The Complete Manual on CCTV Management

Issue 2 2022 Editor's Choice, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management

Hi-Tech Security Solutions readers are exposed to many elements of the surveillance industry in the magazine and online, as well as in the various conferences and webinars we hold. The topics presented mainly focus on technology and its advances and capabilities, as well as insights into specific areas of expertise, such as control room staffing and efficiency in our regular columns from Dr Craig Donald.

What is sometimes missing is the link between technology, detection and apprehension of suspects and the process to use surveillance footage as evidence that will be accepted in court and contribute to convicting criminals, or be accepted as evidence in disciplinary hearings.

Sonja de Klerk.

Sonja de Klerk, recently retired Brigadier from the SAPS Forensic Science Laboratory, and someone who has spoken at a few iLegal conferences over the years, has written a book on the subject, aptly subtitled the ‘A – Z guide from the control room to court’, which is currently available as an e-book. De Klerk was the section head of Scientific Analysis, one of the six sections at the Forensic Science Laboratory. She was attached to the SAPS Forensic Science Laboratory for more than 27 years.

The book’s title is ‘The Complete Manual on CCTV Management’. It avoids any discussion on technology selection and implementation and focuses on the process of managing your installation effectively and collecting evidence for criminal proceedings (or disciplinary procedures). Importantly, De Klerk also covers the process in the courtroom, advising readers on what to expect and how to behave.

To quote De Klerk, “This manual was drafted to address specific shortcomings in successfully using CCTV material in criminal cases and disciplinary procedures. To secure the integrity of CCTV material, the information in this manual must be used as guidelines and minimum required criteria.”

Supporting records and paper trails

We often believe that simply showing a video of some action or crime is enough to fulfil the needs of evidence. After all, if you can see the person clearly, what more could you need?

When it comes to dealing with defence attorneys in a court, you may need a lot more. De Klerk explains that to be able to defend their client, the defence will often want to see the trail, or chain of evidence, which includes a paper trail. You could be required to show the full investigation, the process of gathering evidence, the documentation of the systems you use as well as your standard operating procedures (SOPs) your security operation adheres to.

It is advisable, says De Klerk, to run a test to ensure your security operation can produce all the paperwork and records the defence may request. This, of course, also means your event management processes and procedures must be up to cross examination.

Know your system

De Klerk adds that familiarity with your surveillance system is also imperative, explaining the ‘BAD SOC’ process which stands for:

• Backup capacity.

• Archiving process and frequency.

• Downloading procedure.

• Software.

• Overwrite frequency.

• Colour/black-and-white system.

She goes into more detail on each of these. At the end of most chapters, De Klerk also offers some key questions to help the reader ensure they understand the contents and are able to apply them effectively to their particular situation.

The book also covers issues such as synchronising the time across your system, marking your cameras, system manuals, who has access to their systems and more.

Incident management is also covered and readers are advised to implement a standardised approach to handling incidents, with special emphasis on what to do in terms of collecting evidence. Video footage should be collected on CD-R or DVD-R media only (to ensure there is no tampering) and only saved on new media, not reusable discs.

An authorised person must save a master copy of the evidence in a secure location with access control. All access and the reason for it must be recorded. The master copy must be labelled as such and other copies are to be labelled as ‘working copies’. The serial numbers on the media must also be accurately recorded.

De Klerk also touches on making sure that the video footage captured is able to identify a person – the court relies on visual identification, not the latest facial recognition technology. The face or vehicle must clearly fill at least 50% of the monitor, which should give pause to those who opt for low resolution, cheap cameras, or those who install cameras high above face level.

Securing the master copy (the original data) is critical for court cases. De Klerk quotes a case where it was stated: “... it is impossible to detect manipulation in the absence of the original data…”.

She devotes the ninth chapter to appearing in court, touching on what to expect, what not to do and other important issues those not accustomed to court appearances will find useful. Even issues such as how to answer questions and to whom the answer should be addressed are covered.

Other areas covered include traceability of records as well as what records could be requested as part of the paper trail. De Klerk also touches on training and recruitment to provide a complete review of what managing your surveillance system will encompass.

Readers interesting in obtaining the book are invited to contact Sonja de Klerk at [email protected]


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Security risk and the sum of small things
Leaderware Editor's Choice
Dr Craig Donald advises that the small things we often write off as unimportant can quickly scale to become serious threats to security and safety.

From the editor's desk: Maybe I’m too old?
Technews Publishing News
There are many companies these days touting their ability to securely authenticate people via mobile devices (or selfies), claiming that it is secure and easy. Some banks are even allowing people to ...

IDEMIA and Ideco demonstrate their value stacks
Technews Publishing Ideco Biometrics IDEMIA Conferences & Events Access Control & Identity Management News
Ideco and IDEMIA recently hosted a travelling show where attendees were given an update on the companies, as well as the full value stack they offer.

Sustainability, trust and predictability
Technews Publishing Bosch Building Technologies Conferences & Events CCTV, Surveillance & Remote Monitoring News Integrated Solutions
The future for Bosch Building Solutions is focused on predictive solutions based on sustainability and trust in an AIoT world of cloud services.

Networked devices increase cyber risks for building systems
Technews Publishing News
Building managers need an integrated approach with IT professionals and clear lines of responsibility to ensure optimal facilities management and cybersecurity.

Specialised surveillance and communications
Technews Publishing Editor's Choice News Integrated Solutions Residential Estate (Industry)
Hi-Tech Security Solutions spoke to Arcanum Africa’s Peter Stolwerk and Aaron van Schaik to find out a bit more about the company and the unique products it is bringing to the local market.

From Hill Street Blues, to Hillbrow, to managing risk for BMW
Technews Publishing Editor's Choice News Security Services & Risk Management
Jane-Eleanor Morrison’s success story starts from growing up in the stressful pre-democracy times in KZN, moves through a successful career in SAPS. to BMW South Africa where she is now the risk control manager.

Locally designed lock designed to stay locked
Editor's Choice
The new Blade Lock makes it close to impossible to break a lock by conventional means; combined with the Smart Gate, your security behind the door is certain.

Water deluge fire suppression system
FS Systems Editor's Choice Fire & Safety Mining (Industry) Products
The FS Group custom-designed and installed an electronically actuated water deluge fire suppression system for an underground explosives magazine, ensuring both the safety of miners and operations, as well as regulatory compliance.

Hard times, increased crime
Technews Publishing Security Services & Risk Management Integrated Solutions IT infrastructure
Hi-Tech Security Solutions spoke to Mezuzah Security Services to find out what is happening in the real world, and how security companies are dealing with the added pressure inherent to the South African market.