A CODE OF PRACTICE FOR THE OPERATION OF CCTV SYSTEMS SUBJECT TO THE PROVISIONS OF THE DATA PROTECTION ACT Anglia Ruskin University operates and manages a number of CCTV systems at various University sites. This Code of Practice relates to those systems that are subject to the provisions of the Data Protection Act, i.e. those that include cameras that may be used to follow the movements of and identify individual persons. These are commonly known as “Fully Functional” cameras with a zoom, pan and tilt capability controlled remotely. This Code of practice has been published on the internet to demonstrate that the principles which govern the regulation and operation of all CCTV systems controlled by the University are known to and approved by Staff, Students and all other interested parties. For all enquiries about the Code of Practice, please telephone The Head of Security on 0845 196 3717 5th Edition, published October 2006 1 INTRODUCTION University CCTV systems have been developed in response to the growth in and the fear of crime on all sites operated by the University. The purpose of these systems is to make our premises and surroundings safer and more welcoming, thereby allowing all students, staff and visitors, regardless of age, gender or race, the opportunity to participate fully in University life without fear. All CCTV cameras are the property of Anglia Ruskin University. The University is responsible for the fair and effective operation of all systems. The Code of Practice follows that published by the Information Commissioner and is intended to comply with the Data Protection Act 1998 and the additional “good practice” recommendations. An Operational Manual for the guidance of staff operating the systems supports the Code of Practice. Only designated staff have routine access to the systems and authority for its operation. The Operational Manual will be made available if requested, deleting only those elements which remain confidential for security reasons. The systems comprise multi-camera systems on the following sites: Cambridge Chelmsford Rivermead The images from these cameras are recorded and monitored 24 hours a day 365 days a year with the majority being recorded digitally. All recorded material is the property of Anglia Ruskin University, which retains copyright. This Code of Practice sets out the aims of the CCTV systems and how they will be used. The systems will not be used for any other purpose than those set out in this document. The day to day management of the systems will be the responsibility of the relevant Campus Security Manager. 2 1. COMPLIANCE WITH THE PRINCIPLES OF THE DATA PROTECTION ACT 1998 The First Data Protection Principle requires that personal data shall be processed fairly and lawfully and shall not be processed unless certain conditions are met. In response to the First Principle, the University considers: That there is a legitimate basis for the processing of images, namely the prevention and detection of crime That the processing is necessary for the purposes of the prevention and detection of any unlawful act That images are processed lawfully and fairly That appropriate signage provides the relevant information to individuals at the point at which an image may be obtained The Second Data Protection Principle requires that personal data shall be obtained for one or more specified and lawful purposes and shall not be further processed in any manner incompatible with that purpose or purposes. In response to the Second Principle, University documented policy is that: Being that the purpose for which images are processed is the prevention and detection of crime, disclosure to a third party must be restricted to law enforcement agencies. The Third Data Protection Principle requires that personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. In response to the Third Principle, University policy will be that: Every step will be taken to ensure that surveillance is restricted to University premises. Images are of a quality that makes them adequate for the purposes of the prevention and detection of crime. The Fourth Data Protection Principle requires that personal data shall be accurate and, where necessary, kept up to date. In response to the Fourth Principle, the University certifies that: 3 The clarity of images is managed by the use of high quality recording facilities, including digital technology. Time and location references are checked through a documented procedure Evidential images in the form of stills or downloaded digital images are not subjected to enhancement or compression techniques. The Fifth Data Protection Principle requires that personal data processed shall not be kept longer than is necessary. In response to the Fifth Principle, the University certifies that: All images processed for the purposes of crime prevention and public safety, other than those retained for evidential purposes, are destroyed within 31 days. The Sixth Data Protection Principle requires that personal data shall be processed in accordance with the rights of data subjects under the Act. In response to the Sixth Principle, the University certifies that: All subject data requests will be dealt with in an appropriate manner The Seventh Data Protection Principle requires that appropriate technical and organisational measure shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. In response to the Seventh Principle, the University certifies that: Appropriate care is taken in the management and control of image processing, retention and destruction. The Eighth Data Protection Principle requires that personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. In response to the Eighth Principle, the University certifies that: No processed images will be transferred beyond the boundaries of the United Kingdom. 4 2. PURPOSE STATEMENT It is important that all those who will be affected by the University CCTV systems and all those charged with operating them understand exactly why the systems have been introduced and what they will and will not be used for. The key objectives of the systems are : a) b) c) d) e) f) Protecting all University buildings and premises Deterring and detecting crime Reducing anti-social behavior by any person on University Property Assisting in the identification of offenders Reducing the fear of crime Creating a safer environment for all No CCTV system incorporating cameras which are subject to the provisions of the Data Protection Act shall be installed or operated unless the need for it has been assessed against the above objectives. This shall be the responsibility of the Head of Security. He or she will additionally ensure that the assessment process and the reasons for all CCTV installations undertaken from the date of publication of this Code of Practice are documented and filed within the Secretary and Clerk’s Office. The purpose of schemes in existence at the time of publication of this Code of Practice will similarly be documented. 3. OPERATOR AWARENESS In order that all CCTV operators are aware of the purposes for which schemes have been established and the rights of data subjects, all Security Control Rooms will contain a notice clearly visible to operators incorporating those purposes and rights. 4. PRIVACY An individual’s entitlement to go about his/her lawful business is respected and supported and this is a primary consideration in the operation of the system. Although there is inevitably some loss of privacy when CCTV cameras are installed, they will not be used to monitor the progress of individuals in the ordinary course of lawful business in the areas under surveillance. Individuals will only be monitored if there is reasonable cause to suspect that an offence has been or may be committed. 5 The Operators shall only use the cameras to view public areas and not to look into the interior of any private premises, offices or any other area where an infringement of privacy of individuals may occur. The only exception to this rule is if an operator, whilst operating the cameras, nevertheless observes something which he/she believes to indicate that a crime is being, or is about to be committed in a non-public area. Any such event will be fully logged and operators will be required to justify their actions. Any breach of this condition may result in disciplinary proceedings against the Operator. 5. PROVISION OF EVIDENCE Arrangements will be made to provide recorded material to the Police in connection with investigations into criminal offences. Requests may also be made for the release of material by other bodies with prosecution powers such as Customs and Excise, the Health and Safety Executive or other statutory agencies. The University reserves the right to provide recorded material to its own agents. 6. SIGNAGE On all sites subject to CCTV surveillance under the scheme, signage has been placed so that the public is aware that they are entering an area that is covered by the surveillance equipment. The signs are clearly visible and legible to the public and identify the purposes for which images are recorded, by whom the scheme is controlled and to whom any requests for information should be made. 7. BREACHES OF THE CODE Any breach of this Code of Practice is a serious matter. Any employee in breach of the Code may be dealt with in accordance with the disciplinary procedures of the University. This process could ultimately result in dismissal. The responsibility for ensuring the security of the systems will rest with the relevant Campus Security Manager. He or she will, in the first instance, investigate all breaches or allegations of breaches of security and report his findings to the Head of Security who will agree a response following consultation with the University Secretary & Clerk. 8. STAFF Systems will be operated on a 24-hour basis. Operators employed by the University are trained to a proficient level before they are allowed to take control of any system. Training will include: 6 a) b) c) d) e) f) g) Use of equipment Observation techniques University procedures and record keeping Report procedures and action on incidents Evidence handling Actions in the event of an emergency All staff training will be supervised by a suitably qualified Operator The University will ensure that refresher training is provided on a regular basis to ensure that the highest operating and management standards are maintained. Staff may be required to provide the Police or other statutory agencies with written statements from time to time, which may be required for evidential purposes. No Security Officer or Control Room Operator employed by a Contract Staff Provider and for the time being stationed on University premises will control any CCTV system in any manner unless they are licensed to do so by the Security Industry Authority. 9. OPERATION AND ADMINISTRATION CONTRACTORS Contractor access will be provided from time to time for the purpose of maintaining the equipment. No contractor will be left unattended at any time whilst working on the systems. A maintenance log will be maintained at each Security Control Room and will include the following: Details of planned preventative maintenance (PPM) arrangements Details of person(s) responsible for managing the PPM and arranging reactive maintenance and repair. Details of person(s) responsible for monitoring the quality of maintenance and repair. 10. DIRECTION AND CONTROL OF THE SYSTEMS 10.1 DIRECTION 7 Operational management of the system is the responsibility of the Head of Security. The systems are directed towards providing a safer environment for all staff, students and visitors to the University. The University will use the systems for: a) Day to day monitoring of the surveillance areas b) The security of University premises. c) The safety of staff, students and visitors 10.2 POLICE ROLE The Police or other statutory enforcement agency may request assistance in order to: a) b) c) d) Assist with the deployment of resources. Monitor potential public disorder or other major security situations Assist in the detection of crime. Facilitate the apprehension and prosecution of offenders in relation to crime and public order. 11. CONTROL OF RECORDED IMAGES 11.1 RECORDING OF IMAGES Recorded images may be submitted as evidence in criminal proceedings and therefore must be of good quality and be accurate in content. All such material will be treated in accordance with strictly defined procedures to provide continuity of evidence and to avoid contamination of evidence. Where the system records features such as the location of the cameras and/or a time and date reference, there will be a documented procedure for ensuring the accuracy of the embedding process and the person(s) responsible for monitoring the procedure. In most cases images from CCTV systems are recorded digitally, although some systems remain that use VCR equipment and videotapes. Recorded material will not be sold or used for commercial purposes or the provision of entertainment. The showing of recorded material to the public will only be allowed in accordance with current legislation and codes of practice when requested by Police as part of any investigation. 8 All routine videotape recordings will be kept for a minimum of 14 and a maximum of 28 days and then erased before re-use in accordance with defined operating procedures. In the case of digitally recorded images the length of retention is dependent upon the number of images captured by motion-activated recording. A documented procedure will be used to ensure that the system is managed so as to prevent images being retained for excessive periods and on a par with taped images. The procedure will include a register identifying: The person(s) responsible for monitoring image retention The average time that images are retained The date of any system adjustments to limit the retention time Details of all reviewing of videotapes and digital images The University retains copyright of the tapes and digital recordings and will enforce copyright to prevent improper use. 11.2 CONTROL OF TAPES All tapes will remain the property of the University. Each new tape must be clearly and uniquely marked before it is brought into operation. At each use the identification number of the tape, date, time of insertion and time of removal shall be noted in the Register. Between uses tapes will be stored securely and in such a way that the completeness of the archive is immediately apparent. The Tape Register will be stored securely. Except for evidential, training and demonstration purposes, tapes containing recordings will not be removed under any circumstances. All tapes will be erased prior to disposal. 11.3 COPYING AND REVIEW OF TAPES AND DIGITAL IMAGES Except for training, demonstration and evidential purposes tapes and digital recordings will not be copied in whole or in part. Viewing of recorded images will only take place in a restricted area and there will be no general access to that area while viewing is in progress. A register will be kept and will include the following: 9 The reason for the viewing The outcome, if any, of the viewing The name(s) of the person(s) viewing the images and if this includes third parties, the organisation from whence they come The date and time of any removal of images The name of the person removing the images The date and time the images were returned to the system or secure place, if they have been retained for evidential purposes 11.4 EVIDENTIAL TAPES Tapes and discs required for evidence will be dealt with in accordance with the Police and Criminal Evidence Act 1984 (PACE) or any other statutory provision. A record will be made in a Register (see 5.3 Above) of the release of such tapes to the Police or to other authorised applicants. The record will include the name, number and operating base of any Police Officer removing images from the University. In accordance with the Data Protection Act 1998 the release of images will be treated in the same way as with other form of personal data and will require a written request signed by an officer not below the rank of Inspector or the equivalent in the case of other enforcement agencies. 12. DISCLOSURE All staff involved in operating the equipment must be able to recognise a request for access to recorded images by data subjects. A guidance note to assist staff will be posted in each Security Control Room Data subjects requesting access will be provided with a standard subject access request form which: Indicates the information required in order to locate the images requested. Data Subjects will be required to provide dates and time of when they visited the premises or area subject to CCTV surveillance 10 Indicates the information required in order to identify the person making the request. A photograph of the individual may be requested in order to locate the correct image Indicates the fee that will be charged for carrying out the search for the images requested. A fee of £10.00 will be charged for the search. Asks whether the individual would be satisfied with merely viewing the images recorded. Indicates that the response will be provided promptly and in any event within 40 days of receiving the required fee and information. Explains the rights provided by the 1998 Act Data subjects shall, at the time they are provided with the subject access request form, also be given a leaflet describing the type of images that are recorded and retained, the purposes for which those images are recorded and retained and information about the University’s disclosure policy in relation to those images. Upon individual request, disclosure to people whose images have been recorded and retained may be allowed (Unless disclosure to the individual would prejudice criminal inquiries or criminal proceedings). All subject access requests should be dealt with by the Campus Security Manager or a Duty Security Supervisor, who should locate the images requested. The Security Manager or a Duty Security Supervisor will determine whether disclosure to an individual would entail disclosing images of third parties and whether those images are held under a duty of confidence. If third party images are not to be disclosed for this reason, the Campus Security Manager shall arrange for the third party images to be disguised or blurred. If the system does not have facilities for this type of editing a third party or company will be hired to carry it out. In the case of the University, third party images are mainly but not exclusively held other than under a duty of confidence. All requests for access or for disclosure should be recorded. If access or disclosure is denied, the reason should be documented, to include: The identity of the individual making the request The date of the request The reason for refusing to supply the images requested 11 The name and signature of the Campus Security Manager or Duty Security Supervisor making the decision to deny access. If access to or disclosure of the images is allowed, then the following will be documented: The date and time at which access was allowed or the date upon which disclosure was made The identification of any third party who was allowed access or to whom disclosure was made The reason for allowing access or disclosure The extent of the information to which access was allowed or which was disclosed 13. REVIEW The Head of Security will undertake regular reviews of all documented procedures to ensure that the provisions of this Code of Practice are complied with. An internal annual assessment will be undertaken to evaluate the effectiveness of the system measured against the stated purpose of the scheme. If the scheme is not achieving its purpose it will be discontinued or modified. A report on the review and assessment process will be forwarded annually to the Data Controller for monitoring purposes. 14. COMMENTS AND COMPLAINTS Comments or complaints concerning the University CCTV systems may be addressed to the Head of Security who has operational responsibility for the systems. Contact details can be found at the beginning of this document. 12 13