The Complete Manual on CCTV Management

Issue 2 2022 Editor's Choice, Surveillance, Security Services & Risk Management

Hi-Tech Security Solutions readers are exposed to many elements of the surveillance industry in the magazine and online, as well as in the various conferences and webinars we hold. The topics presented mainly focus on technology and its advances and capabilities, as well as insights into specific areas of expertise, such as control room staffing and efficiency in our regular columns from Dr Craig Donald.

What is sometimes missing is the link between technology, detection and apprehension of suspects and the process to use surveillance footage as evidence that will be accepted in court and contribute to convicting criminals, or be accepted as evidence in disciplinary hearings.


Sonja de Klerk.

Sonja de Klerk, recently retired Brigadier from the SAPS Forensic Science Laboratory, and someone who has spoken at a few iLegal conferences over the years, has written a book on the subject, aptly subtitled the ‘A – Z guide from the control room to court’, which is currently available as an e-book. De Klerk was the section head of Scientific Analysis, one of the six sections at the Forensic Science Laboratory. She was attached to the SAPS Forensic Science Laboratory for more than 27 years.

The book’s title is ‘The Complete Manual on CCTV Management’. It avoids any discussion on technology selection and implementation and focuses on the process of managing your installation effectively and collecting evidence for criminal proceedings (or disciplinary procedures). Importantly, De Klerk also covers the process in the courtroom, advising readers on what to expect and how to behave.

To quote De Klerk, “This manual was drafted to address specific shortcomings in successfully using CCTV material in criminal cases and disciplinary procedures. To secure the integrity of CCTV material, the information in this manual must be used as guidelines and minimum required criteria.”

Supporting records and paper trails

We often believe that simply showing a video of some action or crime is enough to fulfil the needs of evidence. After all, if you can see the person clearly, what more could you need?

When it comes to dealing with defence attorneys in a court, you may need a lot more. De Klerk explains that to be able to defend their client, the defence will often want to see the trail, or chain of evidence, which includes a paper trail. You could be required to show the full investigation, the process of gathering evidence, the documentation of the systems you use as well as your standard operating procedures (SOPs) your security operation adheres to.

It is advisable, says De Klerk, to run a test to ensure your security operation can produce all the paperwork and records the defence may request. This, of course, also means your event management processes and procedures must be up to cross examination.

Know your system

De Klerk adds that familiarity with your surveillance system is also imperative, explaining the ‘BAD SOC’ process which stands for:

• Backup capacity.

• Archiving process and frequency.

• Downloading procedure.

• Software.

• Overwrite frequency.

• Colour/black-and-white system.

She goes into more detail on each of these. At the end of most chapters, De Klerk also offers some key questions to help the reader ensure they understand the contents and are able to apply them effectively to their particular situation.

The book also covers issues such as synchronising the time across your system, marking your cameras, system manuals, who has access to their systems and more.

Incident management is also covered and readers are advised to implement a standardised approach to handling incidents, with special emphasis on what to do in terms of collecting evidence. Video footage should be collected on CD-R or DVD-R media only (to ensure there is no tampering) and only saved on new media, not reusable discs.

An authorised person must save a master copy of the evidence in a secure location with access control. All access and the reason for it must be recorded. The master copy must be labelled as such and other copies are to be labelled as ‘working copies’. The serial numbers on the media must also be accurately recorded.

De Klerk also touches on making sure that the video footage captured is able to identify a person – the court relies on visual identification, not the latest facial recognition technology. The face or vehicle must clearly fill at least 50% of the monitor, which should give pause to those who opt for low resolution, cheap cameras, or those who install cameras high above face level.

Securing the master copy (the original data) is critical for court cases. De Klerk quotes a case where it was stated: “... it is impossible to detect manipulation in the absence of the original data…”.

She devotes the ninth chapter to appearing in court, touching on what to expect, what not to do and other important issues those not accustomed to court appearances will find useful. Even issues such as how to answer questions and to whom the answer should be addressed are covered.

Other areas covered include traceability of records as well as what records could be requested as part of the paper trail. De Klerk also touches on training and recruitment to provide a complete review of what managing your surveillance system will encompass.

Readers interesting in obtaining the book are invited to contact Sonja de Klerk at sonsdeklerk@gmail.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.