Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess Management

In-Car Video Proves Valuable in University Security Operations

How one mid-sized university department is successfully using valued-engineered, in-car video surveillance systems.

By CPT. Dennis Schumaker, Jeff Karpovich CPP, CHPA
In-Car Video 1 July 2018

The value of in-car, two-camera systems in a private university security operation has proven valuable in several ways for High Point University’s Police Department. 

Photo courtesy of High Point University

In-Car Video 2 July 2018

High Point University in High Point, NC, has been using valued-engineered, in-car video systems for five years, and the investment has proven results.

Photo courtesy of High Point University

In-Car Video 1 July 2018
In-Car Video 2 July 2018
July 6, 2018

Police have benefited from in-car video and surveillance for decades, but private security departments rarely utilize this asset. Here’s why: Since most security departments do not perform vehicle stops, in-car video systems are not believed to be of value. Also, cost is a deterrent. Top-of-the line video systems can cost $5,000 or more. And without grant money, that’s out of reach for most university police departments.

But one mid-sized university department has a proven, cost-effective solution. High Point University in High Point, NC, has been using valued-engineered, in-car video systems for five years, and the investment has proven results.

First, we tested several “economy” all-in-one units and settled on a Zetronix zBlackBox-2000HD. It offered many features, including GPS, and at a $200ish price point it appeared to be a good, entry-level solution. However, it became apparent it was not durable/reliable enough, plus it could easily be tampered with, so another system was in order.

We then selected a three-part, 10-8 Video system. At less than $2,000, it offered all the features that our security department needed.

Value Discussion

The value of in-car, two-camera systems in a private university security operation has proven valuable in several ways. Inside the passenger compartment, video and audio recording is “advertised” to promote the system to both officers and to students. For example, seatbelt compliance has increased and incidences of non-compliance like smoking or unsafe driving have decreased. Student unruliness has decreased in university vehicles since the recordings have been used during the adjudication process for decorum violations.

Moreover, the system pays dividends when investigating unreported vehicle damage (which is rare now), investigation of collisions, complaints of unsafe driving and providing evidence of student moving violations. In crashes involving university-owned vehicles, the actions of the operators and vehicles involved are usually readily apparent from the recordings, thus reducing unknown actions, and ultimately the cost of negotiating the liability of the insured vehicles crashes. Complaints of unsafe driving by officers are usually easily corroborated or exonerated by the recordings. Our university fleet insurance premiums were also reduced once the systems were on board.

GPS system software included in many video recorders is useful in showing the speed of a vehicle at a given location, at a given time, along with the video images. Evidence of other operators violations are also obtained by in-car video systems. Impaired driving, speeding and safe movement violations are some of the violations recorded and preserved for external courts or internal adjudication.

A not so readily apparent use of in-car video recording systems is the use of recordings for training. When video and audio recording of the original violation, the officer’s words during a traffic stop and an external transmitter mic system (if equipped), the officer’s exchange with the violator can be used in the initial training of new officers. One-on-one training by viewing recordings of performance with an officer by a supervisor can be done if performance improvement is the goal, and experienced officers can benefit from recordings that illustrate good officer safety practices and positive procedural methods.

One area of a video/audio recording program that must be considered is software configuration, in addition to maintenance of the DVRs and cameras after installation. The software must be configured to meet the department’s individual needs. Default settings from the vendor may not record how and when the department needs them to record. A technician from the vendor, or an in-house technician, trained by the vendor, would need to create the original software configuration using the default settings, and then duplicate it in each vehicle. Also, the units must be checked regularly by a trained technician to ensure that the cameras and DVRs are working as configured.

Summary

Low-cost, in-car video recording systems, when integrated with, or paired with body worn cameras, can provide a near-seamless record of an incident. The security use has proved so effective that in-car video has added to our entire transportation fleet. Documentation of employee and student compliance of university policies, evidence gathering of violations and training are areas of value to be considered when contemplating purchasing an in-vehicle video system. In addition, vendor support before and after the purchase, is a key factor that should be considered.


KEYWORDS: security technology security video University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Captain Dennis Schumaker is a Manager of Field Operations at High Point University. He has served for eight years as an officer, supervisor and manager.

Jeff Karpovich, CPP, CHPA, is the Chief/Director of Security & Transportation (Safety, EM & Parking) for High Point University. He is also the ASIS International 4B Region Vice President and a member of both the ASIS Law Enforcement Liaison Council where he serves as Chair of the School Security Committee and the ASIS School Safety & Security Council where he serves as the Professional Certification Boards (PCB) Liaison.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • storm-enews

    Surge Protection Planning Proves Essential in Security System Design

    See More
  • Commuter Train Security Proves Costly and Neglected – Case in Point, D.C. Metro

    See More
  • cloud-cyber

    The Shift in Security Operations in a Multi-Cloud World

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing