TITLE

The Conflicts from Legislation

AUTHOR(S)
Erickson, Don
PUB. DATE
May 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;May2008, Vol. 45 Issue 5, p80
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the impact of state and local policies regarding the use of technologies needed to secure hospitals, schools, mass transit systems, ports and the nation's critical infrastructure in the U.S. The author claims that when state legislation restricts the use of biometrics and video surveillance camera, both manufacturers and end-users are affected.
ACCESSION #
31940054

 

Related Articles

  • A Business Case for Off-site Monitoring. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Aug2008, Vol. 45 Issue 8, p52 

    The article reports on the technological advances on remote security video monitoring in the U.S. It states that chief security officers can keep track of multiple facilities. It adds that among the uses of remote video surveillance systems are virtual guard tours in which a central station...

  • Popular Tourist Destination Has a New Look on Safety. Engebretson, Joan // SDM: Security Distributing & Marketing;Nov2009, Vol. 39 Issue 11, p77 

    The article reports on the upgrade of video surveillance system at Universal CityWalk, Universal City, California. It discusses how the management prepared the plans for upgrading the system. Finally, the technology was installed by Climatec Building Technologies Group at a new Security Command...

  • Big Bang Theory: Selecting Technology in Tough Economic Times. Boucherle, Paul // Security: Solutions for Enterprise Security Leaders;Jan2009, Vol. 46 Issue 1, p30 

    The article discusses ways on how to choose a security technology during hard economic times. The tips aim to help to avoid confusion and uncertainty in attempting to make effective financial and technological decisions in choosing security solutions for enterprise wide applications. It mentions...

  • You can't have too many toys. Bischoff, Glenn // Mobile Radio Technology;Mar2007Supplement, Vol. 25, p3 

    The author reflects on the reluctance of the public to adopt new technologies in the U.S. However, he also cites the decision of public safety agencies and businesses to slowly adopt asset-tracking and video surveillance systems. He further emphasizes the significance of these technologies in...

  • The Race to the Bottom & Rocket Ride to the Cloud. Engebretson, David // SDM: Security Distributing & Marketing;Oct2014, Vol. 44 Issue 10, p130 

    The article presents the author's views on the developments in video surveillance technologies. He reflects on how the prices of video surveillance technologies decline rapidly due to emerging technologies. He examines low-cost Internet protocol cameras which are reportedly changing the security...

  • Network camera.  // Government Security;Mar2006, Vol. 5 Issue 2, p46 

    The article features the Altitude 9440 series of high-resolution mini-dome cameras by DVTEL. It has three lens options and is available in high-resolution charge couple device or wide range of images. It also provides high-frame rate and high-resolution with low file size maintenance and less...

  • Intelligence the Key? Mahon, Tim // Military Technology;2013, Vol. 37 Issue 4, p65 

    In this article, the author discusses the counter terrorism strategies. He discusses the importance of technology in developing the intelligence to combat terrorism. According to him, sensor technologies, covert surveillance systems, and powerful computers for code breaking are germane to the...

  • Fingerprint Biometric-based Self-authentication and Deniable authentication Schemes for the Electronic World. Khan, Muhammad Khurram // IETE Technical Review (Medknow Publications & Media Pvt. Ltd.);2009, Vol. 26 Issue 3, p191 

    This paper presents fingerprint biometric-based self-authentication and deniable authentication schemes, which enable a receiver to identify source of the message but not to prove the identity of the sender to a third party. At first, we identify the security flaws of some recently proposed...

  • EYE OF THE BEHOLDER. Buechner, Maryanne Murray // Time International (South Pacific Edition);11/27/2000, Issue 47, p88 

    Focuses on the development of the technology of biometrics as of November, 2000. How it develops security systems based on physical characteristic, such as an iris of an eye, or behaviors to authenticate a person's identity; Use of the technology by companies and government agencies;...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics