Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess Management

In-Car Video Proves Valuable in University Security Operations

How one mid-sized university department is successfully using valued-engineered, in-car video surveillance systems.

By CPT. Dennis Schumaker, Jeff Karpovich CPP, CHPA
In-Car Video 1 July 2018

The value of in-car, two-camera systems in a private university security operation has proven valuable in several ways for High Point University’s Police Department. 

Photo courtesy of High Point University

In-Car Video 2 July 2018

High Point University in High Point, NC, has been using valued-engineered, in-car video systems for five years, and the investment has proven results.

Photo courtesy of High Point University

In-Car Video 1 July 2018
In-Car Video 2 July 2018
July 6, 2018

Police have benefited from in-car video and surveillance for decades, but private security departments rarely utilize this asset. Here’s why: Since most security departments do not perform vehicle stops, in-car video systems are not believed to be of value. Also, cost is a deterrent. Top-of-the line video systems can cost $5,000 or more. And without grant money, that’s out of reach for most university police departments.

But one mid-sized university department has a proven, cost-effective solution. High Point University in High Point, NC, has been using valued-engineered, in-car video systems for five years, and the investment has proven results.

First, we tested several “economy” all-in-one units and settled on a Zetronix zBlackBox-2000HD. It offered many features, including GPS, and at a $200ish price point it appeared to be a good, entry-level solution. However, it became apparent it was not durable/reliable enough, plus it could easily be tampered with, so another system was in order.

We then selected a three-part, 10-8 Video system. At less than $2,000, it offered all the features that our security department needed.

Value Discussion

The value of in-car, two-camera systems in a private university security operation has proven valuable in several ways. Inside the passenger compartment, video and audio recording is “advertised” to promote the system to both officers and to students. For example, seatbelt compliance has increased and incidences of non-compliance like smoking or unsafe driving have decreased. Student unruliness has decreased in university vehicles since the recordings have been used during the adjudication process for decorum violations.

Moreover, the system pays dividends when investigating unreported vehicle damage (which is rare now), investigation of collisions, complaints of unsafe driving and providing evidence of student moving violations. In crashes involving university-owned vehicles, the actions of the operators and vehicles involved are usually readily apparent from the recordings, thus reducing unknown actions, and ultimately the cost of negotiating the liability of the insured vehicles crashes. Complaints of unsafe driving by officers are usually easily corroborated or exonerated by the recordings. Our university fleet insurance premiums were also reduced once the systems were on board.

GPS system software included in many video recorders is useful in showing the speed of a vehicle at a given location, at a given time, along with the video images. Evidence of other operators violations are also obtained by in-car video systems. Impaired driving, speeding and safe movement violations are some of the violations recorded and preserved for external courts or internal adjudication.

A not so readily apparent use of in-car video recording systems is the use of recordings for training. When video and audio recording of the original violation, the officer’s words during a traffic stop and an external transmitter mic system (if equipped), the officer’s exchange with the violator can be used in the initial training of new officers. One-on-one training by viewing recordings of performance with an officer by a supervisor can be done if performance improvement is the goal, and experienced officers can benefit from recordings that illustrate good officer safety practices and positive procedural methods.

One area of a video/audio recording program that must be considered is software configuration, in addition to maintenance of the DVRs and cameras after installation. The software must be configured to meet the department’s individual needs. Default settings from the vendor may not record how and when the department needs them to record. A technician from the vendor, or an in-house technician, trained by the vendor, would need to create the original software configuration using the default settings, and then duplicate it in each vehicle. Also, the units must be checked regularly by a trained technician to ensure that the cameras and DVRs are working as configured.

Summary

Low-cost, in-car video recording systems, when integrated with, or paired with body worn cameras, can provide a near-seamless record of an incident. The security use has proved so effective that in-car video has added to our entire transportation fleet. Documentation of employee and student compliance of university policies, evidence gathering of violations and training are areas of value to be considered when contemplating purchasing an in-vehicle video system. In addition, vendor support before and after the purchase, is a key factor that should be considered.


KEYWORDS: security technology security video University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Captain Dennis Schumaker is a Manager of Field Operations at High Point University. He has served for eight years as an officer, supervisor and manager.

Jeff Karpovich, CPP, CHPA, is the Chief/Director of Security & Transportation (Safety, EM & Parking) for High Point University. He is also the ASIS International 4B Region Vice President and a member of both the ASIS Law Enforcement Liaison Council where he serves as Chair of the School Security Committee and the ASIS School Safety & Security Council where he serves as the Professional Certification Boards (PCB) Liaison.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • storm-enews

    Surge Protection Planning Proves Essential in Security System Design

    See More
  • Commuter Train Security Proves Costly and Neglected – Case in Point, D.C. Metro

    See More
  • cloud-cyber

    The Shift in Security Operations in a Multi-Cloud World

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing