Course:
CCTV
Arrow back

There’s more to know about your organisation’s CCTV systems than whether they’re working or not.

CCTV

There’s more to know about your organisation’s CCTV systems than whether they’re working or not.

GCHQ Certified
Included in…
Bob's CultureBob's Compliance
You’ll be able to…

Recognise the best practices of CCTV usage.

React to requests for CCTV footage releases.

Course overview

About the course

Although the appropriate technical protection needs to be taken into account to stop cybercriminals, your organisation requires physical protection too. A CCTV system could be your organisation’s saving grace when it comes to stopping crafty criminals trying to steal your organisation’s information and assets. Still, the data they produce needs appropriate treatment.

CCTV
CCTV

Did you know that photographs and videos of people produced through CCTV systems are classed as personal information? This course will educate your staff on how to keep surveillance footage secure, to whom these images should be used by, and to whom these images may be disclosed to (and under which circumstances).

CCTV
CCTV

Did you know that photographs and videos of people produced through CCTV systems are classed as personal information? This course will educate your staff on how to keep surveillance footage secure, to whom these images should be used by, and to whom these images may be disclosed to (and under which circumstances).

What’s covered

  • Best practices for storing CCTV footage.
  • Why CCTV footage is regulated by data protection legislation.
  • The importance of releasing CCTV footage correctly.
  • How individuals can request CCTV footage that features them.

Learning outcomes

By the time you complete CCTV, you should be able to:

Identify

  • The best practices for storing video footage.
  • The data protection laws which relate to CCTV.

React

  • Subject access requests appropriately.
Recognised excellence

Course accreditations

In association with National Cyber Security Center

The CCTV course is accredited by the National Cyber Security Centre.

Our learning methodology

The Bob’s Business way

Bob’s Business courses are built on the twin principles of behavioural science and psychology to deliver truly exceptional results to organisations of all sizes, across the public and private sectors.

Simple, actionable advice
Simple, actionable advice

We choose to use clear language and simple, actionable advice in our courses to help lock in positive behaviours.

Simple, actionable advice
Simple, actionable advice

We choose to use clear language and simple, actionable advice in our courses to help lock in positive behaviours.

High-quality course design
High-quality course design

Our courses are built in house by our dedicated team and use animations, storytelling and a cast of unique characters for training people actually want to take.

Online learning
Online learning

Every Bob’s Business course is powered by online learning and hosted on an included LMS, which enables users to take our courses at any time, on any device.

Included reinforcement
Included reinforcement

Each course comes with a dedicated Reinforcement Pack, with up-to 18 included materials like screensavers, blog posts, email footers and more to drive home the key messages of each course and help make new behaviours permanent.

Ready to build your cybersecurity culture?

Whether you’re looking for complete culture change, phishing simulations or compliance training, we have solutions that are tailor-made to fit for your organisation.

Girl with laptop
Boy with laptop
Crown Commercial Service Supplier
HM Treasury
ISO 27001
Cyber Essentials Plus
Global Cyber Alliance