Public Transportation Surveillance Systems and Crime Deterrence

Public Transportation Surveillance Systems and Crime Deterrence

Institutions are required by law to cater to the safety of individuals and their belongings, so long as the individuals or property fall within the scope of the services the institutions provide. Since the invention of the digital world, one tool which has grown to be most useful to help achieve security is video surveillance.

Functional video surveillance systems capture sensory information about activities and events in a defined area over a given time. Video surveillance is primarily used to detect and assist in the investigation of criminal activity; however, it also doubles up as a deterrent when used appropriately.

It’s true that video surveillance can help to reduce crime and violence against people and assets. However, the flip side is that it may also introduce risks to the privacy of people whose personal information may be unwillingly collected, used, and disclosed following the technology.

Risk of privacy breach exists because video surveillance often captures the information of law abiding passers-by, going about their daily duties. In view of the wide scope of personal data collected, utmost care must be taken when considering the use of this innovative technology.

Video surveillance is available in a number of forms and can be combined with other technologies to get the very best of its capabilities. For instance, video surveillance can be either covert or overt, depending on whether its use is hidden or open to the masses likely to be affected. It can also be fixed or mobile, depending on the range of movement available to it through the type of technology used. Examples of mobile video surveillance can range from body worn cameras to drones. Sometimes, video surveillance is combined with video analytics to increase the quality of imaging and identity of individuals, their patterns of behavior, and objects recorded by it. Facial recognition and automated license plate recognition software are good examples of such combinations.

In as much as video surveillance is available in different forms and capabilities, there are certain guidelines that apply if they have to be used, especially in public places like in transportation areas like train stations, streets, etc. Usually, these guidelines don’t apply to covert surveillance where they are used as a case specific investigation tool for law enforcement purposes. In such a case, there would be some statutory authority with a search warrant to conduct the surveillance. Such guidelines are also not supposed to apply to workplace surveillance systems installed by an institution to monitor surveillance of employees.

Requirements of Video Surveillance

There are rules set out (depending on your region) to guard the collection, use, and release of personal data by institutions. Application of these rules to video monitoring programs can only raise specific issues.

Every institution will need to consider these issues and the requirements that stem from them when making the decision on whether and how to use video surveillance.

Scope of guidelines

For example, in Ontario, FIPPA and MFIPPA set out rules for the collection, use, and disclosure of personal data by institutions and in public places. The application of these rules to video monitoring programs raises specific issues. Institutions need to consider the following issues and the requirements that stem from them before using video surveillance.

  • Personal information: The first issue to have in mind when considering the use of video surveillance is to determine whether the system will involve the collection, use, or disclosure of personal data. There are rules which institutions need to comply with as governed by the law. If you are to use video surveillance to collect, use, or disclose personal information, you must comply with the given rules set out in the area.
  • Lawful collection: Having determined that your video surveillance system involves the collection of personal data, the next step is to determine whether you have the legal rights to do so. When determining whether the collection of personal information is “necessary,” it is crucial to consider the needs of the collection from the following aspects:
    • method of collection of personal data;
    • the sensitivity of the personal data;
    • amount of personal information to be collected

A privacy-invasive aspect of video monitoring is that it frequently collects the personal information of innocent individuals going about their everyday tasks. To eliminate this invasive aspect of video surveillance, video redaction has been found to be very useful in the procedure.

Imagine this scenario, Somebody slips and falls on a staircase in a subway station before several bystanders, the accident is obviously recorded by the transit authority’s video surveillance system. Suppose the individual makes an access request for information relating to that accident, fulfilling his request can involve a record that contains the personal data of the other bystanders too. That is why it may be necessary to protect the privacy of the innocent bystander by obscuring their personal data before the record is forwarded to the requester.

The sensitivity of Personal Information

When it comes to video surveillance, the sensitivity of the personal information collected will determine whether the pros of video surveillance, discussed above, will significantly outweigh the reduction of privacy inherent in its use. Loss of privacy is related to the sensitivity of the personal information which is involved. Hence, the more the sensitivity of the personal data is collected, the more the benefits of video surveillance should be so as to outweigh the reduction in privacy significantly.

Data redaction involves limiting the amount of personal data collected and retained so that only that which is necessary to meet the purposes of the lawfully authorized investigation.

When considering limiting the amount of personal data collected, it is crucial to consider making some adjustments when installing and operating the video surveillance equipment:

  • Recording equipment, e.g., video cameras, audio recorders, and any other devices, should be installed only in places that are directly related to the problem that video surveillance hopes to reduce.
  • Additional sensory information, e.g., sound, should not be recorded or made submitted to operators unless it is directly related to the problem at hand.
  • Reception equipment should be installed and set up in a way that it monitors only those spaces that have been realized to be requiring video surveillance. For instance, cameras should not be installed directly to look through the windows of nearby buildings or onto the nearby property, or else those areas video redaction should be done on the recordings.
  • If the capabilities of the reception equipment can be adjusted by operators, these capabilities have been restricted, to the extent possible, so that people cannot tamper with the equipment, to collect information about spaces that are not needed by the video monitoring program.

In addition, you may wish to consider restricting video surveillance to time stamps when there is a demonstrably higher chance of the presence of the problem at hand in the area under surveillance.

For Instance, A video camera that monitors a car park indirectly captures information about nearby properties. To control the amount of personal data collected by it, the camera is set up to automatically avoid or redact any area or property adjacent to the car park.

Besides, since video surveillance is likely to collect the personal data of law-abiding individuals going about their everyday duties, in the end, a large fraction of the footage collected is not going to be used. To protect this unused footage from misuse, that is where video redaction is important. Here’s how video redaction works:

  • Unused recorded information is routinely erased according to a standard schedule. In the standard schedule, the retention period for unused information is only limited to the amount of time deemed necessary to discover or report an incident that occurred during the surveillance.
  • It ensures that the amount of personal data collected through video surveillance is limited to that which is deemed necessary by adjusting the number of cameras and the installation and operation of the surveillance equipment accordingly.
  • When erasing or deleting recorded information (used or unused), it is crucial that the data and old storage devices are discarded in such a way that the personal data cannot be retrieved.
  • Disposal methods include overwriting electronic records, burning, shredding, or magnetically erasing personal information.

Conclusion

It’s true that institutions and transportation systems alike are increasingly investing in video surveillance in an attempt to curb crime and violence. It has arguably worked in most cases; however, its flip side also exists in the form of privacy of individuals being tampered with whenever the personal information is collected, used, and disclosed unwillingly.

If only the program associated with the use of video surveillance is implemented in such a way that privacy is protected as described in the guidelines above, then the risks may be sufficiently reduced to fulfill the safety obligations both at the public places, transport systems, and even at the institutions.

In the end, the feeling of being watched by the continuous “gaze” of video surveillance may also have a negative effect on law-abiding individuals when they notice fellow innocent civilians being victims of circumstance. When weighing between the benefits of video surveillance against privacy breach, institutions should keep such dire effects of video surveillance in mind. A good video redaction software will always do away with such worries.