filmov
tv
Digital Evidence Security: From Capture To Courtroom
Показать описание
Watch this video to understand how our portfolio of cameras and our digital evidence management software protect your valuable digital evidence from capture to courtroom.
00:05
Body worn and in car cameras are here to stay. They allow agencies to capture valuable digital evidence which can be used to help reveal the truth.
00:14
But, without end-to-end security, from capture to courtroom, the integrity of this evidence could be at risk. So how do we ensure the truth isn’t compromised?
00:25
Out of the box, an S series camera generates a unique public key to provision it in CommandCentral Vault and assign it with a digital certificate.
00:33
When audio and video are later recorded, a private key known only to the device, immediately signs the file.
00:40
Because the file is signed on the device and can be validated when it is uploaded to the cloud, chain-of-custody can be established from the moment of capture.
00:47
Encryption then ensures any unauthorized attempt to access, tamper with or extract the data will fail.
00:54
When the digital evidence is uploaded to be stored in the cloud-based CommandCentral Vault, encryption continues to ensure the evidence is unreadable to anyone trying to intercept it.
01:05
The cloud itself is protected by a number of security measures. This includes cyber security monitoring, intrusion detection technology, firewalls and access control systems as well as physical site security, multi factor authentication and personnel screening.
01:23
Within CommandCentral Vault, further security features like application segmentation prevent full system compromise.
01:31
Securely managing digital evidence is critical to avoid it becoming inadmissible.
01:38
That is why all activity and access to the evidence is automatically logged from the moment of capture through when it is shared, so chain-of-custody remains unquestioned.
01:46
Precautions like creating a replica file during any processing, such as redacting, also ensures the integrity of the original evidence is always preserved.
01:56
So now, when lawyers want proof, indisputable evidence is available, securely delivered, right to their hands.
02:04
Providing this evidence is easily possible with a solution built for the realities of law enforcement today.
02:10
Evidence protected. Data integrity preserved. Proof undeniable. Case closed.
00:05
Body worn and in car cameras are here to stay. They allow agencies to capture valuable digital evidence which can be used to help reveal the truth.
00:14
But, without end-to-end security, from capture to courtroom, the integrity of this evidence could be at risk. So how do we ensure the truth isn’t compromised?
00:25
Out of the box, an S series camera generates a unique public key to provision it in CommandCentral Vault and assign it with a digital certificate.
00:33
When audio and video are later recorded, a private key known only to the device, immediately signs the file.
00:40
Because the file is signed on the device and can be validated when it is uploaded to the cloud, chain-of-custody can be established from the moment of capture.
00:47
Encryption then ensures any unauthorized attempt to access, tamper with or extract the data will fail.
00:54
When the digital evidence is uploaded to be stored in the cloud-based CommandCentral Vault, encryption continues to ensure the evidence is unreadable to anyone trying to intercept it.
01:05
The cloud itself is protected by a number of security measures. This includes cyber security monitoring, intrusion detection technology, firewalls and access control systems as well as physical site security, multi factor authentication and personnel screening.
01:23
Within CommandCentral Vault, further security features like application segmentation prevent full system compromise.
01:31
Securely managing digital evidence is critical to avoid it becoming inadmissible.
01:38
That is why all activity and access to the evidence is automatically logged from the moment of capture through when it is shared, so chain-of-custody remains unquestioned.
01:46
Precautions like creating a replica file during any processing, such as redacting, also ensures the integrity of the original evidence is always preserved.
01:56
So now, when lawyers want proof, indisputable evidence is available, securely delivered, right to their hands.
02:04
Providing this evidence is easily possible with a solution built for the realities of law enforcement today.
02:10
Evidence protected. Data integrity preserved. Proof undeniable. Case closed.