cctv access control integration



Why should I video-enable my security system?

The benefits of combining video with access control and intruder detection include:

  • Labour costs reduction – remotely manage distributed sites and properties from a central command and control centre.
  • Operational efficiency – operators can manage video surveillance, access control and intruder detection from any workstation.
  • Real-time management of alarms and incidents – visually verify reported events as they are reported including: doors left or propped or forced open, access denied and intruder detected.
  • Post-incident investigations – click on the alarm or access event report to view the related video streams.

borer cctv access control security system

Three ways to MANAGE your security system:

Proactive – with a dedicated team of 24x7 security personnel whose role it is to monitor activity recorded by the cameras and displayed on a wall of monitors. This is normally only viable for large organisations who have the available manpower resources.

Reactive – following a security breach, play back the video footage captured by the Digital Video Recorders looking for and analysing the captured events. This can time consuming as it will require someone to spend a lot of time reviewing the recorded video footage.

Response driven – using the intelligence in the camera, access control and intruder systems, all working together in real time, to highlight and report security irregularities and infringements. Alarms would be reported to the relevant authority who would use the camera surveillance system to determine the level of response required. This is a balanced approach, logging incidents and managing the response in real time while minimising labour.

Three ways to MONITOR your security system:

Workstation Client
  • day to day monitoring in real-time
  • powerful and easy-to-use
  • includes functions such as live view and play-back
  • enables tagging of video clips for easy search, storage and viewing by authorised personnel
  • flexible alarm management interface allows operators to quickly identify and respond to alarm events
  • supports both incoming and outgoing audio using speakers and microphones connected to cameras to communicate with people at the remote camera location, as well as replay recorded video and audio
Web Client

The Internet-based Web Client enables the system to be remotely managed and reconfigured by adding devices and reconfiguring camera recording schedules, user rights, and event and alarm rules. Cameras can also be accessed using live view and playback.

Mobile Client

The Mobile Client for tablets and mobiles phones supports Wi-Fi, 3G, and 4G connectivity to delivers surveillance on the move, anywhere, anytime.

CCTV and Data Protection

Businesses must have identified and documented the potential impact on individuals’ privacy and taken this into account when installing operating a CCTV system, and regularly review whether CCTV continues to be the best security solution.

CCTV Code of Practice

12 Guiding Principles organisations should comply with when employing a CCTV surveillance system.

  1. Use of a surveillance camera system must always be for a specified purpose which is in pursuit of a legitimate aim and necessary to meet an identified pressing need.
  2. The use of a surveillance camera system must take into account its effect on individuals and their privacy, with regular reviews to ensure its use remains justified.
  3. There must be as much transparency in the use of a surveillance camera system as possible, including a published contact point for access to information and complaints.
  4. There must be clear responsibility and accountability for all surveillance camera system activities including images and information collected, held and used.
  5. Clear rules, policies and procedures must be in place before a surveillance camera system is used, and these must be communicated to all who need to comply with them.
  6. No more images and information should be stored than that which is strictly required for the stated purpose of a surveillance camera system, and such images and information should be deleted once their purposes have been discharged.
  7. Access to retained images and information should be restricted and there must be clearly defined rules on who can gain access and for what purpose such access is granted; the disclosure of images and information should only take place when it is necessary for such a purpose or for law enforcement purposes.
  8. Surveillance camera system operators should consider any approved operational, technical and competency standards relevant to a system and its purpose and work to meet and maintain those standards.
  9. Surveillance camera system images and information should be subject to appropriate security measures to safeguard against unauthorised access and use.
  10. There should be effective review and audit mechanisms to ensure legal requirements, policies and standards are complied with in practice, and regular reports should be published.
  11. When the use of a surveillance camera system is in pursuit of a legitimate aim, and there is a pressing need for its use, it should then be used in the most effective way to support public safety and law enforcement with the aim of processing images and information of evidential values.
  12. Any information used to support a surveillance camera system which compares against a reference database for matching purposes should be accurate and kept up to date.