Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Learner Materials
These learner support materials for the Working as a CCTV Operator Unit have been
produced by BIIAB for use by BIIAB approved centres and the learners who attend training
courses at these centres.
The learner support materials for the Working in the Private Security Unit can be found in the
Award for Door Supervisors workbook available from BIIAB.
BIIAB approved centres are automatically licensed to use the learner support materials in
any way that they wish including:
Any centre found to be in breach of these conditions will have their licence to use the
materials revoked.
The learner will understand CCTV codes of practice, operational procedures and guidelines
and will be able to:
• Identify the purpose of codes of practice, operational procedures and guidelines
• Identify the impact of codes of practice, operational procedures and guidelines on
CCTV operations
• Identify the value of codes of practice, operational procedures and guidelines to
partners, agencies and the public
• Explain the term “confidentiality” as it applies to the role of a CCTV operator
• State why the control room is kept as a secure environment
• Identify the key features of access control systems
• State the requirements for dealing with authorised and unauthorised visitors to the
CCTV control room
• Describe the operator’s responsibilities within the SIA Standards of Behaviour for
CCTV Operators
Introduction
CCTV is a powerful tool in the security arsenal, but it is also easy to abuse such a tool with
improper use of the cameras. In most cases, CCTV Public Space Surveillance (PSS)
cameras are in areas where the general public can be monitored. It is therefore essential
that the public have a trust in the people that operate the cameras. They must believe that:
• The cameras will be used for the purpose that they were intended
• Any images captured will be stored securely and will be kept for only as long as
necessary
• Only authorised persons may have access to those images.
The Information Commissioner’s Office (ICO) is the UK’s independent authority set up to
uphold information rights in the public interest, promoting openness by public bodies and
data privacy for individuals. In line with this, the Information Commissioner’s CCTV Code of
Practice, Operating Procedure Manuals and Assignment Instructions are all documents that
are designed to provide a framework where the CCTV system is operated effectively and
within the law and as such, provide important guidance to the CCTV operator during their
every day operations. These learner materials will look at each one individually, discussing
the content of each and understanding how each document helps the operator to fulfil their
role.
When CCTV was first introduced into our town centres, many were concerned about the
erosion of civil liberties and the way in which recorded information would be used. In
general, the concerns often related to:
CCTV systems have been used to tackle crime and make public spaces safer. Because of
this and the legal constraints that have been reflected in the CCTV Codes of Practice and
Procedures, the fears and concerns outlined above have generally been allayed.
Purpose
In the case of the CCTV industry the key code of practice is the CCTV Code of Practice,
which is published by the Information Commissioner, and defines the expectations of the
industry under the Data Protection Act. As a result, failure to abide by the Code of Practice is
likely to mean a breach of the Data Protection Act.
Whilst not legally binding, the CCTV Code of Practice may be considered by a court in
relation to the manner in which an organisation acts. It is designed to provide the public with
information as to how the system is managed and some general details about the system
The CCTV Code of Practice will contain a number of points directly taken from the Data
Protection Act and as a consequence, failure to abide by the Code of Practice may mean a
breach of the Data Protection Act 1998. It also provides guidance on good data protection
practice.
The CCTV Code of Practice only gives general information on access control to the control
room, who may view the images and the storing of images including how long images may
be kept, in accordance with the Data Protection Act 1998.
The Data Protection Act and CCTV Code of Practice will be covered in more detail in
Chapter 2.
In the CCTV industry, procedures are available for the completion of documentation and
access to data. Information such as telephone details, call signs and standard shift
objectives are also likely to be included. Procedures manuals tend to be compiled as a
single document and written as a quality assured document. Procedures manuals are private
documents and are generally not available for public scrutiny.
Procedures should be followed, without variation and without fail at all times because they:
By observing the procedures, the CCTV operator will be operating in line with agreed good
practice. CCTV PSS monitoring and the production of evidence are subject to a number of
complicated legal requirements and although CCTV operators are not expected to have a
detailed understanding of the laws, abiding by procedures will ensure that they always work
within the law.
Procedures provide a framework within which CCTV operators, play their part in the efficient
operation of the system, and help to protect them from accusations of malpractice being
made by the public or others.
Assignment instructions are usually created when services including CCTV control room
operations are contracted to a third party such as a security company. The assignment
instructions describe the operational expectations of the client as agreed with the supplier,
listing tasks that will need to be undertaken and any limitations on the duties of a CCTV
operator. They are site specific and important as they are usually contractually binding. They
are not a public document. Assignment instructions are often in a similar format to the
procedures manual.
The content of assignment instructions will vary but are likely to include:
Many CCTV PSS systems, especially major systems, are run by local authorities. In most of
these cases it is normal for the police force to be a partner in the system.
The partners in a CCTV system are not necessarily restricted to a local authority and the
police. Other partnerships may include:
• Local authorities that have chosen to outsource the monitoring of cameras to another
authority or third party
• Local transport companies
• Shopping centres
• Hospitals
• Educational establishments.
1.5 Confidentiality
The term confidentiality is very important when taken in the context of CCTV operations.
It is now included in the SIA Standards of Behaviour which bears reference to the Data
Protection Act 1998.
A CCTV operator must protect the integrity of the system. For example, if there are a
number of cameras in the high street that cannot view a risk area such as cash points at a
nearby bank, this information should never be divulged to any person outside the control
room as it could result in robberies.
CCTV operators have a duty to keep everything that they see and hear in the course of their
duties confidential. For example, if an operator was to observe a known offender committing
an offence, the operator should never discuss this with their friends at the pub in the evening
after work.
The rule is that what you observe does not leave the control room for anything other than
officially sanctioned reasons. There are three main reasons for this:
Failure to observe confidentiality is a breach of the Data Protection Act and may result in an
employer taking disciplinary action.
The control room must be regarded as a secure installation at all times. Admittance should
be restricted, and only those who require access for the purpose of performing services
associated with the operation of the CCTV system should be admitted. The location of the
control room should be treated as confidential.
Computers are used on a daily basis within the CCTV control room environment for a
number or different purposes. They may be used for the recording and storage of images or
simply as a networked system for the recording of information such as:
In addition to the above, computers are being used in place of some or all of the control
room records. Any information that has been obtained by the CCTV operator in the course of
their duty is strictly confidential and should not be disclosed to any unauthorised person.
Any information collected is covered by the Data Protection Act 1998. It is also important to
remember that the images, however recorded, may become the subject of court action and
therefore their security, validity and the ability to show an authentic audit trail will be very
important.
Given the importance of maintaining control room security, whatever means of access
control are in place must be correctly used at all times.
Access control restricts operations by ensuring that only those who are valid are able to
carry out certain duties. The key feature of an access control system is access point control,
which may include:
Any unauthorised visitors who wish to enter the control room must be referred to the
operator’s line manager.
Standards of behaviour exist to ensure that CCTV operators are professional and behave
with personal integrity. CCTV operators have a responsibility to follow these standards to
ensure that they carry out their duties in line with recognised national standards.
Personal appearance
• Wear clothing which is smart, presentable and in accordance with the employer’s
guidelines
• Be in possession of their SIA licence whilst on duty.
General conduct
• Never solicit or accept any bribe or other consideration from any person
• Not drink alcohol or be under the influence of alcohol or un-prescribed drugs
• Not display preferential treatment
• Never abuse their position of authority
• Never bring unauthorised equipment in to the control room
• Never remove equipment from the control room without authorisation.
An operator should comply with the employer’s policies, procedures and objectives. Where a
contracting company is operating a CCTV system for a system owner, policies procedures
and objectives should be agreed as part of the of the contract before taking over
responsibility for the CCTV system.
The learner will understand relevant Legislation and how it impacts on CCTV operations and
will be able to:
• Identify how Data Protection legislation impacts on the role of the CCTV operator
• Identify how Human Rights legislation impacts on the role of the CCTV operator
• Identify the different types of surveillance described by the Regulation of Investigatory
Powers legislation
• State how the main provisions of Regulation of Investigatory Powers legislation
impact on CCTV operations
• Identify authorisation levels required for surveillance operations under the Regulation
of Investigatory Powers legislation
• Explain the main provisions of Freedom of Information legislation
• State how Freedom of Information legislation differs from Data Protection legislation
• Identify how Display Screen Regulations impact on the role if the CCTV operator
• Identify the causes, key indicators and means of alleviating stress
Introduction
A principle of British justice is that everyone is presumed innocent until proven guilty. CCTV
images are being used more and more to fight crime and provide evidence in an effort to
prove guilt. Therefore, systems must adopt policies and procedures to help ensure that all
evidence gathered by CCTV complies with legislation and can be lawfully used in court.
Most important of all the aims is to ensure that Article 6 of the Human Rights Act 1998, the
right to a fair trial, is adhered to at all times. The following are descriptions of the main
legislations applicable to CCTV operations and operators.
The European Convention on Human Rights was originally drafted after the Second World
War, and over 40 countries are now signatories to the convention. Britain was one of the first
signatories in 1953. The European Court of Human Rights was established to interpret the
convention and comprises of judges from countries that are members of the Council of
Europe (this is a different body to the European Union with a broader membership).
The Human Rights Act 1998 was established to clarify the requirements of the Convention
on UK legislation and give people the right to take action against the British Government in
British courts, with appeal to the European Court of Human Rights should that be necessary.
• Local authorities
• Government departments
• Police
• Schools, universities and colleges
• Hospitals
• Charities such as the NCPCC
• Security companies performing duties in courts and prisons
• Contract companies undertaking CCTV monitoring work
• The Crown Prosecution Service.
The rights of a person under the Human Rights Act are defined by the European Convention
on Human Rights. There are 16 areas of the Convention that have been written into the
Human Rights Act. They are:
In addition to these articles of the Human Rights Act 1998, there are other ‘Protocols’ that
add to these Rights:
• Protection of property
• The right to education
• The right to hold free elections
• The abolition of the death penalty.
The Human Rights Act 1998 defines the scope of an individual’s rights in respect of their
relation with the State, and in doing so, places limitations on the state in respect of its ability
to interfere with those rights.
CCTV operators must be aware of the association between Articles 6 (the right to a fair trial)
and 8 (the right to respect for private and family life) of the Human Rights Act. Data
processing must be lawful at all times, and to record an individual’s personal data without
their permission is unlawful. To then use that data as evidence would breach Article 6,
because it had been gathered unlawfully.
Under the Human Rights Act, CCTV operators have a responsibility to ensure that all
monitoring and surveillance that they undertake is proportional, legal and non-discriminatory.
They also have to be very aware of the rights of the individual and take care not to infringe
these rights in any way: For example:
Closely associated with the Human Rights Act 1998 is the Data Protection Act 1998. This
Act supersedes the Data Protection Act 1984 and has brought all aspects of CCTV under its
influence.
The Data Protection Act 1998 controls the processing of all subject data, be that written
and/or images. The Data Protection Act is the first Act of Parliament that has produced strict
controls over the way in which data is used in the CCTV industry. It should be recognised
that the Data Protection Act 1998 is not specific to the CCTV industry and covers a wide
variety of sectors and applications.
Under the Data Protection Act, a person has the right to obtain information personal to
themselves from any data processing system.
The effect of the Data Protection Act 1998 on the CCTV industry
The ground-breaking nature of this Act made it necessary for the then Data Commissioner
(who has since been replaced by a new post called the Information Commissioner) to
produce a CCTV Code of Practice and this document is a very useful document for all
members of the CCTV team. It defines the law as applied to the CCTV industry and it also
provides good practice guidelines where they are available. This document provides
information and guidance to those that are responsible for management and administration
of CCTV.
The Code of Practice also gives practical advice, such as on images captured by CCTV
systems and the impact of the Data Protection Act. The advice is that they should only be
kept for as long as required by the purpose of recording them. For example, images
recorded at a cash machine may be kept for 30 days or more, since suspicious activity may
not come to light until after the victim has received a bank statement. Once the retention
period of images has expired, they should be removed or erased.
• Be adequate
• Be relevant
• Not be excessive.
Data processing can only be achieved if the actions are lawful. This is deemed so in two
ways:
1. The ‘subject’ gives permission to process the data
2. The process is approved in Law.
• The person who will be legally responsible for the scheme must be defined (job title)
• The appropriateness of using CCTV surveillance equipment must be assessed
• The purpose of the scheme must be established - this might include prevention,
investigation and detection of crime, apprehension and prosecution of offenders,
public and employee safety or monitoring the security of premises etc.
Application is made to the office of the Information Commissioner for registration. The
assessment process, purpose of the scheme, responsibility for all aspects of the scheme
and day to day operation by job title(s), security and disclosure policies must be
documented. Equipment should only monitor what it is supposed to monitor, for example:
• Operators must be aware of the purpose of the scheme and are only allowed to use
the equipment for the intended purpose
• Cameras should be restricted so that operators cannot adjust them to overlook
spaces that are not intended to be covered. If restriction is not possible, operators
should be trained to recognise the requirements for privacy
• The DPA states that there must be signs showing the presence of cameras at ‘the
entrance to camera zones’. This offers members of the public the opportunity not to
enter that zone if they do not wish to be captured on camera. Once a ‘subject’ has
entered the designated area, it is considered that they agree to their data being
processed. This is known as ‘implied consent’. All separately owned CCTV systems
should provide signs to show CCTV cameras are present at the entrances to their
premises or property. The DPA does not dictate the shape or colour of signage;
however it does recommend that the size of the signs must be sufficient for persons
to read and understand. Therefore a sign by the roadside should be at least A3 size
to enable motorists or passengers to view it. CCTV cameras are now such a large
part of our lives that the Information Commissioner believes all members of the public
understand that an image of a camera means that CCTV is in operation, therefore it
is not necessary to have these words on the sign if an image is present. However the
purpose of the cameras must be indicated and this is usually done by the words
‘Community Safety and Crime Reduction’ or ‘Crime Prevention and Prosecution of
Offenders’. The name of the system owner must also be on the sign or the logo of
the company or authority. A business time telephone contact number for the CCTV
scheme must be part of that sign. Although not necessary, authorities will often put a
number of signs inside the camera zones to reinforce the deterrent factor and to try
to reduce the fear of crime.
The Freedom of Information Act 2000 is only relevant to Public Authorities and companies
wholly owned by public authorities. This is a slightly different list to that included under the
Data Protection Act as it does not extend to privately owned or charitable organisations
working on behalf of a public authority. The list is extensive but includes:
• Local authorities
• Government departments
• Police
• State maintained schools, universities and colleges
• NHS
• Prison Service
• SIA.
The Freedom of Information Act gives people a general right of access to non-personal
information held by or on behalf of public authorities, to promote a culture of openness and
accountability across the public sector.
The Act allows access to recorded information such as emails, meeting minutes, research or
reports. There are 23 exemptions from the general right of access, relating to such things as
national security, information that would prejudice international relations and commercially
sensitive and confidential information. Court records are also exempt.
Whilst the Data Protection Act relates to the rights of the individual to find out what
information is held about them on computer and within some manual records, and places
controls on how that information is obtained, stored and used, the Freedom of Information
Act tends to gives access to a wider range of information about the operation of the public
body.
The Freedom of Information Act is rarely used in relation to the CCTV sector, although it
might be used by researchers or journalists seeking information on the expenditure and
decisions taken by a local authority in installing a CCTV system.
Whilst the Data Protection Act and the Freedom of Information Act are closely related in the
context of operating the CCTV system, it is the Data Protection Act that is more significant to
a CCTV operator. Indeed, the Data Protection Act 1998 will be the higher authority if
information is requested under the Freedom of Information Act 2000.
The Regulation of Investigatory Powers Act 2000 (RIPA) was introduced to protect police
and intelligence services by making surveillance and similar activities conform to the
principle of ‘legality’ under the European Convention for Human Rights. It controls all types
of surveillance techniques and includes telephone taps, undercover observations as well as
CCTV observation.
The key difference between the Data Protection Act 1998 and the Regulation of
Investigatory Powers Act 2000 as far as the CCTV industry is concerned, is that:
• The Data Protection Act 1998 regulates and controls processing of and management
of images
CCTV systems are not normally within the scope of RIPA since they are overt and not being
used for a specific investigation. However, when a camera is being used for directed
surveillance, the correct authorisations under RIPA will be required. In providing the ‘legal’
means to carry out surveillance against a person in a public or private place and in a vehicle,
RIPA limits the right to privacy in respect of the Human Rights Act and is therefore an
example of a limitation.
Covert Surveillance
This is surveillance that is carried out in a way that helps to ensure that the person who is
the subject of the surveillance is unaware that it is being taken. In order for surveillance to
be of relevance to the RIPA it must be covert. Any covert surveillance of a target must stop
when the subject no longer gives any cause for concern.
Intrusive Surveillance
This is defined as taking place on any residential premises or inside a vehicle or in a way
that information (images) of a quality is gained that the device (camera) may have been
inside those premises or that vehicle.
Directed Surveillance
• Being requested by the police to track, observe and detect the actions of a named
and identified individual(s) whilst they are located within the zone covered by your
CCTV system
• The police have received information that an identified individual is going to take part
in an armed robbery in your area and they wish to use the cameras to keep watch.
This is not direct surveillance if the individual is unknown
• Being asked to watch a named and identified drug dealer’s car, and record all
persons visiting it. This is directed surveillance as the CCTV operator is likely to
obtain personal information about the known drug dealer.
A RIPA authority is not required to observe known ‘hot spot’ areas. For example, if statistics
proved that ‘pick pocketing’ offences were more regularly committed in the High Street
between 10.00 am and 2.00 pm on a Friday, a RIPA would not be required as the system is
not aimed at a particular individual.
Authorisation
Where the police wish to make use of CCTV monitoring in a pre-planned operation (i.e.
directed surveillance) authorisation must be given by a Police Superintendent or above rank.
However, in some circumstances, authorisation for the use of CCTV will be required
immediately and in such cases authorisation may be given by anyone of the rank of
Inspector or above. However, this approval is only valid for 72 hours.
• National Security
• Prevention and detection of crime
• Preventing disorder
• Protecting public health
• In the interests of public safety
The officer must satisfy the following criteria before issuing an authority. The authorisation is
“necessary” and the activity is “proportionate” to what is being achieved. Under Section 80
of RIPA, it is not unlawful to obtain images without authorisation. However, the Human
Rights Act says it is unlawful to act in any way which is incompatible with a convention right
– Article 6 and Article 8. If actions such as the use of camera equipment are unlawful, the
recorded information may be excluded by the Data Protection Act 1998.
The Police and Criminal Evidence Act 1984 and the PACE codes of practice provide the
core framework of police powers and safeguards, established with the aim of creating a
balance between the powers of the police and the rights of the public. PACE is a fairly wide
ranging piece of legislation, mainly dealing with police powers to search an individual or
premises, including their powers to gain entry to those premises, the handling of exhibits
seized from those searches, and the treatment of suspects once they are in custody,
including being interviewed.
Whilst PACE gives powers for literally anything to be seized by enforcement bodies such as
the police, evidence gathering systems which help prove the 'continuity of evidence' must be
adhered to where they have been implemented.
These systems form part of the 'Subject Access' requirements and, unless there is a
provable need for urgency, such as an ongoing threat to life, requests to view data must be a
planned event. An investigating officer will request for images from certain cameras to be
copied to a viewing DVD or tape. An appointment will be made for the investigating officer to
attend at an arranged time to explore the viewing copy. An appointed CCTV operator will
make the 'viewing copy' and store it securely. On the arrival of the officer at the control
facility, they are admitted to a 'viewing suite' where they investigate the image data stored on
the 'viewing copy'. The officer identifies what data is required for evidence and the CCTV
operator then makes a 'working copy' DVD or tape which is sealed in evidence bags and
handed to the officer against signature. At the point that the officer declares 'initial disclose'
the evidence that is used in the investigation, comes under the controls of the CPIA.
The Criminal Procedures and Investigation Act 1996 gives direction to the police and other
investigating bodies as to what evidence gathered during the course of an investigation
must be disclosed to the defence. This basically involves any information coming into the
possession of the investigating authority, whether or not it will form part of the prosecution
but which may be of assistance to the defence.
It is the responsibility of the Disclosure Officer dealing with the incident to decide whether the
contents of the recording would be required to be ‘disclosed’ under the Criminal Procedure
and Investigations Act 1996. This applies to any data/media reviewed by the police during an
investigation.
CCTV operators must remain alert at all times and use all their communication skills and
knowledge to assist them to ‘read’ a situation and make the right decisions. Occurrences
that are monitored should be responded to – if they are ignored it will reduce the value of the
CCTV system.
Responding effectively to the incidents will add to the deterrent benefits of the system,
especially if a terrorist or criminal is testing the system. Operators should therefore ensure
that:
• They are familiar with the geographical layout of the area covered by the system
• Incidents requiring investigation should be brought immediately to the attention of
patrolling staff, management or police
• Sufficient appropriate staff are available to respond to an alert
• Detected terrorist actions should be reported in accordance with the Civil
Contingency Act 2004, insomuch as the appointed site ‘Security Co-ordinator' is
notified and a record of this is preserved
• Suspicious events should be fully noted and recorded for future reference. All
incidents should be entered into a log, which should be handed over to staff when
taking over
• Recorded data relating to a suspicious incident should be carefully reviewed by the
appropriate ‘response forces’, whether this is patrolling security officers, or the police.
• The police are contacted as soon as possible if criminal activity is suspected, using
the 999 emergency system or other direct telephone contacts.
A regular camera patrol is one of the most important duties for a CCTV operator to carry out.
By using the CCTV system effectively, large areas can be covered from the control room.
To make patrolling as effective as possible, there are some useful points to consider:
The Health and Safety at Work Act 1974 states employers must take reasonable care to
protect their employees from risk, unforeseen injury, disease or death at work. The purpose
of the Act is to promote, stimulate and encourage high standards of occupational health and
safety within the workplace. Everyone who uses the workplace must observe the legislation,
as to not do so can lead to criminal sanctions such as unlimited fines and imprisonment.
Television screens and monitors producing pictures are covered by two sets of regulation:
1. Provisions and Use of Work Equipment Regulations 1992. This covers issues such
as lighting requirements in the control room
2. The Display Screen Regulation 1992. This covers issues such as:
- The analysis of workstations to assess and reduce risks
- Ensuring workstations meet specified minimum requirements
- Planning work activities so that they include breaks or changes of activity
- Providing eye and eye-sight tests on request, and special spectacles if
needed. All CCTV operators are entitled to an annual eye sight test paid for
by their employer
- Provide information and training.
Breaks of Vision
A large portion of a CCTV operator’s role will involve monitoring images on-screen.
Constantly looking at a screen can cause the eyes to strain which can also lead to
headaches, eventually resulting in a loss of concentration and/or stress. Although the
images on-screen are constantly changing, other duties that they carry out will automatically
force them to rest their eyes.
If regular breaks aren’t taken, it can result in headaches. Headaches may result from several
things that occur with watching monitors, such as:
• Poor eyesight
• Screen glare
• Poor image quality
• A need for glasses, or a change in prescription
• Stress from the rate of work
• Poor posture
• Dread of new technology.
Certain actions can be taken to reduce eyestrain. Such actions can also help prevent the
operator from getting bored and maintain interest. These actions include:
If more than one operator is present on a shift then breaks can be taken individually, leaving
the system continually monitored. Being aware of when it is crucial that operators are at their
station will ensure that no incidents are missed.
CCTV monitors vary in size, and operators should ensure that they are the correct distance
away from the monitors to view them comfortably, or that they are using the correct sized
monitor. As a general rule the further away the CCTV operator are from the monitor, the
larger the monitor should be.
One way of determining how far away you should be to comfortably view a monitor is based
on the simple formula:
The upper and lower limits will be +/- 25% of the optimum viewing distance.
To determine the upper and lower limits, multiply the optimum viewing distance by 1.25 and
0.75
By using the formula above, you can now work out that a 14 inch monitor should be viewed
effectively at a distance of 7.5 to 12.5 feet.
Stress
CCTV operators have to be able to deal with several incidents at a singular time, prioritise
surveillance and ensure that they carry out all their duties lawfully. Performing all of these
tasks can lead to a CCTV operator having to work under pressure, which in turn can
promote stress. Maintaining a high level of accuracy and reducing stress effectively is key for
the operator if the best results from their system are to be achieved.
Operators should work well with their system manager by communicating about all aspects
of the job – including negative aspects such as witnessing a traumatic incident. Signs of
such stress could include:
• Headaches
• Anxiety
• Increased blood pressure
• Being short tempered
• Being forgetful
• Becoming withdrawn.
The length of time it takes for people to recover from traumatic events will vary dependent on
the person – sometimes this can be short process, other times it can be much longer.
Keeping the workplace in a clean and tidy condition supports health and safety regulations.
The learner will understand the roles and responsibilities of the CCTV operator and other
CCTV staff and will be able to:
CCTV systems are used in many different ways by different organisations and authorities.
There are however three main purposes of CCTV systems:
1. Detecting crime
2. Preventing crime
3. Promoting public safety.
This is reflected in registrations with the Information Commissioner’s Office which typically
and commonly declare that the purposes of use of a CCTV system is for; ‘The prevention of
crime and prosecution of offenders’
• CCTV Owner - The ‘owner’ is just that, they own the system. They employ the operating
staff either directly or as through a third party contractual agreement. They often occupy
the title of ‘Data Controller’ for the purposes of ICO registration.
• CCTV Manager - The ‘manager’ oversees the system and causes the operational
requirements to be identified. They are also responsible for the necessary services and
administration procedures to be adopted to lawfully and effectively achieve the aim of the
system. They are also commonly responsible for managing the employment of staff.
• CCTV Supervisor - The ‘supervisor’ ensures that the system operates in accordance to
the adopted procedures and registered ‘purposes of use’. They may also be required to
set shift patterns and be the front-line link between staff and management.
The CCTV operator is one of today’s most high profile security positions, despite being
relatively new to the security industry.
CCTV operators are expected to work effectively both on their own initiative and as part of a
team, and certainly will have a role to play as part of the larger police and emergency
services family:
These responsibilities are split into four main areas and together constitute the most
important roles that an operator must perform whilst on duty:
1. Screen monitoring
2. Process data
3. Incident reporting
4. Maintain log books.
• Access control
• Message answering
• Switchboard operation
• Key control
• Monitoring of fire and intruder systems
• Monitoring out of hour emergency response service
• Warden controlled schemes (out of hours)
• Liaising with the police and other monitored radio networks.
For the CCTV control room to operate effectively, the CCTV team must work in close
harmony in order to achieve the aims and objectives of the scheme (contained in the
Operating Procedures and Codes of Practice). To ensure that the system runs as smoothly
as possible, it is crucial that information is passed on to all appropriate staff as quickly as
possible.
Any information obtained by the CCTV team during the course of duty, which is stored in the
control room must be treated as strictly confidential and should not be disclosed to any
unauthorised person. (See also Data Protection Act and Freedom of Information Act). All
staff may be required to sign a declaration of confidentiality. System ‘partners’ and ‘visitors’
should be required to sign a Data Protection declaration before admittance is approved.
CCTV operators are very likely to be involved in very serious situations where it is important
to understand the need to pass on information in a timely manner. However, there is also
the need to understand the reporting chain for incidents. This is usually:
When monitoring CCTV systems, the operator is observing events and situations unfold in
real time. Events being observed may include:
• Death or injury
• Loss
• Damage
• Waste
• Illegal activities
• Intimidation
• Anti-social behaviour.
.
The CCTV operator is responsible for communicating issues that arise in a timely manner to
their supervisor, other members of the security team and the emergency services, following
the reporting chain. This will ensure the integrity of the CCTV system and its operators.
The safety and security of others can be dependent upon your actions, and those actions
may form part of any future legal case that might arise from what has been observed, so it is
vital that messages are communicated to the right people, at the right time and in a clear,
concise and informative manner. Remember to keep communication:
Accurate
Brief
Clear
Timely communication is also important to maintain customer care and will enable CCTV
teams to deal effectively and efficiently with any complaints that may arise.
The continuity of evidence chain begins as soon as the CCTV operator is alerted to the need
to preserve images/data. This may be as the result of:
If copies of media are created, operators must complete a 'media log' and record the basic
information that identifies what the data refers to. Information should include:
Some digital systems adopt copying methods that permit the data to be copied to designated
'encrypted folders' on computer hard drives. Proof of such actions can be evidenced using
computer software to support conventional systems used to prove continuity of evidence.
'Hard' media copies, such as DVD or VHS and photographs must be marked in a manner
that identifies the data/imagery, but does not breach human rights legislation or other
legislation. Once suitably marked, the media copy must be stored securely within the
confines of the Control Room suite and access to it is controlled by entries in the media log
which demonstrates documented proof of the location of the media copy. Any further access
of the media must also be recorded
If the media copy has been made a the result of a lawful request, be that from the police,
another recognised 'partner' or the 'subject' themselves, then this information must also be
recorded in the log and evidence to prove that the request was lawful must also be produced
and stored.
'Subject Access Request' forms will be processed through the system supervisory structure
and approved operators will be tasked to search the systems stored data. Identified personal
data of the 'subject' will be recorded into media copies and passed to supervisors for
distribution. All details relating to such searches must be entered in the media log.
Police media requests are subject to the same requirements. Such requests commonly ask
for imagery/data produced from cameras covering all possible angles between 5 to 10
minutes before and after the event is copied. On receipt of the lawful request, operators will
produce media by copying data produced by cameras covering the area between the
relevant times.
It is commonplace that the CCTV operator does nothing more than produce the media copy,
secure it until the investigating officer arrives, when it is taken from storage against signature
to allow the officer to view it.
The produced media, the 'working copy' is then sealed in appropriate containers, labelled
accordingly and then handed to the police officer against signature. This is often referred to
as being 'bagged and tagged'.
As well as recording required details on the labelling, the producing operator must also
record the actions in the media log.
It is important to remember that the all lawfully produced 'data' processed by the 'Data
Controller', belongs to them at all times until it is destroyed. When the police have finished
using the media copy it should be returned to the Data Controller to allow storage or
destruction.
Because of the laws regarding the right for convicted persons to appeal, some data may be
required to be stored securely for long periods. In the event of a 'life sentence' then the
period of retention will be for the life of the convicted person.
CCTV operators may be requested to produce a witness statement describing their personal
involvement in a case. For this reason, it is considered good practice that operators should
be trained to produce their own statements. However, the police will record them for you if
required, especially in complicated or serious criminal cases.
Witness statements are required to comply with Section 9 of the Criminal Justices Act and
will carry a declaration that the evidence you have given is true to the best of your
knowledge and belief. This is to allow statements to be used in the case without requiring the
author (the operator) to attend. However, people charged with committing crime have the
right to contest the accusation and the evidence that is submitted. If an operator’s statement
is contested, the operator will be required to attend the court case as the ‘author’ must be
present before the evidence can be tested.
In such cases, a summons will be posted to the operator, demanding their attendance. This
information should be passed to your supervisor so attendance and shift cover can be
achieved. Operators must make every effort to attend as failure to comply with such a
summons may result in the court taking action against them.
• You will be asked to enter the witness box and take the oath or affirmation
• You will be asked your name and address. In the case of your address, give the
company’s address and not your private address for security reasons
• You may be permitted to refer to notes that you have made at the time or
immediately afterwards, but only if neither party objects
• Try to give evidence from memory. Constantly referring to notes will give the
impression that you are not clear about the events contained within your evidence
• Only give the facts contained within your statement, pocket book or any other
documentary evidence called upon by the court. Your pocket book may only be used
for reference purposes when permission by the court is given. Remember that giving
a false statement (lying) in court is a criminal offence
• Be polite and courteous at all times
• Ensure you face the person asking the questions and turn and face the ‘bench’ (the
Judge or the Magistrate) to give your answers
• If you do not know the answer to a question posed to you or you are unsure of a
particular fact, say so. Do not make things up
• When both prosecution and defence have finished examining your evidence, you will
be excused. You must remain in the court until permission is given for you to leave.
• Pay attention to appearance and hygiene. Courts can be very stressful places and
the body will react accordingly
• Plan the journey to allow punctual attendance
• Read any notes and pocket book entries to refresh memory of the event
In the past, every detail was recorded in an occurrence book. This came from police systems
when each police station had its own occurrence book, and an officer would make
handwritten entries for everything relevant to that station or the officers working there. Logs
are used and are essential to support recorded images and provide an audit trail to prove the
continuity of evidence. In addition to these logs, computer technology may provide effective
audit trails, proving data access and processing.
The learner will understand the characteristics of a CCTV system and will be able to:
In the simplest type of CCTV system, there is a camera that sees a picture. This then
converts the picture into electrical signals that are passed through a cable to a monitor. The
monitor then re-converts the signal and displays the picture seen by the camera.
When we refer to a CCTV system it should be recognised that it does not just refer to the
CCTV operating equipment, but includes all the support services as well. However much
technology develops, operators will always require the response forces (security guards or
police) to respond to requests to attend and deal with incidents.
Similarly, we have to recognise the importance played by the adopted policies and
procedures, in particular the Codes of Practice which is the over-arching mechanism that
helps ensure the legality of the system. When considering the component of a typical
system, the value of all these needs to be recognised.
1. Analogue – which uses VHS tapes and a VHS video recorder to produce media
copies
2. Digital – which uses a computer based hard drive and DVR recorder to produce
digital media copies.
A CCTV operator must carry out functional checks at regular intervals of all the relevant
equipment to ensure that it is all working correctly. Any faults that are found must be
reported as detailed in the assignment instructions.
• Keyboards
• Joysticks
• Cameras
• Monitors
• Recording devices
• Lighting (this should be tested when it is dark).
1. Cable
− Fibre Optics: used to provide the transmission links in the majority of CCTV
systems, either in private networks or through the main British Telecom or cable
company systems. The ease with which the 'fibre' can be installed in existing
ducting often means minimum groundwork or digging
− Coaxial: often limited to very short runs, normally within a building.
− Public Switched Telephone Network (PSTN) and Intergral Services Digital
Network (ISDN) ‘networks’: through British Telecom with ISDN being the favourite
because it offers fast digital transmission against the much slower PSTN
analogue system
2. Airborne
− Microwave, Infrared, FM Radio, Laser links: a large number of airborne links
require “line of sight”, which is not always possible to achieve in one link. This
means that a number of links may be required to achieve the complete signal
from camera to control room.
Cameras
The standard camera used by the industry is the CCD (Charged Couple Device) camera.
The body of the camera itself contains no moving parts, only electronic circuit boards and
the lens of the camera focuses light onto a silicon chip with a photosensitive surface. This
type of camera requires very little maintenance due to the lack of moving parts.
A pan tilt zoom camera (PTZ Camera) is a CCTV camera with remote directional and zoom
control.
1. PTZ stands for pan, tilt, zoom and may refer merely the way that some CCTV
cameras move
2. PTZ may also be used to describe an entire category of cameras where a
combination of sound and/or motion and/or change in heat signature may enable the
camera to activate, focus and track suspected changes in the video field. By
activating only during times of change, systems can notify human monitors and
minimise storage requirements.
The Monitor
Once the signal received from the camera has been converted, it is displayed on a monitor.
Most control rooms have two types of monitors:
Pictures transmitted from the cameras may be received by a multiplexer before they are
passed to the recorders. A multiplexer enables up to 32 separate camera images to be
recorded onto a single recorder. This is achieved by passing a frame from each camera in
turn for recording. When there is a requirement to replay the recorded data, only pictures
from the selected camera are displayed. This provides 'real time' playback.
Another feature of the multiplexer is the ability to simultaneously display a number of image
sources on to a monitor in various formats. However, the more images are displayed, the
smaller and less visible each picture will be.
A Digital Video Recorder (DVR) is a machine which can accept a number of video input
signals, record them in digital format and store them on a hard drive. The industry specialists
have recognised that DVR’s are much more effective than VHS systems and many systems
are being upgraded to digital.
DVR’s also allow systems to benefit from improved technology such as motion detection and
programmed remote operation.
Finally, a major improvement is the production of media copies. VHS tape copies can only
be recorded in real time. DVR’s create copies much quicker by ‘downloading’, ‘burning’,
images to discs using ‘bits’ and ‘bytes’. The greater the capacity of the hard drive, the
quicker the copy is produced, but it must be remembered that any printed or displayed
media image created from the original data will always be defined as a copy.
Video Recorder
Every CCTV system should be able to record all of the pictures seen by all the cameras all
the time. This means that there will often be a number of recorders in the system to be able
to achieve this.
Time lapse video recorders are now available to record from 3-hour mode (real time) to 960
hour (40 days). These allow pictures to be recorded over a much longer period than the
normal 3 hours of a standard 180 minute tape, by only recording a small percentage of the
picture or frames received.
Therefore a tape recording in 6-hour mode will record half the number frames per hour than
a tape that is recording in 3 hour/real time mode. The time-lapse mode used is normally
determined by the shift patterns used by the operators. For example, if operators are
working 9 hour shifts then the recording mode should ideally be 12 hours. The event
Recording Images
Although there are many different CCTV systems in operation, most have a recording facility
linked to a computer system. This computer system will either be recording all of the time or
the operator will activate them once an incident is discovered. Regardless of the system in
place it is essential that the operator is aware of what to do to correctly in order to record the
incident which is unfolding.
The assignment instructions will detail what action an operator has to take in order to
reproduce images for evidential purposes. As for who can reproduce any of the images that
are captured, this may be limited to being a supervisor or designated operator. This is
usually the case with digital recordings, in order to reduce the risk of interference with an
original image.
Degausser
This is a piece of equipment that is use to delete images from analogue video tape by
interfering with the magnetic field on the tape and leaving previously stored data
unrecoverable.
CCTV systems use a number of different technologies to enhance the service offered by the
control room. Some of these include:
Clearly the common interface is with the police and almost every CCTV system has a
dedicated video link with either the force headquarters control room or the local police
station. This will allow police officers to view live images and deploy their staff to incidents
and instruct staff through their own radio systems.
There are many reasons why it is important to have dedicated communication links with third
parties. For example it:
The learner will understand how to make effective use of CCTV equipment and will be able
to:
• Identify the main types of incidents that a CCTV operator may assist with
• Identify typical crime hot spot locations
• Describe how local crime and disorder issues affect CCTV operations
• Explain how CCTV operators interact with third parties during an incident
• Identify the appropriate options available to the CCTV operator when the law is
broken
• Identify ways in which the CCTV operator can assist the statutory enforcement
agencies
• Describe how to recognise an improvised explosive device (IED)
• Explain how CCTV can assist external agencies during a bomb alert
• Explain the reasons for and methods of target selection including equality issues
For a CCTV operator in the private security sector, these may include:
• A fight, or crime
• An accident, an emergency (a non-crime incident)
• A suspicious act, person or vehicle.
Town centre HIGH LOW HIGH LOW LOW LOW MED MED HIGH
Daytime
Town centre N/A HIGH MED HIGH MED HIGH HIGH HIGH HIGH
Night (with shops
closed)
Rear of building N/A LOW LOW LOW LOW LOW LOW LOW MED
whilst in
Operation
Rear of building N/A MED MED MED LOW HIGH MED MED LOW
after hours
Car park N/A LOW HIGH LOW LOW HIGH MED LOW MED
Pubs/night clubs N/A LOW HIGH HIGH HIGH HIGH HIGH HIGH HIGH
Shopping N/A HIGH MED MED MED HIGH HIGH HIGH MED
precincts after
dark (with shops
closed)
Factory / N/A MED LOW LOW LOW HIGH LOW LOW LOW
commercial
premises
After closing
The table on the previous page identifies common ‘hot spots’ for particular types of
criminal activity. Knowing where these hot spots are is important for CCTV operators
as they are likely to need to focus their attention on such areas in order to detect and
prevent crime and to protect public safety.
As the table shows, hot spots change depending on the time of day and the type of
crime. For example, a car parked on an industrial estate on a weekday during
working hours is unlikely to be subject to car crime. However, the same vehicle
parked in the same place at night or over the weekend when there are no people
around is a target for theft and also for joy riders.
With town centres hot spots will also change depending on the time of day. For
example, most pubs are not hot spots for crime on weekday lunchtimes. However, at
1.00 am on a Saturday night, things can be very different with the area directly
outside the entrance to the pub being the focus of any trouble.
If a CCTV operator observes a crime or incident in progress, they should carry out
the following actions:
There will be occasions when you will be required to deal with more than one incident
at the same time. When there is only one operator on duty this can be challenging.
For example, there may be two simultaneous incidents that both require action by a
CCTV operator, and there is only one incident recorder.
• Use real time recording on the incident monitor - this provides enhanced
images which are more useful as evidence
• Let the police advise which incident takes precedence
The same situation will require different actions if there are more than one incident
recorders:
Digital systems can alleviate some of the issues of dealing with multiple incidents.
Computer-based hard drives provide a greater storage ability, recording all the
images produced by all of the cameras. Whilst operators may be challenged to
manage continuous camera coverage, at least all the images produced by all
cameras may be continuously recorded.
The CCTV operator provides a very useful service to statutory enforcement agencies
through their ability to monitor a wide area and detect the potential for criminal
activity. They also assist greatly in managing incidents, through the surveillance and
tracking functionality of the CCTV system and network of cameras available.
• The police – mostly for the prevention and detection of crime. CCTV
operators often spot potential trouble and by pre-warning the police can
prevent escalation. As covered earlier in these learner materials, the police
also use CCTV in specific, targeted operations
• The emergency services – CCTV is an invaluable tool in emergency
situations. It can be used to monitor the movement of people and vehicles to
allow fire and ambulance crews to operate in the most efficient way possible
to protect public safety and reduce harm. A CCTV operative’s knowledge of
evacuation procedures and camera locations is also be invaluable during an
emergency situation
• HM Revenue and Customs, Immigration and the Port authorities – tackling the
trafficking of people, drugs and other contraband is a constant battle for these
agencies and CCTV is very important to enable the tracking of suspects and
the provision of evidence.
• Local Authority – Highways issues. Traffic monitoring. Accidental injury claims
Body language is a very useful method for anticipating incidents and/or criminal acts,
especially as the audio capability of cameras is not used and therefore the operator
cannot hear verbal exchanges that might be happening out in the street.
• A person hiding could mean that they are under physical threat, have been
involved in a fight, or are hiding from authorities due to criminal activity
However, it could b something quite innocent, such as someone playing or
avoiding somebody that they do not want to meet. The operator should scan
the environment to determine who might be searching for the person,
therefore determining whether any further action is required
• Staring could be a sign of aggression. It could be a question of checking out
activity in the immediate location perhaps for criminal activity. The operator
should check out what they are staring at and try to identify why they are
staring
• An aggressive stance could be the sign of impending trouble. Is the
aggressive stance focused at a particular subject or group of people?
• If a person has a defensive stance, the operator should try to determine if the
person is under imminent threat and if so, from what?
• Someone running fast could indicate a misdemeanour or perhaps that the
person is under threat. It could also mean that they are late for the bus. The
operator should observe if anything is being carried and try to identify what
the person is running from, or perhaps to
• A person looking behind them often could be the result of guilt or fear. It
could also be because the person is nervous or uncertain or perhaps even
aware of their own security or vulnerability. Again, the operator should try to
identify the reason for this action
• Exaggerated actions to show innocence could be the result of having
undertaken a misdemeanour. The CCTV operator should try to ascertain
whether there is any activity around the person that would indicate that they
have been involved in a misdemeanour
• Someone taking a repeated route on foot could be walking backwards and
forwards past a potential target. Remember, this might be undertaken over a
short or an extended period of time, perhaps even a few weeks
• Someone taking a repeated route by vehicle, meaning that they are leaving
and returning to the same or similar location, again, over a short or longer
period, could mean that they are ‘staking out’ a target or checking a get away
route
• If close observation is undertaken, quick eye movements may reveal: fear;
agitation, or that the person is getting ready to escape. Other facial
movements should also be observed, such as muscle movements for fear or
anger.
When carrying out close surveillance it is important that the operator is aware of a
number of points that may impact on that particular operation:
Then the operator needs to decide, if the surveillance will be proactive, zoomed in
close onto the target, or if the camera will be in a parked position at a particular
location to record movement.
IED’s are commonly connected with terrorist action. Terrorist crime is a major global
issue, practised by individuals or groups seeking to promote their political, religious
or ideological aims. Despite increased concerns about terrorism it is important to
keep the threat in perspective.
Fortunately violent terrorist incidents are rare and for most of the population,
terrorism will only remain something seen or heard about in the news.
However, CCTV systems can play a major role in the fight against terrorism and
operators should be constantly alert to associated terrorist activity.
An IED can be almost anything with any type of material and initiator. It is a
‘homemade’ device that is designed to cause death or injury by using explosives
alone or in combination with toxic chemicals, biological toxins, or radiological
material. IEDs can be produced in varying sizes, functioning methods, containers,
and delivery methods. IEDs can utilize commercial or military explosives, homemade
explosives, or military ordnance and ordnance components.
They are unique in nature because the IED builder has had to improvise with the
materials at hand. Designed to defeat a specific target or type of target, they
generally become more difficult to detect and protect against as they become more
sophisticated
• Concealment of the device in an object such as a bag or pipe and planted into
position
• Inclusion in a letter or package bomb sent or delivered
• Device placed inside a vehicle
• Explosives strapped to an individual (suicide)
• Projected missile.
CCTV operators will encounter many different situations that require them to make
quick decisions on which action to take and whether or not it is necessary to report
the matter to other agencies. You will also have to decide if the persons involved or
vehicles used have been identified previously as targets and whether or not it is
necessary to track them using the CCTV system.
Even before the Human Rights and Data Protection Acts came into force, equality
was an important factor for all CCTV operators to be aware of and practice when
performing CCTV monitoring duties. The SIA Standards of Behaviour for CCTV
operators highlights this particular point and makes it a condition of employment.
• Gender: concentrating on either men or women because of the way that they
look, or as a result of their sexuality, is not part of the job. CCTV systems
were installed to reduce crime and increase public safety, not to help spot
particular types of individual. If this happens, that individual’s privacy has
been invaded for no legitimate reason, and security has been reduced as the
wider environment is then not being monitored
• Ethnicity: a person’s national origin. People should not be treated any
differently as a result of their ethnicity
• Religion: followers of some religious groups are easily identified due to the
clothes that they wear. Again, these people should not be treated any
differently
The important thing to remember is that the actions or locations of the subject will
determine the period of monitoring, but be aware that it is not necessary to stay
zoomed into the subject unless there is a real need to gather evidence.
The learner will understand emergency procedures in the CCTV control room and will
be able to:
In the event of the access control system failing, the first thing that a CCTV operator
should do is to report to their manager and then monitor all external access points.
Other detailed access control systems failure procedures will be laid down in the
assignment instructions, and may include any or all of the following:
It is unlikely that you or the control room in which you operate will receive a bomb
threat, however, your response will be critical in the event of such an occurrence.
- When the device is due to go off - this must be the first question asked so
that valuable time is not wasted
- Where the device is located - so that it can be found swiftly
- What type of device it is and how will it be detonated - this will assist the
emergency services in dealing with the device
- Why they are doing this - information that can be used by agencies to
evaluate the validity of the call
- If they have a code - some extremist groups will give a code or a coded
warning to the intended victim, which assists in identifying the
perpetrators and assessing the authenticity of the threat
Handy hints
Do:
• Remain calm at all times
• Ask the caller all of the above questions
• Make notes as the call takes place
• Call 999 if the situation is an emergency
• Contact your ‘Security Co-ordinator’ in accordance with procedure
• Evacuate in accordance with procedures
Don’t:
• Become aggressive with the caller
• Treat the call as a hoax
• Try to find the device
• Use your radio or mobile phone until the all clear has been given
• Handle or move the device if it is in view
• Cause panic when raising the alarm
• Evacuate the area until authorised or advised to do so
• Be familiar with the layout of the building or area that is being searched
• Be aware of what they are searching for
• Not alter existing environmental conditions
• Listen for suspicious sounds and be aware of unusual smells
• Be systematic by searching from floor to waist, waist to chin and then chin to
ceiling, in a pattern that covers the whole of the area concerned
• Be aware of the possibility of concealment in false ceilings and floors
• Inspect wall hangings, plants and other decorations
• Not use mobile phones or radio equipment.
There will be clear instructions to follow when an emergency occurs in your control
room. This may be as simple as evacuating the area and assembling at the
evacuation point with others. However, a CCTV operator may be more directly
involved in the event. The evacuation routes and assembly points will be clearly
identified in the control room’s operating procedures or assignment instructions.
Remain focused on the instruction and do not attempt to carry out other tasks.
• Follow instructions
• Undertake any task that has been allocated to you
• Ensure that you know the evacuation procedure
• Proceed to the assembly point
• Remain composed, do not run, do not shout
• Assist others where appropriate and safe to do so.
Once the authority in charge has given the all clear to return to the control room,
there will be an established set of procedures for re-activation. These procedures
are likely to include the following:
• Determine the systems operational status and conduct a full fault finding
routine Re-establish police control contact
• Undertake a new search to determine current situation
• Review recorded data for any unusual occurrences that might have happened
during the period of evacuation
• Update logs to show the elapsed time since the evacuation.
3. Understand the Roles and 3.1 Describe the purpose of a CCTV system
Responsibilities of the CCTV
3.2 Identify the main roles and responsibilities
Operator and other CCTV Staff
within a typical CCTV control room team
3.3 State the importance of accurate and timely
communication up and down the reporting
chain
3.4 Explain the importance of sharing information
between the team and other agencies
3.5 Explain the importance of the continuity of
evidence
3.6 Identify the responsibilities of the operator to
produce statements and give evidence in court
3.7 State the importance of accurate and detailed
note taking and record keeping
4. Understand the characteristics 4.1 Identify the main components of the CCTV
of a CCTV system system
4.2 Describe the main types of CCTV cameras
and mountings
4.3 Describe how technologies such as ANPR,
Biometrics, Visual Recognition, Digital
Recording are used with CCTV equipment
4.4 Explain the importance of dedicated
communication links with third parties
5. Understand how to make 5.1 Identify the main types of incidents that a
effective use of CCTV CCTV operator may assist with
equipment
5.2 Identify typical crime hot spot locations
5.3 Describe how local crime and disorder issues
affect CCTV operations
5.4 Explain how CCTV operators interact with third
parties during an incident
5.5 Identify the appropriate options available to the
CCTV operator when the law is broken