Q&A
Measures to prevent unauthorized access or misuse of surveillance data
1:06:40
ยท
82 sec
Council Member Yusef Salaam asks about the NYPD's methods for preventing unauthorized access or misuse of surveillance data. Deputy Commissioner Michael Gerber explains the department's approach to data security.
- NYPD has baseline data security measures consistent across all surveillance technologies
- Some 'boilerplate' language in IUPs reflects this consistent baseline of data privacy
- Certain surveillance technologies have heightened security measures beyond the baseline
- The level of security varies depending on the nature of the surveillance technology
- Example given of additional privacy protections for court-ordered wiretap information
Yusef Salaam
1:06:40
How does the NYPD actually before I ask this next question I would just like to acknowledge that we've been joined by council member Stevens as well.
1:06:48
How does the NYPD track prevent track and prevent unauthorized access or misuse of surveillance data by officers or external entities?
Michael Gerber
1:06:56
So so I think this this comes up in the IUPs.
1:07:01
And what what you see in the IUPs is there's sort of baseline data security, right, that is consistent across all of our surveillance technology.
1:07:11
And that is, I will say, know, there's talk about boilerplate in IUPs.
1:07:15
There is certain boilerplate language because we do have a baseline of data privacy that exists across all surveillance technologies.
1:07:22
And you would expect frankly to see the same language over and over again because that baseline is the same across the department.
1:07:28
That's a good thing.
1:07:30
Then for certain surveillance technology there's going to be heightened security.
1:07:34
Just to give one example, if you look at our IUPs we discussed the fact that in for information derived from court ordered wiretaps.
1:07:42
Right?
1:07:43
Obviously an incredibly powerful investigative tool that obviously raises incredibly sensitive privacy concerns.
1:07:51
There our IUP will describe additional privacy protections and safeguards on top of on top of the baseline.
1:07:57
But the answer is going to vary somewhat depending on the nature of the surveillance technology.