Product Privacy Sheet - Genetec™ Security Center SaaS

This document is a supplement to the Genetec Privacy Policy available at www.genetec.com/legal/privacy (the “privacy policy”) and applies to the following Genetec product or service (the “Product”): Genetec™ Security Center SaaS (a Cloud Service).

July 23, 2024

Overview

This document outlines how Genetec will handle information or data that you or your users store in the Product (referred to as your “Content”), as well as other type of data produced as a result of your use of the Product.

Content captured by the Product

The Product is a hosted platform that requires an active subscription to use its capabilities. The Content handled by the Product will depend on your use of its various features and component, as described below.

Core System

Customer Account: The Product requires you to input the name, email and other contact information on individuals who are authorized to access and manage your Product account with us (such as account owners and system administrators). This Content will be stored in our account management platform and used to authenticate authorized users (including their respective Product and account management privileges). All Product account related communications will be sent by us to the above individuals, based on their role, as assigned by you.

System User Profiles: The Product requires you to input authorized user identification information so that the Product may duly authenticated them. This Content is comprised of each user’s name and e-mail address, and such other information that you choose to capture to authenticate your users. Depending on your configuration, the Product will grant your users various privileges to access and manage your Content and premises, whether locally or remotely.

Device and System Identifiers: The Product captures various non-personal device and system identifiers to recognize and communicate with the devices forming part of your security infrastructure (such as surveillance cameras, video recording devices, and access control devices), as well as their configuration and operational metrics. This may include unique identifiers of security cameras, access cards and readers, and other hardware or software, including their name, make and model, and configuration settings. This Content may also include the physical location of your connected devices and accessories as well as that of your premises (including the names and physical location of doors, areas, etc.) to help you manage your security infrastructure. The Product will also use that information to inform you of the availability of firmware updates for your connected devices and help you easily deploy them to the compatible devices.

Audit Trails: Additionally, the Product keeps a record of all users’ IP addresses and the list of their activities (includes changes to the system configuration made by each user) as part of its audit trail. By default, this Content is stored for a period of 90 days (by default), but you may disable this retention.

Video Management

You may configure the Product to record and store video footage from the video cameras enrolled in the Product, including the associated metadata (like timestamps, geolocation, and so forth).

Access Control and Identity Management

Personnel and Visitor Records: You will need to create a identify profile for each individual to whom you wish to grant access to your premises (sometimes referred to “cardholders”). This includes their name, email address, and such other details that you may choose to identify them (such as phone numbers, emails, national identifiers, employee numbers, and so forth). These records will be stored in the Product until you decide to delete them.

Visitor Management: You may be required to add additional information to manage temporary cardholders (or visitors), such as the name and contact information on their employer. You may also add optional information about your visitors, such as a photo, whether they need assistance, whether a confidentiality agreement is in place, etc.. The Product will also enable you to collect the time of arrival and the purpose of each temporary cardholder’s visit.

Access Management: The Product allows you to configure and store the list of permanent and temporary cardholders, together with their respective access privileges to sites or areas, activation and expiration dates of access privileges (and any timeframe extensions, with due justifications), and other parameters to help you manage access to your premises.

Access History: The Product will collect and store access history on all configured permanent and temporary cardholders (including visited places, check-in and -out times, access grants and denials, and so forth). Access history data will be kept in the Product for a period of 90 days (by default), unless you choose a different retention period.

Case Management

The Product allows you to associate and store certain Content in support of incident investigations and other case management efforts. Content that is tagged in cases by your users may include incident time, location, description, narrative, incident identification references, as well as any other data and records that is either stored in the Product or may be shared with you by others through the Content Sharing feature. The nature and the scope of the Content tagged in a case is determined by your users.

Content Sharing

The Product enables users and authorized individual to securely upload and share digital evidence and other data, including in support of incident investigations and other case management efforts. More specifically, it allows you to offer to external parties a secure way to upload and share Content with you, as well as for your users to share your Content with external parties. Uploaded Content will be stored in the Product in its original form (supported formats only), together with associated metadata (such as timestamps, user information, capture device information, and the GPS position, if available).

Content Search

The Product allows you to search for Content that matches specified criteria. Search operations involving visual Content (like video footage) will be performed using various algorithms capable of identifying supported object types (like humans, vehicles, etc.), colours, and other supported parameters.

The Product supports search operations using various techniques, including Forensic Search. The latter leverages large language models to interpret search queries input by the user using natural language. The feature is designed to help your users easier perform search operations within your Product deployment environment (including your Content and Product settings) and surface results that correspond to their search criteria. When the feature is used, user input will be processed through our natural language processing engine to convert each user’s natural language input into a machine readable search query, and then relay the query back to the Product core system to perform the requested operation and present the results to the user.

Software Clients

We may provide your users with software clients (mobile or desktop) to interact with the Product. When used, they may allow your users to store certain Content locally on their devices.

Central Monitoring

Central Monitoring is a feature that allows you to view and control remotely multiple instances of the Product, of Genetec™ Security Center (on premise) installations, and of other compatible Genetec products and services that you use to secure your premises. If you use this feature, a partial copy of the Content that you need to access from the other system will be transferred and stored in your Product instance. Please refer to the product privacy sheet of any each connected Genetec product or service to understand how it handles your Content, as this document only relates to the Product.

Other data captured by the Product

Usage Data

The Product collects certain usage data (such as how much storage you use, how many investigation files and cases you have, and so on) that is used by us for billing and statistical purposes.

Product Performance Data

We collect certain basic insights and diagnostic data based on your use of the Product to ensure that it functions as intended and remains secure. This data includes Product configuration settings, error information, connected software and hardware identifiers, operational performance metrics, use and performance of Product features, server and software logs, quality and compatibility status, user interface language, the version of other Genetec products installed on your devices, and so forth. All gathered product performance data will be stored in our secure data centers and is used by us to fix issues and improve the Product and other products and services.

When the Forensic Search function is used, we may capture a copy of users’ natural language queries to then anonymize and store them in aggregate with natural language queries from other customers’ users to help us improve our natural language interpretation algorithms for all our customers, including you.

Data ownership, access and retention

We use Microsoft Azure data centers to host all instances of the Product and store your Content. By default, your Product account will be set up in one of our regional Microsoft Azure data centers located the closest to the country specified in your profile. However, if you have a preference (whether based on your needs and regulatory requirements), you may request that your account be set up in a specific data center region among the list of available locations. That said, for Access Controls and Identity Management features of the Product, while permanent cardholder data will be stored in the data center closest to the country specified in your profile, temporary (visitor) cardholder data will be stored in the data center closest to the site visited. If a cardholder travels to another region, a subset of the information required to grant access to the cardholder in your site located in that other region will be transferred to the systems of that region.

Genetec uses modern encryption standards to maintain the confidentiality and integrity of your Content while in transit and at rest. Your Content may be accessed only by the authorized system administrators (which may include your system integrator) and users with appropriate access privileges, as defined by you.

Genetec personnel do not have access to your Content that resides in the Product. If you ask Genetec to provide support with regards to the Product, our support team will only have access to information that you submit to us as part of your support request or to which you decide to grant us access through the Product. As such, in certain cases, we may ask you to share additional information with us to be able to respond to your request for support.

The Product enables you to configure retention periods for your Content based on your own retention policies. You may configure exceptions to the retention rules, should you choose to retain parts of your Content for a longer period. The Product will retain your Content based on your defined settings. Upon termination of your subscription, all your Content will be deleted from our systems in accordance with our data retention policy (typically within 30 days).

This document has been last updated on July 23, 2024. The latest version of this document may be found at www.genetec.com/legal/pps-scsaas. We invite you to subscribe to the legal notifications in our Email Subscription Center to, among other things, be notified of any major changes to this document.

Share