Networked Camera Policy 

 

Purpose 

This Networked Camera Policy outlines how networked cameras at the university will be configured and accessed, as well as who is allowed to access networked cameras. 

 

Scope 

This policy covers any camera at the university that has been attached to either the wired or wireless network. 

 

Policy 

Public versus private cameras 

Public networked cameras are those that are intended to be viewed by unauthenticated users.  Private networked cameras are those that are intended to be viewed by authenticated users.  All networked cameras will be treated as private networked cameras unless explicitly identified as public networked cameras. 

Single system for the university for private networked cameras 

There will be a single system for the university for all private networked cameras. 

Network placement 

All networked cameras will be attached to the university network with guidance from the ITS Networking team.  The ITS Networking team has purpose-built subnets for housing networked cameras.   

Configuration requirements 

All networked cameras must be configured to: 

  • Only be accessed via encrypted authentication; 
  • Not use any default passwords; 
  • Have any service accounts configured following the service account requirements in the Password Standard; and 
  • Install new firmware and software within 60 days of release. 

Access to private networked cameras 

Public Safety will have access to all private networked cameras.  Departments will identify specific users who will have access to private networked cameras in their spaces.  Student workers will only be provided with access to private networked cameras with written approval from their supervisor and the Chief Information Security Officer.  Any approvals for student workers require annual renewal. 

Exceptions 

All exceptions to this policy require written approval from the Chief Information Security Officer.  All exceptions require annual renewal. 

 

Appendix 

Definitions and Terms 

Information Technology Resources (ITRs) – This includes, but is not limited to, end-user computing devices, services, networks, email, software, printers, scanners, video distribution systems, telephone systems, fax systems, and other computer hardware and software, whether owned by the university or contracted by the university from a third party. 

 

Revision History 

August 2024 – Policy adopted