缅北强奸

Closed Circuit Television Protocol

Purpose

Scope

Definitions

Protocol

Responsibilities

References

Protocol History

Purpose

缅北强奸 Security Services employs closed circuit television (CCTV) cameras in public areas for the purposes of safety and security of the 缅北强奸 community and for the protection of University property. The goal of this protocol is to outline how CCTV shall be used so that it complies with all existing federal and provincial laws and is consistent with its stated purpose.

2.0 Scope

2.1 The protocol set out in this document applies to all members of the 缅北强奸 Community, schools and centers of 缅北强奸 in the use of CCTV monitoring and recording.

2.2 Video monitoring for the following purposes is not subject to the provisions set out in this document:

2.2.1 where it is being used as part of the teaching or research responsibilities of a member of the academic staff of the University;

2.2.2 where it is being used for video conferencing; and

2.2.3 where it is used by Parking Services to assist customers at gates and pay stations.

2.2.4 when it is installed in a 缅北强奸 building or space that is leased to an external party.

3.0 Definitions

3.1 Access Act - refers to R.S.Q., chapter A-2.1, An Act Respecting Access to Documents Held by Public Bodies and the Protection of Personal Information, which generally declares confidential the records, documents and information concerning staff and students. The use of CCTV is subject to this Act.

3.2 CCTV [closed circuit television] is a generic term used to describe a variety of video surveillance technologies. More specifically, CCTV refers to a system in which one or more video cameras are connected in a closed circuit or loop, with the images produced being sent to a central television monitor or recorded. As used in this document, the term CCTV applies only to video monitoring and recording. The electronic interception and/or recording of audio are generally much more legally restrictive and are outside the scope of this document.

3.3 Covert CCTV Equipment 鈥 A camera is covert when it is hidden from normal view or otherwise secreted away, and at least one of the individuals to be recorded has a reasonable expectation of privacy.

3.4 缅北强奸 Community 鈥 refers to 缅北强奸 faculty, staff, students, contract employees, visitors or any other person on University property.

3.5 Overt CCTV Equipment 鈥 A camera is overt when it is not hidden from general view, regardless of whether or not an individual actually sees the monitoring device or knows of its existence.

4.0 Protocol

4.1 Use of CCTV

4.1.1 缅北强奸 Security Services administers the University鈥檚 central security system, which includes the security camera network. As such, it is the only University unit authorized to implement, oversee and coordinate the use of video recording for safety and security purposes at the University. The procurement and installation of video cameras and monitoring equipment is strictly controlled and all installations must be approved by Security Services in accordance with the Security Device Installation Protocol.

4.1.2 缅北强奸 Security Services utilizes closed circuit television (CCTV) to enhance personal safety, deter and investigate crime, and protect University property. The use of CCTV will be conducted in manner compliant with all existing federal and provincial laws and consistent with the values of the University so as to minimize the intrusion of the privacy of faculty, staff, students, and visitors in their personal and professional activities. It will be used for legitimate safety and security purposes only, which include but are not limited to the following:

  1. monitoring building perimeters, entrances and exits, lobbies and corridors, receiving docks, special storage areas, and laboratories;
  2. monitoring streets, sidewalks, parking lots, courtyards, and intersections;
  1. monitoring restricted access transactions at entrances to buildings and other areas;
  1. monitoring locations protected by intrusion alarms, exit door controls, security tabs, panic and hold-up alarms, and lockdown buttons;
  1. monitoring ATM stations and other areas where funds are exchanged such as a business office, campus store, and other cashier locations;
  1. monitoring public areas using CCTV as a patrol technique;
  1. reviewing recorded images as part of a criminal or security breach investigation; and
  1. conducting surveillance for areas prone to on-going criminal activity.

4.1.3 Public area video monitoring will be conducted only in areas where the public does not have a reasonable expectation of privacy. Cameras will not be directed at private locations, such as a home, residential apartment windows, shower rooms, toilet stalls or locker rooms.

4.1.4 Hidden or covert cameras will not to be installed unless there is a demonstrated need to collect evidence for a criminal investigation. Such installations will be authorized only by the Director, Campus Public Safety (Security Services) or the Security Services Supervisor responsible for investigations.

4.1.5 CCTV shall not be utilized to monitor employee, service provider, or student performance except where employee or student conduct constitutes criminal behaviour or negligent behaviour where it places others at risk.

4.1.6 Security Services shall ensure that members of the University community are aware of the presence and purpose of CCTV systems through appropriate signage and information on the department鈥檚 website.

4.2 CCTV Monitoring

4.2.1 The monitoring of CCTV systems by Security Services shall be conducted in a professional, ethical, and legal manner, and in accordance with all University policies, including the Policy on Harassment and Discrimination and the Policy against Sexual Violence.

4.2.2 Personnel involved in video monitoring shall be appropriately trained and continuously supervised in the responsible use of this technology.

4.2.3 Personnel involved in video monitoring shall be holders of valid permits from the Bureau de la s茅curit茅 priv茅e.

4.2.4 Personnel who monitor cameras must receive a copy of this document and the procedures developed under it and provide written acknowledgement that they have read and understood their contents.

4.2.5 Personnel who monitor cameras shall not use, alter or distribute privileged information accessed, acquired or used in carrying out tasks in ways that are not directly connected with their work responsibilities.

4.2.6 Violations of the established procedures for video monitoring referenced in this document will result in disciplinary action.

4.2.7 Where appropriate, Security Services may award live viewing rights to other University personnel where it serves to enhance the safety and security of the local area. These individuals will be subject to the same standards of training and conduct as Security Services personnel. Violations of the established procedures for video monitoring referenced in this document will result in having their viewing rights revoked. Examples of personnel who may be awarded live viewing rights include, but are not limited to:

  1. users of cameras installed for the purposed of identification at restricted access points.
  1. supervisors of areas with customer service counters.
  2. supervisors of areas equipped with panic or hold-up alarms.

4.3 Use and Distribution of Recorded Images

4.3.1 Security Services is responsible for ensuring that access to recorded images is severely restricted and the secure storage of data recordings is consistent with University policies and procedures concerning data protection and records management. Recorded images are kept for a limited period of time (usually ninety days).

4.3.2 The use of recorded images to conduct investigations of possible misconduct or illegal activity is limited to Security Services personnel or persons authorized by Security Services.

4.3.3 IT infrastructure & Information Security personnel are permitted to view recorded images only for the purposes of repair and maintenance to the CCTV network.

4.3.4 Security Services will provide information, including any surveillance camera recordings to le Service de police de la Ville de Montr茅al (SPVM), or other law enforcement agencies as required for the purpose of investigation of an offence.

4.3.5 Members of the 缅北强奸 community may request that images be reviewed by Security Services personnel. Representatives of outside agencies, such as the SPVM, may request to receive recorded footage. These requests will be approved on a case-by-case basis. Situations where such approval may be provided include, but are not limited to:

  1. University disciplinary officers in cases of student discipline where Article 4.1.5 of this document applies;
  1. The Department of Human Resources in cases of employee discipline or arbitration hearings where Article 4.1.5 of this document applies;听
  2. Risk Management or Legal Services to defend against claims and lawsuits;
  3. employees or students wishing to use video to prove their innocence in legal or campus judicial proceedings where Article 4.1.5 of this document applies; and
  1. The Office for Mediation and Reporting in cases of investigations of harassment, discrimination, and sexual violence.

4.3.6 Nothing in Article 4.3.5 is designed to contravene the Access Act, which stipulates that a person is entitled to access information concerning him/her, including access to recordings made of him/her. Nonetheless, the Access Act does specify restrictions to the right of access, and any denial of access shall be in accordance with those specifications.

4.3.7 Any request for video footage from an individual or agency for purposes not addressed in Articles 4.3.4, 4.3.5 or 4.3.6 will require a search warrant or subpoena.

4.3.8 Requests to view or receive recorded images under Articles 4.3.5 and 4.3.6 will be submitted in writing that clearly identifies the reason for the request. Authorization to release recorded video footage or to permit viewing thereof is restricted to the following personnel:

  1. the Security Services supervisor responsible for investigations; or the Security Services Supervisor acting in his/her stead.
  1. Director of Campus Public Safety (Security Services).

4.3.9 All individuals who are granted access to live or recorded images must have read and signed the 鈥淎ccess to the CCTV Network agreement鈥 stating they agree to respect and abide by the CCTV Protocol. The agreement will need to be signed on an annual basis.

5.0 Responsibilities

5.1 缅北强奸 Security Services shall be responsible for the application and administration of this protocol.

5.2 缅北强奸 Security Services shall develop procedures that will govern the approval, installation, operation and management of video monitoring equipment, and for the proper training of University staff using such equipment. The procedures shall be consistent with the provisions of this document.

6.0 References

6.1 La Commission d'acc猫s 脿 l'information du Qu茅bec, Rules for use of surveillance cameras with recording in public places by public bodies (June 2004).

6.2 International Association of Campus Law Enforcement Administrators (IACLEA), Committee Report on CCTV Systems (May 2009).

6.3 Guidelines on Overt Video Surveillance in the Private Sector, Office of the Privacy Commission of Canada (March 2008).

7.0 Protocol History

Amended:

15 April 2024 - Modified persons authorized to request recorded images. Modified requirement for signed agreement to apply to users with live and record images.

Amended:

04 December 2018 鈥 Modified persons authorized to release recorded video footage. Added requirements for signing CCTV agreement.

Amended:

22 July 2013 鈥 Modified the document format to incorporate the new 缅北强奸 Security Services logo; added a history section to the document to track changes.

Amended:

04 October 2012 鈥 Added definition of Access Act and the 缅北强奸 Community; stipulated that recorded images are retained for a limited period of time (usually 30 days); specified how Access Act applies.

Effective:

23 April 2010

Back to top