Saturday, January 26, 2019

CCTV Control Room Operator selection - A best practice guide

CCTV Control Room Operator selection - A best practice guide
By Arindam Bhadra
A doctor; a teacher; an environmentalist. There is one common motivation why you would choose one of these careers: to help people. But there’s one more career that sits in the background and doesn’t get as much limelight as it probably deserves.


BS EN 50132-7: 2012 and BS EN 62676-4 clause 12.1 state: “If the CCTV (closed circuit television) system has a requirement for live viewing, camera control, system management, or any other human intensive tasks, a control room should be specified to house these functions. The ‘control room’ could be a single workstation, or a large operations centre.” The effectiveness of Video surveillance / CCTV control rooms is influenced by a variety of factors. CCTV operators are usually technology buffs who love the technological side of Video surveillance systems. CCTV operators at CCTV Control Room face several issues ranging from poor attention span, video blindness, fatigue, boredom, lack of situational awareness, bias and false alerts. There is, however, another side to the CCTV Video surveillance sector that the world desperately needs. Keeping people safe from harm and maintaining order in our society has become a lot easier as CCTV technology advances. However, the ‘human factor’ within the CCTV system is equally as important in achieving the objectives of the CCTV function. The capacity of the person selected in any job will determine the success of that person in the position, no matter what kind of environment it is. I’ve heard it mentioned that CCTV is as simple as watching TV, including by a senior police officer in the India who should have known better. Similarly, the placement of contract guards into CCTV positions when they have received no training and don’t know what to look for is also common. Where detection is critical will know that the operator is the most essential part in CCTV service delivery. "Cameras never lie". but, how will you know? ‘see’ what the cameras ‘saw'. Do audit your CCTV–why suffer? The CCTV Control room should be set up, or redesigned, according to a CCTV operational requirements plan and the CCTV room staff, as end-users, should participate in this process. BS EN ISO 11064-1 says Ergonomic design of control centers Principles for the design of control centers.
A CCTV video footage auditor can be defined as one who audits, reviews, examines closely, CCTV footage daily, at periodical intervals, with an intent to discover the ‘unknown’. Using all the tools available at her/his disposal, she/he ‘looks out’ for exceptions, process violations, abnormalities, performance lapses, behavioral patterns, potential threats, risks and so on. She/he de-bugs bytes of visual information multi-tasks by comparing past cases. ‘Auditing’ means 'seeing' what the cameras 'saw'. CCTV video footage should be audited daily; several times a day if need be. Depending on the requirements, auditing of CCTV footage of critical cameras on a daily basis must become an SOP.


“The capacity of the person selected in any job will determine the success of that person.” Says Mr. Shankar Mallik, Director - Uma Enterprise. Leading System integrator Security Automation field.
Selection of CCTV operators
The selection of CCTV operators should follow a formal process and be based on a sound analysis of the job tasks. It is acknowledged that in some cases CCTV operators are selected and employed by third party contractors. Nevertheless, there may still be opportunities for CCTV managers to influence the appointment and training of these individuals.
Selecting the right people for the CCTV operator role will help to maximize the motivation and job performance of the operator team. Within larger organizations the recruitment and selection of personnel is often the responsibility of the human resources function. However, depending on the context, managers may exert a degree of influence on the selection process for CCTV room staff. CCTV roles will differ across sites, and the actual job requirements should flow from the organisation’s goals and the operational requirements of the CCTV room. In line with this, the selection process should begin with a suitable examination of what the role entails via an analysis of the job.
Job Profile could be:
  1. ·        Sitting in front of a bank of up to 15 screens, constantly monitoring the live pictures that come in from the surveillance cameras
  2. ·        Operating the position of the cameras, for example if a cash machine is about to be emptied, you would focus the camera on the security guard
  3. ·        Monitoring anyone acting suspiciously, and alerting security staff or police if you see an act of theft, vandalism or any other crime
  4. ·        Monitoring cleaning staff working in large empty buildings for their safety
  5. ·        Notifying the police of any anti-social behaviour
  6. ·        Keeping a log of all incidents to pass onto police
  7. ·        Called to give evidence in court as a witness.

Job analysis:
Job analysis is designed to produce systematic and reliable information about a particular role. It provides the basis for writing an accurate job description, will assist in developing a structured interview and serve as a basis for any selection tests which might be used. The aim of the job analysis is to derive a comprehensive list of job tasks, how they are carried out and the worker characteristics – aptitudes, skills and experience – which are necessary to perform them. As well as covering the current role it is a good idea to consider how the job may change in the foreseeable future. The organisation’s human resources department may have a preferred method for carrying out job analyses. For the CCTV operator role (compared to say, a senior management role) the job analysis may not need to be very complex. Since any amount of footage from any given day could be required at any given time, properly storing footage is one of the most important roles of a CCTV Operator. Storage policy can vary slightly from company to company, but in general CCTV Operators will need to correctly catalog all footage so that it can be easily recalled at a later time.

Selection process
Once the job has been adequately defined, selection of candidates can begin. The interview is still by far the most widely used method of selection; however evidence suggests that the traditional ‘unstructured’ interview is not a particularly good predictor of job performance. Structured interviews have been found to be twice as valid (i.e. predictive of future job performance) than unstructured interviews.

Tests
Tests fall broadly into two categories. The first category includes tests of cognitive ability such as aptitude tests and tests of general mental ability (for example numerical reasoning, verbal and non-verbal reasoning, visualspatial abilities). The second consists of personality tests that aim to measure personal traits and preferences; for example a person who measures high on the trait of ‘conscientiousness’ is likely to demonstrate a reasonable level of persistence when performing a variety of tasks.

Operator Skills
Successful CCTV Operators are mindful, alert and scrupulous individuals who are highly dedicating to protecting others. In addition to having a talent for all things technical, they also have the ability to quickly identify patterns and abnormalities. In addition to these general personality traits and abilities, employers are looking for CCTV Operators with the following skills:
  1. ·        Surveillance System Knowledge: Because extensive knowledge of video surveillance systems is to crucial to the job of a CCTV Operator, many employers required CCTV Operators to have video surveillance certification of some kind.
  2. ·        Attention to Detail: CCTV Operators must be able to identify small, seemingly insignificant details that most people would overlook. This ability allows them to keep the area as safe as possible.
  3. ·        Ability to Multitask: Even when a CCTV Operator receives a phone call or has to speak to a colleague, they must always be keeping an eye on the monitors.
  4. ·        Ability to Work Independently: For the most part, CCTV Operators will not be required to interact with very many people. Because of this, it is important that they’re able to work and stay alert without constant supervision.
  5. ·        Communication Skills: Since CCTV Operators will occasionally have to give statements to police officers, communicate with emergency services or even appear in court, they need to have strong written and verbal communication skills.

Training
Training is important for motivation and performance and should be designed to meet operational needs. Where CCTV operators are employed directly by the organization /site at which they work, there will be greater scope for influencing training in comparison to where the operator/guard force function is sub-contracted to an external organization. However, contracted operators should have received at least basic training in CCTV.
Methods for carrying out the training needs analysis include interviews, observations, focus group discussions and questionnaires with job incumbents and other stakeholders. Existing job analyses/person analyses may not be up to date so it could be worth taking a current view of the job role.
Since the exact role of a CCTV operator will differ from organisation to organisation, detailed training needs will necessarily differ. However, as a minimum, it is recommended that training should cover the areas in the following list.     
  1. ·        Induction into the CCTV role, CCTV team and the wider organization Operation of all CCTV room equipment Team building with the immediate team.
  2. ·        Detailed knowledge of camera positions and of the site(s) to be monitored – in practice this means getting out and ‘walking the plot’ wherever possible – including visits to remotely monitored sites.
  3. ·        Detailed knowledge of camera positions and of the site(s) to be monitored – in practice this means getting out and ‘walking the plot’ wherever possible – including visits to remotely monitored sites.
  4. ·        Knowledge of the current nature and level of security threat to the site(s) – Local police authority, Intelligence Bureau can provide advice on this.
  5. ·        Knowledge of the nature of unwanted or suspicious behaviors/incidents as they relate to the site.
  6. ·        Knowledge of the current nature and level of security threat to the site(s) – Local police authority, Intelligence Bureau can provide advice on this. Knowledge of the nature of unwanted or suspicious behaviors/incidents as they relate to the site.
  7. ·        Understanding of the role of relevant external teams, agencies and/or networks. It can be beneficial to operate a policy requiring operators to regularly visit members of the team who are based ‘on the ground’ in the site being monitored, or even those in related agencies or organizations.
  8. ·        Preparation for emergencies. Such training is often achieved using incident simulations / scenarios that attempt to model the conditions of a real emergency.

Spatial awareness
We find that often the 80/20 rule applies in surveillance, with about 80% of the incidents being detected by 20% of personnel. I can often see the motivation differences within the training environment as well where people committed to detection have a different philosophy. So one of the first criteria I would want in any operator who would work for me would be to be able to demonstrate a history of detection. Not ‘we detected’ which often covers up a lack of individual involvement, but ‘I detected’. By keeping an eye on them, criminals can be stopped the moment they want to perform a crime. The increased attention may even stop them in their tracks. A CCTV operator who is motivated by his or her moral values finds excessive joy in using expert skills to protect people and their possessions in public venues. Good quality cameras and monitors, along with effective placement, will allow operators to observe the environment well and support their ability to understand the location and likely direction of targets during a dynamic incident – i.e. maintain ‘spatial awareness’. Spatial awareness is an understanding of our location in space and the organisation of objects around us. What operators need to see in the environment will depend on their tasks, which should link to the operational requirements of the control room. Ideal specification and positioning of cameras is dependent on operational requirements but also on what an operator needs to complete a task successfully.

Leadership and management
Research indicates that highly motivated employees perform better and show more commitment to the organisation than unmotivated employees. The way that people are managed and led can significantly affect their perceptions about their job, and in turn their job motivation. Motivation can be a personal trait (i.e. be part of someone’s personality) but it is strongly influenced by elements of the job itself. It is also associated with the rewards a person receives from doing the job. Rewards include the personal satisfaction from a job well-done, as well as recognition from the organisation’s customers, team members and managers.
The minimum recommendation here is that first line supervisors and/or managers should receive formal leadership training which is aimed at achieving effective team and individual performance and which is appropriate for the context in which they work.

Appraisal
Regular appraisals help encourage employee motivation and maintain commitment. At minimum:
·      Appraisers should receive appropriate training for conducting company appraisals.
·    Appraisals should identify mutually acceptable performance and development goals. These individual goals are often linked to the goals of the team, department and/or organization
·        Appraisals may or may not be linked with rewards (including pay); however where they are linked with rewards care should be taken to ensure that the process of reward distribution is systematic and fair, and also perceived as such by all team members

Pay
The figures below are only a guide. Actual pay rates may vary, depending on:
·        where you work.
·        the size of the company or organization you work for.
·        the demand for the job.
CCTV operators can earn from around ₹ 14,500 to ₹ 15,800 per month. With experience, this could raise to ₹ 17,000 per month basis. You may get a shift allowance.

Ref:
BS EN ISO 11064 books.
BS EN 50132-7 Books.
BS EN 62676-4 Books.

This artical published on safe secure magazine Volume 10-issue 1- January 2019 issue.

Sunday, January 6, 2019

PoE NVR and PoE Switch

Difference between PoE NVR and PoE Switch?

Sir “I’m going to install two IP cameras in my house. However, I have no idea whether to use a PoE NVR or a PoE switch matching with them. So, what’s the difference between them? “

Hello “Arindam sir, this is XXX from BBB, as you are security expert, I realy confused from my cctv vendor, someone quote PoE based NVR someone quote PoE switch with Normal NVR. Please suggest which technology is best for us.”


Such type of questions I face throughout 2018, which indicates many people feel confused about the selection between PoE NVR and PoE switch. This write-ups / blog intends to explore the differences between PoE NVR and PoE switch in details.
What Is PoE?
PoE, an abbreviated form of Power over Ethernet, allows a single CAT cable connecting a power sourcing equipment (PSE) to provide both data connection and electric power to powered devices (PDs) such as IP cameras, wireless access points, etc.
What Is a PoE NVR?
NVR represents for network video recorder which provides you with centralized video controls to easily view, manage, and store your surveillance footage in one convenient location. A PoE NVR is a security video recorder with built-in PoE switch designed to use with PoE-based IP cameras.

Equipped with a PoE switch, a PoE NVR recorder can deliver both data and power over a single Ethernet cable. There is no need for an additional PoE switch, which will reduce the cost of equipment in theory. You just need to connect one Ethernet cable from the camera to the PoE NVR recorder and then the built-in switch will provide power to the camera while transmitting data.

A PoE NVR is ideal for users with minimal network administration experience and is generally used in homes and small businesses. It creates a private camera network, keeping surveillance footage isolated from the main network and adding an extra layer of privacy.
What Is a PoE Switch?
A PoE switch or power over Ethernet switch, containing multiple Ethernet RJ45 ports, is a dedicated network switch with multiple Ethernet ports to connect network segments and provide power and network communications.

It expands a network created by a router. Basically, it just assigns LAN IP addresses to your camera and needs to be tied into a system that allows you to see and manage your cameras, which is usually done with video surveillance software on a computer. Therefore, it must be connected directly to a router on the same network as your NVR. It can reduce the need for extra outlets and extension cables and saves deployment cost and labor efforts as well.

Power over Ethernet switch can be classified into many types. In addition to the most common one, gigabit PoE switch, for example, there are other types as well such as unmanaged and managed PoE switches. Most PoE switches provided in the market have standard gigabit Ethernet ports which can provide speed of 10/100/1000Mbps. For smaller network, 8-port Gigabit PoE switch is very popular. For larger/enterprise network, we use 24-port PoE switch and 48-port managed switch.
Main difference between a PoE NVR & PoE Switch
From the above, you will see that both PoE NVR and PoE switch can provide power and data transmission. However, the former is limited in minimal network administration experience while the latter can expend the network freely. What’s more, a switch does not assign IP addresses, which is the job of a DHCP server, usually built into a router. PoE NVRs provide this service, while PoE switches don’t. The switch simply provides a data path between all of the devices connected to it.

Note: You cannot plug a POE switch into an NVR directly - it must be plugged into your network.


Tips of Hanwha PoE NVR 
By default, PoE NVRs are set to connect directly to IP cameras.  In cases where the PoE ports are connected to network switches, the NVR must be put in Manual mode.
In addition, the PoE ports are set to Isolated mode, where each device can only communicate only with the NVR and not each other.  This is a security feature to prevent rouge devices from accessing other devices on the network.  This will prevent a connected PC from accessing IP cameras for setup changes.
If you are uplinking non-camera devices, such as switches, media converters, PCs, etc., you must set the NVR to Manual mode.
From the setup menu of the NVR, navigate to System > System Management > Settings > Load Factory Default.
Select the Manual Setup Mode.  If you wish to save some of the settings to speed up setup, check the Not Included options of User, Camera, and/or Network as needed.

Click the Initialization button and wait for the NVR to reboot.

This Write ups published on safe secure magazine Feb 2019 issue.


Friday, December 28, 2018

Pune CCTV makes revenue from traffic violators

Pune CCTV makes revenue from traffic violators

Pune city police is the law enforcement agency with jurisdiction over 790 km2 comprising Pune and Pimpri-Chinchwad cities in Maharashtra. The city police are a division of Maharashtra police. The current Pune commissioner ate came into existence on 1 July 1965. Pune city police operates from 33 police stations. It also has the responsibility of traffic policing the city roads.


The police commissioner-ate is divide into two regions, North Region and South Region. Each region is headed by an Additional Commissioner of police. Each region is divided into two zones; hence there are four Zones in Pune City vitz. Zone – 1, zone – 2, Zone – 3, Zone – 4.
Each Zone is headed by a Deputy Commissioner of Police (DCP). Each Zone is further divided into two or three sub-division. Each Zone is further divided int two or three sub-divisions. Each sub-division is headed by an Assistant Commissioner of Police (ACP).

Pune city surveillance, referred to as PCS, is a holistic and integrated video surveillance system for the city of Pune. The PCS System of IP based outdoor security cameras across various locations in the city of Pune. The Video surveillance data from various cameras deployed is stored at data centre and monitored at all police stations, command control centers at CP office, PMC office, PCMC office and Collectorate.
  • The system consists of total 1363 cameras
  • Fix Box Cameras are 1068
  • Pan-Tilt-Zoom (PTZ) cameras are 217
  • Automatic Number Plate Recognition (ANPR) cameras are 78

These Cameras are spread across 418 Locations along with 22 Locations for ANPR Cameras.

The live video feed from all these cameras is continuously saved and stored in the data centre which has the capacity to store the video from all the cameras up to 90 days and 180 days storing capacity for ANPR Cameras.

Following command control and viewing centers are setup for viewing the live feed from the system.
  1. Command and Control Centre at Commissioner of Police office with a viewing capacity of 150 cameras at time.
  2. Viewing centre of PMC with viewing capacity of 60 cameras at a time.
  3. Viewing centre of PCMC with viewing capacity of 25 cameras at a time.
  4. Viewing centre of Collectorate with viewing capacity of 10 cameras at a time.
  5. Viewing centre at each of the two Regional offices with capacity to view 10% of total cameras in the respective region, at a time.
  6. Viewing centre at each of the four Zonal offices with capacity to view 10% of total cameras in the respective zone, at a time.
  7. Viewing facility at each of the 40 police stations, with capacity to view 50% cameras in the respective police station jurisdiction.

Description of Components :
  1. Network and connectivity – All the surveillance equipment is connected in network, so that the video feeds are available at data centre as well as viewing centers 27X7.
  2. Data centre and applications – A data centre with high end servers with large storage facility is established, along with application servers. This center holds all the recordings from all the cameras, as well as all the monitoring applications.
  3. Command and viewing centers – the command centre is established in the CP office. Additional CP office, Zonal DCP offices, PMC, PCMC, Collectorate and Police stations have viewing centers for viewing the live video feeds from respective regions. The command centre at CP office also has video-wall for viewing. Other viewing centers have TV sets as well as workstations for effective monitoring of live video.
  4. Collaborative monitoring - The existing surveillance systems of Public and private establishments will also be integrated into PCS systems, so that in case of any incidence at these places, the video feeds will be available.
  5. Help desk and facility Management system – A system is established along with man power, to monitor and maintain the entire infrastructure. A responsive help desk with ticketing system is established so that, any fault in the system is resolved in time and the system is resorted in normal state as soon as possible.

Optimum Utilization :
  1. Maintaining Law and Order – Local commotion, Riots, Crowd gathering, Public festivals, Pubic gathering, Fire incidents.
  2. Crime investigations – Burglary, Robbery, theft, identifying people/vehicles, Harassments to shop-keepers/local people, fights, Tracing of Murders.
  3. Traffic controlling – Flow of Traffic, Density of traffic at junctions, Traffic congestion, Violation of traffic rules, Hit-and-Run cases, and Road accidents.

Support Pune Police to Maintain Law & OrderThe live video feed, 24×7 along with automatic various alerts, will enable police to understand the situation on the ground early, so that police can react in-time.
Act as an aid to investigationEntire video feed is recorded 24×7. So, any historical or past situation can be easily viewed by police.
Improve Traffic ManagementBuilt-in video analytics will generate automatic alerts for traffic violation.
Help in deterring, detecting and thus dealing with criminal activitiesContinuous display of live video, automatic alerts for crowd gathering, suspicious objects, suspicious loitering, automatic number plate recognition, will all help police to detect and deal with criminal activities efficiently.
The city traffic police collected Rs 7 crore more in 2018 as compared to the previous year after implementing the CCTV-drive e-challan system. In 2018, 2.5 lakh more violators were fined as compared to 2017, according to the information released by the Pune traffic police department.

The department took action against 18 lakh residents for traffic violations in 2018. Of these, 6.33 lakh cases were registered through the CCTV (closed-circuit television) surveillance system.

“Apart from active traffic policing, the major reason behind higher number of cases in 2018 are the CCTV’s installed across the city that captures the violations,” said Tejaswi Satpute, deputy commissioner of police (DCP), traffic.

A CCTV system captures the image of violators at traffic junctions and transmits it to the command and control centre of the traffic department through which a case is registered and fines are collected by the traffic personnel.

Residents who have violated the traffic norms can also go to the web portal (punetrafficop.net/) and pay the fines by filling the required details of the vehicles. The website provides details of the case, including the photograph of the vehicles violating the traffic rules.

In 2018, the traffic department generated a revenue of Rs 44 crore in fines, higher by Rs 7 crore than collected in 2017.

Out of the total 18 lakh cases, maximum numbers of fines were imposed on those vehicles that were found violating zebra crossings. Such violations amounted to 6.12 lakh cases out of the total 18 lakh cases where people were fined Rs 200 each.

“Zebra crossings are marked with black and white stripes on the road and zigzag lines on either side warning drivers that there may be pedestrians crossing or waiting to cross the road. They also tell drivers that they must give way to pedestrians on the crossing. However, people still violate these basic rules which results into taking actions against them,” said Satpute.
Due to the use of technology, we have the past records of traffic violations which have helped us to fine the offenders. We are now in a position that we can give the exact time and details about the traffic violations. Every day between 3 pm and 7 pm we conduct a drive across the city where we collect pending fines from violators using the records that we have with us – said traffic constable. 
At Nagpur, From October 6, 2016 and April 2, 2018, as many as 4,49,568 motorists were caught on mobile cameras breaking traffic rules. Of them, e-challans were already issued to 4,15,024 and fines too were recovered from them. The move has actually gone well as many motorists started following rules. The number of two-wheelers using helmets too have increased manifold.
Read Artical: ANPR

Friday, December 7, 2018

Top 8 BMS Companies in the 2018

Top 8 Global BMS Companies in the 2018

This is 2nd post in this blog regarding BMS - Building Management Systems. The rising need for integrating smart automation systems with the modern infrastructure is encouraging various building management system companies across the globe to offer superior and premium quality solutions for the evolving audiences. The objective of the Intelligent Buildings Management Systems (IBMS) is to centralize the monitoring, controlling operations with innovations, technological and skilful management of facilities within the building (From BMS Room). This system helps to achieve more efficient building operations at reduced energy and labor costs while providing a safe and quality working environment to the occupants. IBMS include wide range of variety of products, such as general light control, access control, security control, communication protocol, HVAC control, outdoor controls and others. Intelligent building is one of the emerging concepts in which modern infrastructure is being equipped with a variety of automated and manned control systems and monitoring devices.



Global Integrated Building Management Systems Market Analysis
Flexibility offered by various open integrated building management systems is one of the key factors fuelling the global IBMS industry to witness a CAGR of more than 12% by 2021. The ability of open systems to function as fully interoperable control systems and define protocols enabling the co-existence of multiple systems on the same platform make them the most viable choice for the modern companies willing to create automated or intelligent buildings. Furthermore, manufacturers are also leveraging these open systems as they allow the conversion of dissimilar products into seamlessly networked systems offering low cost and enhanced features often unavailable in proprietary systems.


Moreover, The Indian economy has shown steady growth in the last decade, despite the global economic meltdown. With the growth of income levels and more than one earning members households, the Indian average disposable income is growing fast resulting in enhanced demand for goods and services. Therefore several companies are trying to leverage this opportunity by establishing new plants in this country In 2017. The market seems to be quite fragmented and is going to result in intense competition in the next few years as various international players are focusing on increasing their customer base by acquiring or forming strategic partnerships with local or regional players.

Honeywell
Headquartered in the US, the company has been making a variety of commercial and consumer products since its inception in 1906. Honeywell, with the help of over 131,000 employees across the globe has been able to operate through key business units including Honeywell Aerospace, Home and Building Technologies (HBT), Safety and Productivity Solutions (SPS), and Honeywell Performance Materials and Technologies. Honeywell is a Fortune 100 software-industrial company. Revenue‎ ‎US$40.534 billion (2017). The company offers a wide product and service portfolios for the building management systems including the building automation systems, software and controls, construction and maintenance services and solutions, commercial combustion controls, and security and fire protection services. In June 2018, Honeywell introduced the Honeywell Vector Space Sense, a software solution which shows when, where, and how building spaces are being used at any given point in time. The software analyzes data from multiple sources across a building for delivering actionable insights which help facility managers in utilizing, optimizing, and prioritizing building spaces.


Johnson Controls
Johnson Controls has been manufacturing electronics, and HVAC equipment for buildings as the primary business since 1885 in Ireland. With employee strength of over 121,000 employees, the company operates in key business units including the Building Efficiency, Power Solutions, Global Work Place Solutions, and Automotive Experience. Johnson Controls annual revenue for 2018 was $31.4B, a 4.07% increase from 2017. Johnson Controls’ Building Automation System, Metasys has been contributing significantly to the continuously growing global next-generation building energy management systems market. According to Technavio, this market is expected to witness a CAGR of over 11% by the end of 2020. The company has been launching building automation systems for commercial buildings. For instance, in November 2017, it launched the BCPro, a smart building automation system providing simple and powerful tools for fast and easy set-up, and a new graphic display with editing, illumination and customization functions, allowing building operations to quickly access and view data.

Schneider Electric
Founded in 1836, Schneider Electric was headquartered in France. Employee strength of over 144,000 employees, Revenue‎: ‎€24.74 billion (2017). The company has been offering various products and services including building automation, switches and sockets, industrial safety systems, home automation, electric power distribution, Smart Grid, critical power & cooling for datacenters. Schneider Electric announced next generation of EcoStruxure Building in April 2018. It is one of the first open innovation platform for buildings with end-to-end IP architecture enabling quick connectivity of IoT devices to improve building value offering. Furthermore, the company has been engaging in strategic partnerships with other companies to ensure high quality products are offered in the market. For instance, in March 2018, Schneider Electric, Danfoss, and Somfy announced a partnership for creating a Connectivity Ecosystem aiming to accelerate adoption of connectivity in residential, mid-size building and hotel markets. Such strategic moves of the company are aiding it to gain a significant position in the top 10 building management system companies in the world.

United Technologies
Headquartered in the US, and founded in 1934, United Technologies has been focusing on researching, developing, and manufacturing products for varied industries including aircraft engines, HVAC, building systems and other industrial products. The company has a dedicated business segment named UTC Climate, Controls & Security segment focusing on offering fire safety, security, building automation systems, HVAC and refrigerating systems and services. Revenue‎ US$59.837 billion (2017) with total number of employees‎: ‎202,797 (2017). Furthermore, to show the global customers about the possibilities and potential in the building technology space, the company opened a state-of-the-art innovation and technology experience center for intelligent buildings in Palm Beach Gardens, Florida. The 224,000 square-foot UTC Center for Intelligent Buildings also meets the highest standards for green design and operations.

Siemens
Siemens is a German conglomerate founded in 1847. The company is involved in offering various products and services including power generation technology, project engineering and construction services, industrial and building automation, water treatment systems, and other automation and control software. The company has been actively involved in the development of building automation systems with its offerings including Desigo, Synco, and GAMMA portfolio of products. Furthermore, Siemens has been also promoting the integration of advanced technologies for meeting the evolving needs of the customers. For instance, the Desigo Control Point is an emerging concept for simplifying the operation and monitoring of HVAC, lighting, and shading in small or medium-sized buildings.

Cisco
Founded in 1984, Cisco has been headquartered in the US. The company specializes in the technology market by offering a wide range of networking hardware, high-technology products and services, and telecommunications equipment. The company offers the Digital Building Solution for making the building smarter through optimized lighting, building automation, and Internet of Things (IoT) technology. For instance, Cisco’s Catalyst Digital Building Series Switches offer smart and highly secure access in a compact and rugged standalone form factor.

Bajaj Electricals
Founded in 1938, Bajaj Electricals is an Indian electrical equipment manufacturing company diversified with product offerings including lighting, luminaires, LPG based generators, fans, appliances, and others. The company’s core business is classified into consumer products, EPC, illumination, and exports. Bajaj Electricals has also been promoting the adoption of smart building offering real-time control from lighting, waste management and HVAC to access, video analytics, and other critical systems. In July 2017, Bajaj Electricals announced embarking on a new journey in digitization by offering Integrated Building Management System (IBMS) to help the customers upgrade to the next level of lighting. With its inception in the building management system market in 2008, Bajaj Electricals has been continuously innovating with its products assortment for retaining its significant position in the top building management companies of the world.

Building Logix
Building Logix has been offering a wide range of building management solutions including access control & video control, building energy management, smart building, system integration and other services. The company has also involved in offering effective building analytics software to help the companies leverage their present infrastructure and produce a better performing environment. Building Logix is further focusing on offering customized building analytics platforms for achieving cost savings and increased efficient-buildings.


Ref: Global Integrated Building Management Systems Industry Report.

Ref: http://www.smartbuildingsmagazine.com/

Friday, November 23, 2018

Difference of Closed and Open Circuit

Difference of Closed and Open Circuit

Hello Engineers, let us come from basics. A system in which the output quantity has no effect upon the input to the control process are called open-loop control systems, and that open-loop systems are just that, open ended non-feedback systems. But the goal of electronic control system is to measure, monitor, and control a process and one way in which we can accurately control the process is by monitoring its output.

We call flow of charge is called current. And in order to create the flow, we need a force. That we are achieving the positive charge and negative charge.


As positive charge and negative charge attract each other we create a circuit and make it flow.

Consider the diagram:

Here in order to glow the bulb, we need current (flow of charge) So we connecting a source, here battery.

Closed circuit.

Once we make the circuit complete +ve charge and -ve charge attracts each other. Thus creating a flow of electrons i.e. current. This complete circuit is called closed circuit.

Open Circuit

If you disconnect any side of the source or anywhere along the line the +ve charge and – charge cannot have any kind of attraction between each other resulting from an absence of flow of electrons. This incomplete circuit is called open circuit.

An electronic control system with one or more feedback paths is called a Closed-loop System. Closed-loop control systems are also called “feedback control systems” are very common in process control and electronic control systems. 

In a closed-loop system, a controller is used to compare the output of a system with the required condition and convert the error into a control action designed to reduce the error and bring the output of the system back to the desired response. Shown Relay work some time closed and open based on signal input in coil side.

Saturday, November 3, 2018

Video Security Dual Responsibility GDPR

Video Security Organizations’ Dual Responsibility Under GDPR

GDPR - the EU General Data Protection Regulation - is now in effect (on May 25th, 2018). The regulations are designed to protect the data privacy of European Union (EU) residents, but because the rules affect  any company handling EU data, the true influence of the GDPR is international in scope.

GDPR affects security technologies like video surveillance systems. Here’s what you need to know to improve your GDPR compliance.
GDPR is a regulation set forth to protect personal data and ensure the privacy of individuals within the European Union (EU), which is deemed to be a fundamental human right. The primary driver behind the regulation is to give individuals greater control over their personal data and how it is used. Despite its roots in the EU, GDPR also addresses the collection or storage of personal data from any EU citizen, as well as the export of data outside the region. Therefore, given the scope of GDPR, compliance is a global concern.

Because cybersecurity was a main driver behind GDPR, one of its mandates is that in the event that a data breach occurs, companies that collect personal data are mandated to report it in to the supervisory authority within 72 hours. Failure to comply with this regulation could result in penalties equaling 4 percent of a company’s global annual revenues or 20 million euros, whichever is greater.

Given the importance of individuals’ privacy and the potential penalties for non-compliance, these are important discussions; however, this focus is not enough for those of us in the security industry, who have a dual responsibility under GDPR. Why is that?

In practical terms of protecting individual privacy, GDPR places much of the responsibility and obligation on businesses and other organizations that deal with personal data. One of the key features of the new regulation is that those who are being monitored need to be fully informed about what data is being held on them and how it is being used.

Under GDPR, this “personal data” is defined very broadly as “any information relating to an identified or identifiable natural person,” referred to as the “data subject.” Naturally, the first types of personal data that come to mind are the classic examples such as name, physical address, phone number and email address, all of which meet the criteria. But these are only starting points, as the range of personal data types is expansive, encompassing more than simply text-based data.

As security professionals, we must recognize the reality that video in which a person can be identified is also considered personal data and is therefore subject to GDPR guidelines and requirements. Therefore, as organizations, we need to determine how best to become compliant with how we handle customer and employee data, including surveillance video. This dual responsibility must come into play when we consider how we design and operate security systems and collect video data through surveillance, including how we store and manage that video data after collection.

To do so, it is important to explore how many of the steps organizations must take to become GDPR compliant are also necessary to ensure that video surveillance data is compliant as well. These steps surveillance operators must take – and how they can be applied to collected video – are outlined below.

Administration
In general, the first step in ensuring GDPR compliance is to choose an administrator and record data processing activities. As an organization seeking to become GDPR compliant, it is essential to have a person on staff – known as a data processing officer – who will ultimately be responsible for data integrity. Each company providing video surveillance must choose an administrator.

In a security environment, choosing this administrator allows for an open way to publicly identify the person who is responsible for data collected from the surveillance systems and provide that detail to anyone who is monitored by video upon their request. In doing so, it is key to also make the name of this data processing officer available to every person who requests data as prescribed under GDPR.

Every organization should also have a procedure in place for when an individual chooses to exercise their right of access to personal data or request its deletion, which allows them to stay within the monthlong window within which GDPR requires them to comply with these requests. When making such a request, it is reasonable to expect an individual to provide adequate information in order to locate this data – for example, an approximate timeframe, and the location where the footage was captured.

Documentation

GDPR also recommends that record of processing activities (ROPA) documentation be maintained and the following information be made available upon request:
  • Category of individuals that processed personal data relates to
  • Purpose for which collected data is used
  • Whether personal data will be transferred (to whom and for what reason)
  • How long personal data will be stored
  • Description of technical and organizational measures to ensure privacy

According to GDPR, administrators should take all appropriate measures to provide this information concerning the processing of their data by surveillance systems to monitored individuals in a brief, transparent, comprehensible and easily accessible manner.


ROPA documentation must also include a risk assessment for individuals’ rights and freedoms and planned measures to address these risks, which include safeguards and mechanisms to ensure the protection of personal data and compliance with GDPR. This should take into account the rights and legitimate interests of individuals and other affected persons.

In a surveillance environment, these items are equally important. Focusing for a moment on purpose and extent of surveillance, it must be clear why and how much video is being collected, and for what reason. One thing to discuss with potential solution providers is the concept of privacy by design and “GDPR-ready” product features. In evaluating solutions, organizations should look for those that will help them more easily become GDPR compliant. An example would be technology supporting defined view of a specific perimeter. By leveraging solutions to define the perimeter, organizations adhere to GDPR in that they can more easily specify the extent of video surveillance.

Data Processing Inventory Assessment (DPIA)
Once an administrator has been chosen and ROPA documentation is complete, a DPIA is required for cases of “extensive systematic monitoring of publicly accessible premises.”


This requires specifying in writing why and for what purposes the camera system is recording. For example, a city needs to manage electrical and water utility stations and must ensure the utilities provide residents with dependable service. Therefore, the perimeter of these utility stations must be protected against crime and theft. Under GDPR, the city can specify that the surveillance is provided for this purpose. Another example would be to ensure the safety of citizens during public events, as surveillance video may be used by the police to provide real-time situational awareness for officers in the field. In this case, it can be specified, in accordance with GDPR guidelines, that video is being collected to support public safety.


This information directly correlates to ROPA documentation, so again we can see the connection between becoming compliant as an organization overall, as well as ensuring compliance for GDPR with information and data collected in a surveillance environment.

Data Security
Cybersecurity has been a major topic within the security industry for some years now. The importance of a surveillance system being cyber secure extends to compliance with GDPR, with tight control of video data being another key recommendation. It is vitally important when specifying a system that these critical measures are taken into account. The less data that is readily accessible to those outside the scope of an organization’s video data management procedures, the less risk there is of becoming non-compliant. The same philosophy applies to data breaches; administrators must report any leaks within 72 hours of notification.


To ensure GDPR compliance, companies should employ strong measures to prevent unauthorized access to the personal data they store, including video. The specific tools and tactics used by each company will be unique to the challenges they face. In all situations, however, companies must employ robust security controls, stay up to date with cybersecurity best practices and ensure they are working with trusted partners that provide secure hardware and software, as well as thorough aftercare. Therefore, organizations must work with security professionals and partners to better understand potential cybersecurity risks and talk about ways they can harden their systems to ensure GDPR compliance.

From a compliance perspective, the processes that must be put in place to ensure the “right to be forgotten” in an organization are very similar to those necessary to ensure a surveillance system is also in compliance. This requires taking a systematic approach to how video data is stored, transferred and deleted. These methodologies will ensure that if an individual requests his or her video footage be deleted, business systems and organizational structure will be in place to adhere to this request in an efficient manner. The concept of “right to be forgotten” is a significant part of the GDPR guidelines, and as we are just months into this new guideline, the impact on organizations and system operators after requests are submitted still remains to be seen.

Data audit
The first step toward cybersecurity risk management knows what data your company is collecting and how it is stored. A comprehensive data audit is fundamental because you’ll need to discover what information your company handles that could create liability under the GDPR. The GDPR is very inclusive in its scope, so a data audit should look at all platforms, device types and departments.

Risk assessment

Once you've done a data audit to establish a clear picture of how your company’s data management works, you’ll be in a position to make a risk assessment:
  • What cyber-threats could your company face?
  • Where are the security weak-points in your technology infrastructure?
  • Do you have effective cybersecurity measures in place?

End-to-End Compliance
It is important to consider the full scope of video surveillance. As a surveillance operator collecting video about living individuals, an organization will fall under the category of data controller and be held responsible for data management in accordance with GDPR. Anyone having access to video data, including subcontractors and hosted service providers, must meet requirements as well. These companies or individuals who have access to recorded video on behalf of an organization, such as hosting providers, fall under the category of data processors. In terms of company compliance, when reviewing contracts to ensure all companies comply in the same way as an organization has planned. In terms of surveillance, be sure to check that any persons or organizations who have access to video are also compliant and that contractual relationships reflect these obligations.

Ultimately, it is the surveillance system user (i.e., data controller) who is responsible for GDPR compliance and safeguarding the rights of individuals whose personal data the user collects and processes. While the data controller has ultimate responsibility to follow GDPR, data privacy is a team effort. Remember: We are all in this together.

Therefore, for users of surveillance equipment, solutions and services, it is important to partner with suppliers that are committed to respecting and safeguarding individuals’ privacy and protecting personal data. Users should also be able to rely on suppliers and vendors for the support and technical assistance necessary to facilitate GDPR compliance.

Due to its intent, the onset of GDPR is a positive one. It will allow data processors and controllers to use data in appropriate ways and have clear guidelines/procedures in place for data collection, management and surveillance. Many companies follow guidelines such as the UN Global Compact when it comes to sustainability and environmental responsibility. The UN Global Compact provides 10 clear principles to help guide companies in their sustainability efforts. GDPR provides similar clear direction to companies looking to protect individual privacy, a fundamental human right.

Information on individuals is a valuable asset and needs to be properly protected. Apart from making good business sense, the reputation and success of your organization can be under threat if personal information isn’t managed appropriately. Organizations can demonstrate effective management of personal information with BS 10012 from BSI.

It helps you:
  • Identify risks to personal information and put controls in place to manage or reduce them
  • Demonstrate compliance with data protection legislation and gain preferred supplier status
  • Gain stakeholder and customer trust that their personal data is protected 
  • Gain a tender advantage and win new business
  • Safeguard your organizations reputation and avoid adverse publicity
  • Protect you and your organization against civil and criminal liability
  • Benchmark your own personal information management practices with recognized best practice.

Basic Principles of the GDPR

Clearly Justified Purpose

All organizations must have a valid lawful basis for collecting and processing personal data
·         
Privacy by Design

The GDPR mandates that privacy must be a priority throughout system design and commissioning. The approach taken with respect to data privacy must be proactive, not reactive. Risks should be anticipated and the objective must be preventing events before they occur.
  
Right to Access

Under Article 15, the GDPR gives individuals control over their personal data including the right to see that data.

Right to be Forgotten

Under Article 17, the GDPR gives individuals control over their personal data including the right to have their personal data erased if it is no longer necessary for the intended purpose of the system.

Security

The GDPR requires organizations have comprehensive policies and procedures ensuring personal data remains within control of the organization at all times. Additionally, personal data breaches must be reported within 72 hours to the competent supervisory authority appointed by their country’s government.

Reference:
  1. https://www.mailguard.com.au/blog/gdpr-security-responsibility
  2. https://www.bsigroup.com/en-IN/
  3. https://edps.europa.eu/sites/edp/files/publication/10-03-17_video-surveillance_guidelines_en.pdf
  4. https://gdpr-info.eu/art-13-gdpr/