百叶窗图片载入中

Information Center
Hot Product
Customer Service
Customer Service

SHENZHEN LONDEN INFORMATION ENGINEERING CO.,LTD.

Address:  401, Building 2, Lihe Industrial Park, Nanshan District, Shenzhen City
Code: 518000
Tel  +86  
755 83002652
Fax +86 755 83754062
E-MAIL : 
shary.sales@gmail.com

 

Xiang Peng bathroom, rest assured that choice
Your location:Your location:Home>>FAQ

Can't they can be in accordance with the "camera" will have

Release date:2015-04-17 15:40:46

With the wide application of video monitoring technology in the social management, monitors, camera has entered into every corner of our work life. "Who's privacy was peeping?" The call for this kind of question is higher and higher. Reporter learned that, changzhou in the province's first "changzhou city public security video image information system management method" (hereinafter referred to as the "method"), the government regulatory documents to "monitor who will pipe construction? Where shall be built? How monitoring information? Problems make the specification.

 

A way to manage a camera

 

Now we live in a space, roads, location, area, elevator, corridor... Countless cameras formed a super net, let people no room in the monitor. In recent years, because of the video monitoring information management and cause personal privacy leak increase rapidly. How video monitoring facilities built? Can be built in what place? How to save the information? How to check? How does it work? These are big data era resolve public security and the citizen privacy conflict focus problem to be solved.

 

According to introducing, "changzhou city public security video image information system management method" on November 14th by changzhou government executive meeting and through the review, and will be on January 1, 2015 formally implemented. The "method" is the first in the whole province.

 

The reporter understands, "method" has been clear about the construction of public security video image information system of 12 sites and areas, in addition to involving national security and other key areas, key parts, city road, the center of the town important roads, parking lots, places of public entertainment, places of Internet access services, shops, parks, large square, public transportation and other places of public areas and also incorporated into the scope of mandatory installation of video monitoring system. Prohibited in the hotel guest room, workers, students, such as dormitory, public bathroom, changing room, bathroom and other places of relating to the citizens' personal privacy and area to install video monitoring equipment.

 

Check the video to the approval of the public security

 

In the past, we often see people on the Internet released video posts "flesh" to find the thief. In the future, citizens for video information from the public, will also be restrictions or limitations, under the public security organ to consult.

 

Clearly in the "method", a video image is the use of information systems unit shall establish a monitor on duty, operation maintenance, security, information such as data storage management, data obtaining registration system; Ban has nothing to do with the monitor the working personnel enter monitor the premises without authorization.

 

Public security organs, state security organs due to the need of law enforcement, by the public security organ at or above the county level or a state security organ documents, access, copy, or video image information system of information to be obtained. And involved in the case of the interested party to consult, copy or video image information system of information to be obtained, shall be subject to the local public security organ at or above the county level video image information system or apply to the judicial organ. And, looking up and duplicating or video image information system of information to be obtained, workers are no less than two people. Can't they can be in accordance with the "camera" will have

 


Article Keywords:
Previous:The wisdom of the big data environment o.. Next:No next
Network Security