Information contained in the users' identification cards. The cctv in integration with a biometric computer software, are the ideal reinforcement for these control systems. As presence detection equipment. This can be done in two different ways: the first would be using cctv with a video sensor, through a simple system of delimiting areas within its field of vision. The sensor perceives and detects the variations in light intensity that occur when a body appears in its visual field.
The second would be like simple cctv , in which detection is based on the presence behind the monitor of a control operator. This practice is increasingly e commerce photo editing limited, creating fatigue in the user, since most of the time nothing happens. In cases where it is maintained, the operator usually employs multi-person teams. Thus, shifts of permanent surveillance and rest are established to maintain attention on the monitor. As an evaluator of the alarms and incidents detected . After order int/316/2011 , it is the utility that has grown the most in importance. The cctv is integrated with the detectors located in a certain area. When these emit the alarm and the notice reaches the control center,
the operator can verify the real situation. When observing what is happening, it is checked if the object of the alarm is true or not, and if the corresponding warning is given or not. Legal considerations to finish, we will comment that although cctv is a first level tool for any type of comprehensive security system, we must take into account their limitations. Above all of them, there are the legal ones. A cctv cannot be placed in each and every one of the places where you want it. It is essential to always take into account the provisions related to the protection of personal data . That is, review the " organic law 03/2018 on the protection of