Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Take It Offsite

August 1, 2004
Images captured by cameras at a facility move to offsite storage but can be viewed in real-time or retrieved from anywhere.
Offsite video transmission and archival creates a permanent, indisputable visual record of events that can stand up in court. If surveillance images are worth capturing, they are worth preserving. As VCR, digital video recording and network video recording images figure more prominently in the legal endeavors of many companies, such technology has continued to implement new means of ensuring that security video be able to provide a most inscrutable form of evidence.

Keeping up with advances

For every attorney’s attack on video, the industry has managed to develop technology and practices to protect the credibility of their product as evidence. When courts charged that video images couldn’t provide a positive identification, camera manufacturers developed better resolution images. When lawyers pointed out that there was no way to be sure when such video was taken, the industry added time stamps. And as security moves toward digital recording, with all of its advantages, a technology that is all too subject to tampering, security firms have begun to develop legally secure means of storing video images to erase any doubt that the clearly identifiable culprit who broke in at a time-stamped 3:05 a.m. performed the act exactly as shown.

That’s the underlying philosophy behind video surveillance security storage concepts from such firms as New York’s VideoSave Inc. From a trial lawyer’s standpoint, basement VCR and DVR image storage is susceptible to tampering or sabotage; and in any event, its provenance is susceptible to legal challenges. To withstand the pressures of a litigious society, that company, among others, developed a secure system of offsite image archival for long-term storage of video surveillance.

Multi-year archival covers all federal statutes of limitation and represents a great value for companies in thwarting bogus lawsuits and providing evidence for prosecutions. Every video frame is date-and-time-stamped to create legal chain of custody, facilitating the selection of viewing sequences. Offsite archival, with video asset management by IT professionals, establishes ironclad third party provenance.

The offsite archival process effectively rescues video surveillance images from the legal limbo of basement VCRs and DVRs. Surveillance data can be transmitted directly to a secure, offsite video vault. Once safely archived, all surveillance assets come under the management of the IT professionals whose sole responsibility is preserving and managing their clients’ video assets.

Camera images are fed to a local server, which dates and time stamps individual frames, encrypts and compresses the data, and transmits all images via the Internet to the archival site’s central video vault. This establishes an unambiguous legal chain-of-custody. Frame identification also facilitates image selection for client viewing; clients can view surveillance sequences pinpointed to the second in multi-year storage spans. The password-protected images may be viewed anytime over the Internet by those granted access.

The key to establishing a legal veracity to the captured video is that the entire process of data creation, date/time stamping, encrypting, compressing, transmitting, decrypting and archiving, remain within a closed system, leaving no loopholes for data manipulation or tampering. So long as images never leave the video vault; clients can view the data but can’t touch it. If subpoenaed, the archival company provides CD copies of requisite video sequences with provenance and data integrity intact.

Offsite security video storage is protected and storage staff can work smoothly with law enforcement and justice personnel.

Benefits to offsite storage

Aside from creating ironclad security, freeing video surveillance images from the limitations of VCR and DVR storage has a few additional benefits, particularly in cost-savings – by spreading equipment cost for storage servers over a large client base, collecting the same data costs considerably less for an archival company. In addition, the advanced hard drives and optimal storage conditions inherent in the offsite system can store images in perpetuity without the image degrading or becoming lost to physical damage.

Surveillance endeavors have long been subject to a basic image-capturing weakness since the birth of the security camera, namely, the destruction of equipment. Direct image transmission from concealed cameras to the offsite video vault can obviate the problem of vandalism and preserve the surveillance data. This is also true for construction and other unstable sites, where the volatile nature of the site threatens the integrity of complex video storage hardware. On a wider scale, by transferring images offsite immediately, the cameras can be put into dangerous situations without compromising the safety of the images it captures – quite a useful tool in diagnosing origins of a building fire or terrorist attacks, as well as preserving a records generated by (unsuccessful) police bomb diffusing robots.

As with most new technologies, with the ability to automatically capture and store large volumes of high resolution video in perpetuity comes great responsibility. The same motion-sensing camera that can disprove a frivolous injury suit can become a liability to the company if the accident was not so frivolous. While captured video is proprietary to each client, the stored images can be subpoenaed by either side in court.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Outsourcing Data: Don't Take a Fairytale Approach

    Outsourcing Data: Don't Take a Fairytale Approach

    See More
  • small business SMB security

    It’s time for SMBs to protect against ransomware

    See More
  • outsourcing-freepik1170.jpg

    What businesses look for when outsourcing IT

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing