, you can rest easier knowing that both the indoor and outdoor security cameras in your facilities won’t be the subject of the next trending social media topic.

Many organizations are beginning to recognize that traditional CCTV technology simply isn’t built for this new, connected era. Forward-thinking companies are increasingly looking for revolutionary solutions to strengthen the safety and productivity of their operations. Using the latest technology standards to unlock the potential of computer vision, modern video security providers will be the ones that help their customers solve real-world business problems—today and in the future.

To learn more about the future of enterprise video surveillance, check out our latest eBook, which explores why security professionals are moving from traditional systems to hybrid cloud solutions.

Video Surveillance Laws: Video Retention Requirements by State

Given the falling price point, ease of use and increasing demand for constant surveillance, more and more companies are using video cameras for security. In some cases, organizations are required to.

Many industries across the United States are required by local or federal regulations to maintain visual security. And each of those rules comes with its own specific details. It can all get very confusing, but it is incumbent upon all affected organizations to know the applicable requirements.

From traditional areas (like banking and infrastructure) to higher-risk sectors (such as gaming and recreational cannabis), companies need reliable, modern video cameras. Depending upon the situation, footage from each camera often must be preserved for a specific amount of time.

Any company operating in a regulated area should check all the local mandates to ensure compliance. But the following overview of some of these laws can help any business operator understand the common requirements.

New York Video Retention Requirements: Banking and ATMs

While widespread surveillance has become more common over the past decade, banks are one area where consumers have long expected cameras to be recording all the time.

In fact, video monitoring is required by the Federal Deposit Insurance Corporation (FDIC), the body that insures money in most banking institutions against theft or loss. The organization does not go into great depth about specific mandates. But part of its requirement for each bank includes “maintaining a camera that records activity in the banking office.”

The state of New York has also established an overarching “ATM Safety Act” intended to protect individuals using cash machines. Its security measures include a provision that ATMs must have at least one surveillance camera that can record anyone entering a facility if it is located in a building or “all activity occurring within a minimum of three feet in front of an automated teller machine located outside a building.”

In both cases, banks that operate ATMs must retain this footage for at least 45 days, according to the New York Department of Financial Services. Any reported violations of this requirement must be corrected within ten days. After this time, the institution becomes subject to fines of $2,000 per day if no solution is made. These fines can escalate further if the violation is “intentional,” “performed knowingly and with a reckless disregard,” or there is “a pattern of violations.”

Nevada Video Retention Requirements: Gaming and Casinos

Nevada is the only state where casino gambling and sports betting are legal across all jurisdictions, and the state gaming commission requires casinos in all locations, from Sin City to Reno, to maintain video surveillance.

However, the restrictions on retention in these world-renowned gaming palaces are less stringent than some other industries in other states—seeming to prioritize privacy over long shelf life.

“All video recordings of coverage provided by the dedicated cameras or motion-activated dedicated cameras required by these standards must be retained for a minimum of seven days,” per state law. And the rule extends that timeline to 30 days for “recordings of detentions and questioning by security personnel.”

Some federal regulations also govern the industry. Specifically in terms of gaming operations on Native American reservations, the Department of the Interior mandates that a “surveillance system shall be maintained and operated from a staffed surveillance room,” which must be located so that it “is not readily accessible by either gaming operation employees who work primarily on the casino floor, or the general public.”

In terms of footage retention, all recordings must be preserved for at least seven days. And as in Nevada, footage “involving suspected or confirmed gaming crimes, unlawful activity, or detentions by security personnel, must be retained for a minimum of thirty days.” Operators also must maintain a video library log that demonstrates “compliance with the storage, identification, and retention standards.”

California and Colorado Video Retention Requirements: Cannabis

Given the stigma still facing recreational marijuana laws, states have taken precautions to ensure security within the industry. While some locations have a public that is very tolerant of cannabis, officials crafting the laws are keenly aware of the negative press and fallout that comes with any high-profile incident.

California has established strict laws across the board and requires any company operating in its legalized marijuana industry to have security cameras and retain the footage from those cameras for at least 90 days as part of an overall security plan that is reviewed and approved by the state’s Department of Cannabis Regulation (DCR).

The state also goes into more detail than most about the technical specifications required for recordings. The digital camera must record 24/7, at a minimum resolution of 1280×720 pixels and 15 frames per second, every day of the year.

Location is another factor that is covered. “Each camera shall be placed in a location that allows the camera to clearly record activity occurring within 20 feet of all points of entry and exits on the business premises, and allows for the clear and certain identification of any person and activities in all areas required to be filmed,” according to the state regulations.

Recordings are subject to inspection by the DCR. Any surveillance solution must also “be equipped with a notification system” that informs the operator “of any interruption or failure.”

While California is still new to the legal recreational marijuana world, Colorado’s laws go back the furthest of any state and helped set a standard. “All camera views of all limited access areas must be continuously recorded 24 hours a day,” says that law. “The use of motion detection is authorized when a licensee can demonstrate that monitored activities are adequately recorded.”

It requires companies to retain footage for 40 days and store it “in a format that can be easily assessed.” Recordings, with the date and time clearly displayed, must be stored in an archival system that “ensures authentication” of the footage as “legitimately captured” and with “no alteration.”

The state also mandates that, before selling an establishment, owners delete all retained recordings older than 40 days.

New York and Georgia Video Retention Requirements: Law Enforcement

There have been many high-profile, controversial incidents involving the use of force in recent years. With this in mind, police departments across the country are looking for ways to better ensure accountability. Body-worn video cameras (also known as bodycams), worn by officers of the law, have become popular nationwide. But there remains a heated debate about how to handle the footage.

New York City has established a six-month minimum on the retention of footage from bodycams by police officers—a duration that, due to concerns raised by privacy groups, was dropped from an initial one-year expectation.

Despite the privacy concerns of some experts, public surveys have suggested that citizens prefer a longer retention requirement. And as of last year, the NYPD was working under different requirements, depending upon the nature of the footage.

For any generic encounter with a member of the public (such as routine stops or witness interviews) video should be retained for six months, according to the latest policy. If the encounter was deemed “adversarial” this would be extended to 18 months. If there was a “use of force,” this becomes three years. Any footage pertaining to an arrest or civilian complaint would be retained until the case is fully concluded.

Georgia has set similar retention standards for police forces across the state, using a 180-day timeline for mandatory preservation. And recordings that are known to be related to incidents have those limits extended to two and a half years.

The state also has guidelines and standards for storage, security and recovery of any footage that is lost. Something it knows will be a challenge at small police offices that rely on “aging technology.”

“If police departments don’t allocate the resources required to manage their required use of body cameras, review footage to ensure compliance, and maintain storage and retrieval capabilities, then we could potentially create bigger problems in the aftermath of police shootings,” said Dan Beck, director of Local Government Risk Management Services (an agency within the Georgia Municipal Association), in a public statement.

Do Your Homework on Video Retention Requirements

These regulations represent but a few of the many rules governing the use of video surveillance in the United States. Whether you are operating in one of these sectors, or another highly-regulated industry—such as healthcare, insurance, energy, or infrastructure—make sure you are thoroughly prepared and informed.

As technology has advanced, so too have the specifications. Some standards are now very detailed and outline everything from camera location, to resolution, to video retention requirements. By knowing the rules in your area and using equipment and protocols that are up to the task, you can rest easier knowing that you won’t run afoul of the law.

Ready to become compliant with video retention requirements in your state? Evaluate hybrid cloud solutions like Verkada that make video storage simple and foolproof.

Learn more in this 3-min. customer testimonial, where the City of Parkersburg shares how Verkada’s security camera system has kept their town and residents safe.