Purpose
The purpose of this policy is to ensure that Rosco’s Security protects all customer data, system access credentials, video footage, and personally identifiable information (PII) with the highest level of confidentiality, integrity, and security.
This policy supports legal compliance and professional standards within the physical security and IT systems industry.
Scope
This policy applies to:
- All Rosco’s Security employees and subcontractors
- All customer-owned security systems under our service or installation
- Data collected, transmitted, stored, or accessed by Rosco’s Security for:
- Surveillance systems
- Access control systems
- Network security appliances
- Remote support tools and portals
- Surveillance systems
Data Handling Principles
Rosco’s Security adheres to the following principles:
Protection Objective | Actions |
Confidentiality | Only authorized personnel may access system data. |
Integrity | Data must remain accurate and protected against unauthorized changes. |
Availability | Access must be preserved for properly authorized clients. |
Customer data must never be shared with third parties without written authorization.
Access Credentials & Authorization Control
- Administrative credentials must be secured and never emailed in plain text
- Password changes performed by Rosco’s Security will be documented and delivered securely
- Credentials will only be shared with client-designated authorized contacts
- Any credential resets or privilege changes require:
- Written request and
- Identity verification of an authorized client representative
- Written request and
Remote Access Security
- When remote access is enabled:
- VPN, encrypted cloud access, or secure remote tools must be used
- Direct exposure of devices to public internet must be avoided or minimized
- Multi-factor authentication (MFA) will be used whenever supported
- VPN, encrypted cloud access, or secure remote tools must be used
- Remote access may be disabled if security vulnerabilities are identified.
Video Data Sensitivity
- Video surveillance data may contain sensitive operational information, or proprietary activities
- Video exports are restricted to authorized client contacts
- Chain-of-custody procedures apply when footage is provided for legal or investigative purposes
- Video surveillance data may contain sensitive operational information, or proprietary activities
- Retention limits are defined during installation and must be acknowledged by the client
Device & Network Security
- All devices delivered or configured must operate with latest stable firmware
- Default passwords must be replaced with secure passphrases
- Systems must be designed to prevent unauthorized network access (VLANs, firewalls, etc.)
- System logs may be reviewed for diagnostics and cyber security responses
Incident Response
- Security incidents affecting customer data are escalated immediately to Operations Management and documented.
- Clients will be notified promptly if:
- Data breach is suspected or confirmed
- Unauthorized access attempts are detected
- A vulnerability is found that requires urgent mitigation
- Data breach is suspected or confirmed
Client Ownership of Data
- Clients retain full ownership of:
- Recorded video
- Access logs
- Credential databases
- System configurations
- Recorded video
- Rosco’s Security accesses this information only as required for service or support.
Policy Violations
- Any employee or subcontractor who violates this policy may face disciplinary action and removal from projects.
- If client data exposure results from negligence or unauthorized disclosure, additional legal measures may be pursued.
