{"id":1520,"date":"2019-11-20T16:17:46","date_gmt":"2019-11-20T16:17:46","guid":{"rendered":"https:\/\/www.securityinshredding.com\/blog\/?p=1520"},"modified":"2019-11-20T16:17:48","modified_gmt":"2019-11-20T16:17:48","slug":"cctv-gdpr-data-destruction-services","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/cctv-gdpr-data-destruction-services\/","title":{"rendered":"CCTV &#038; GDPR"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"608\" height=\"461\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/CCTV-GDPR.png\" alt=\"CCTV data destruction services\" class=\"wp-image-1521\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/CCTV-GDPR.png 608w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/CCTV-GDPR-300x227.png 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/CCTV-GDPR-396x300.png 396w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/figure>\n\n\n\n<p>When we think of GDPR data protection, most of us have a\ntendency to consider organisations retaining specifics, such as our name, date\nof birth, address, financial details etc. But there is a manner of attaining\ndata that is so prevalent we scarcely notice it anymore \u2013 CCTV. <\/p>\n\n\n\n<p>If your company makes use of CCTV, you must know that the\nimages compiled are categorised as personal data and subject to GDPR data\nprotection regulations. In order to be GDPR compliant you need to have a clear policy\nstating the reasoning behind it, security, risk of theft etc. People need to be\naware they are being recorded on CCTV so it is necessary to place signs in\nareas that are observed with CCTV. <\/p>\n\n\n\n<p>Your policy should also include how long you intend to keep the footage for which is generally accepted as 30 days. If you need to keep it longer your policy will need to include why it is necessary for it to be kept this long. <a rel=\"noreferrer noopener\" aria-label=\"Here (opens in a new tab)\" href=\"https:\/\/ico.org.uk\/media\/1542\/cctv-code-of-practice.pdf\" target=\"_blank\">Here<\/a> you can find detailed information on the code of practice for CCTV.<\/p>\n\n\n\n<p>Eventually it will be necessary to delete old footage, your system will most likely have a setting that will auto delete over a number of days depending on what you set it to. However, if you decide to upgrade your entire system your hard drives will need to be destroyed as data can be recoverable long after it is deleted and removed from your system. This can be detrimental to your compliance with GDPR. I would recommend the use of data destruction services<em>.<\/em> Here at \u2018Security in Shredding\u2019 items received for destroying data are logged on our asset tracking software; our clients receive a comprehensive report during the invoicing stage in order for complete traceability. This will allow you peace of mind and keep your business at the highest standard of security and compliance. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we think of GDPR data protection, most of us have a tendency to consider organisations retaining specifics, such as our name, date of birth, address, financial details etc. But there is a manner of attaining data that is so &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/cctv-gdpr-data-destruction-services\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[121,7,8,5],"tags":[],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1520"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=1520"}],"version-history":[{"count":3,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1520\/revisions"}],"predecessor-version":[{"id":1524,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1520\/revisions\/1524"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=1520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=1520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=1520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}