Reference Hub18
Video Surveillance: Privacy Issues and Legal Compliance

Video Surveillance: Privacy Issues and Legal Compliance

Qasim Mahmood Rajpoot, Christian Damsgaard Jensen
ISBN13: 9781466685024|ISBN10: 1466685026|EISBN13: 9781466685031
DOI: 10.4018/978-1-4666-8502-4.ch004
Cite Chapter Cite Chapter

MLA

Rajpoot, Qasim Mahmood, and Christian Damsgaard Jensen. "Video Surveillance: Privacy Issues and Legal Compliance." Promoting Social Change and Democracy through Information Technology, edited by Vikas Kumar and Jakob Svensson, IGI Global, 2015, pp. 69-92. https://doi.org/10.4018/978-1-4666-8502-4.ch004

APA

Rajpoot, Q. M. & Jensen, C. D. (2015). Video Surveillance: Privacy Issues and Legal Compliance. In V. Kumar & J. Svensson (Eds.), Promoting Social Change and Democracy through Information Technology (pp. 69-92). IGI Global. https://doi.org/10.4018/978-1-4666-8502-4.ch004

Chicago

Rajpoot, Qasim Mahmood, and Christian Damsgaard Jensen. "Video Surveillance: Privacy Issues and Legal Compliance." In Promoting Social Change and Democracy through Information Technology, edited by Vikas Kumar and Jakob Svensson, 69-92. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8502-4.ch004

Export Reference

Mendeley
Favorite

Abstract

Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.