Networked Camera Policy
Purpose
This Networked Camera Policy outlines how networked cameras at the university will be configured and accessed, as well as who is allowed to access networked cameras.
Scope
This policy covers any camera at the university that has been attached to either the wired or wireless network.
Policy
Public versus private cameras
Public networked cameras are those that are intended to be viewed by unauthenticated users. Private networked cameras are those that are intended to be viewed by authenticated users. All networked cameras will be treated as private networked cameras unless explicitly identified as public networked cameras.
Single system for the university for private networked cameras
There will be a single system for the university for all private networked cameras.
Network placement
All networked cameras will be attached to the university network with guidance from the ITS Networking team. The ITS Networking team has purpose-built subnets for housing networked cameras.
Configuration requirements
All networked cameras must be configured to:
- Only be accessed via encrypted authentication;
- Not use any default passwords;
- Have any service accounts configured following the service account requirements in the Password Standard; and
- Install new firmware and software within 60 days of release.
Access to private networked cameras
Public Safety will have access to all private networked cameras. Departments will identify specific users who will have access to private networked cameras in their spaces. Student workers will only be provided with access to private networked cameras with written approval from their supervisor and the Chief Information Security Officer. Any approvals for student workers require annual renewal.
Exceptions
All exceptions to this policy require written approval from the Chief Information Security Officer. All exceptions require annual renewal.
Appendix
Definitions and Terms
Information Technology Resources (ITRs) – This includes, but is not limited to, end-user computing devices, services, networks, email, software, printers, scanners, video distribution systems, telephone systems, fax systems, and other computer hardware and software, whether owned by the university or contracted by the university from a third party.
Revision History
August 2024 – Policy adopted