Security Surveillance Technologies - Operational Policy | UniSC | University of the Sunshine Coast, Queensland, Australia

Accessibility links

Security Surveillance Technologies - Operational Policy

Approval authority
Vice-Chancellor and President
Responsible Executive member
Chief Operating Officer
Designated officer
Director, Campus Development
First approved
5 September 2007
Last amended
21 November 2025
Review date
21 November 2030
Status
Active
Related documents
Linked documents
Related legislation / standards
  • Right to Information Act 2009 (Qld)
  • Public Records Act 2023 (Qld)
  • Information Privacy Act 2009 (Qld)
  • AS 4806.1 – Closed Circuit Television (CCTV) Management and Operation
  • CASA 96/17 - Direction — operation of certain unmanned aircraft
  • Human Rights Act 2019 (Qld)

1. Purpose

1.1 This policy outlines the University’s approach to the use of security surveillance technologies to ensure a safe and secure environment on campus while respecting individual privacy and adhering to legal requirements.

1.2 This policy must be read in conjunction with the Privacy and Right to Information – Operational Policy.

2. Scope and application

2.1 This policy applies to all staff, students, third-party operators and members of the University community responsible for the provision, management and oversight of security surveillance technologies on University facilities and premises.

2.2 This policy applies to the use of various security surveillance technologies, including:

(a) Closed Circuit Television (CCTV);

(b) access control systems;

(c) drones;

(d) body-worn cameras; and

(e) other safety and security applications and hardware.

3. Definitions

3.1 Refer to the University’s Glossary of Terms for definitions as they relate to policy documents. As identified in this policy:

Closed Circuit Television (CCTV): Any visual surveillance device used for security purposes, including cameras that relay images to a screen or monitor and typically result in recordings. This definition also includes other surveillance and recording technologies used for safety and security purposes. This does not include cameras that have been installed in facilities for the purpose of communication or providing support to learning and teaching, unless the cameras are also used for surveillance or security purposes.

4. Policy statement

4.1 The University is dedicated to ensuring a safe and secure environment across all its premises. To support this goal, various security surveillance technologies, including Closed Circuit Television (CCTV), access control systems, drones and body-worn cameras, can be used. CCTV is overtly placed at designated locations throughout the University. These technologies are essential components of our strategy for enhancing public safety and property and information security.

5. Principles

5.1 The University has adopted 5 principles to underpin its approach to the use and management of security surveillance technology across University premises.

5.2 Principle 1: Deter and reduce crime and unauthorised activity

5.2.1 The University uses security surveillance technology to deter, detect, reduce, and investigate crime or unauthorised activity. It also aims to promote lawful and ethical conduct on University premises in accordance with Conduct on University Premises - Operational Policy, while increasing awareness of the likelihood of detection and the potential apprehension of offenders.

5.3 Principle 2: Enhance safety and security

5.3.1 The University uses security surveillance technology to improve the general feeling of safety and security within the University community.

5.4 Principles 3: Protect University assets

5.4.1 The University uses security surveillance technology to safeguard University assets.

5.5 Principles 4: Assist in incident reconstruction

5.5.1 The University uses security surveillance technology to facilitate the factual, accurate, and prompt reconstruction of the circumstances surrounding incidents.

5.5.2 The University can release images upon request to the Queensland Police Service or other law enforcement agencies in accordance with the Information Privacy Act 2009 (Qld). All requests must be made in writing and are approved by the Manager, Security and Emergency Management.

5.6 Principles 5: Adhere with compliance obligations

5.6.1 The University is committed to ensuring that all security surveillance technologies are deployed and operated in full compliance with applicable legal, regulatory, and policy obligations. This includes adherence to privacy, data governance, and safety standards, as well as transparency and accountability in surveillance practices.

5.6.2 Signage and public awareness

5.6.2.1 Clear and prominent signage must be installed across University premises to inform staff, students, and visitors of the presence of CCTV and other surveillance technologies.

5.6.3 Monitor display protocols

5.6.3.1 When surveillance monitors are used as part of a deterrent strategy, selected images can be displayed in publicly accessible areas. In all other cases, access to monitors is strictly limited to authorised personnel.

5.6.4 Privacy and fair use

5.6.4.1 Surveillance technologies must be operated fairly, solely for their intended purposes, and in accordance with relevant Australian and international standards, including:

(a) AS 4806.1 – CCTV Management and Operation;

(b) AS 4806.2 – CCTV Application Guidelines;

(c) AS/NZS 2201.1:2007 – Intruder Alarm Systems;

(d) AS/NZS 62676.1.1:2015 – Video Surveillance Systems;

(e) ISO/IEC 27001:2013 – Information Security Management;

(f) NIST SP 800-53 Rev. 5 – Security and Privacy Controls; and

(g) CASA 96/17-Direction – Operation of Certain Unmanned Aircraft (Drone Use).

5.6.5 Equipment security

5.6.5.1 All CCTV recording equipment must be housed in secure locations, inaccessible to unauthorised personnel. Mobile surveillance equipment must also be securely stored when not in use.

5.6.6 Access control and accountability

5.6.6.1 Access to the SafeUniSC operations room and associated monitoring equipment is restricted to authorised personnel only. Access logs must be maintained to record and audit all interactions with surveillance systems and footage.

5.6.7 Privacy impact assessments

5.6.7.1 Prior to the deployment of any new surveillance technology, a Privacy Impact Assessment (PIA) must be completed in accordance with the Privacy and Right to Information – Operational Policy.

5.6.8 Data governance compliance

5.6.8.1 All systems that collect or retain surveillance data must ensure responsible data stewardship and lifecycle management in accordance with the Data Governance – Operational Policy.

5.6.9 Third-party security surveillance use

5.6.9.1 Third-party operators must submit a request in writing for approval by the Manager, Security and Emergency Management prior to installation of any security surveillance technology.

6. Monitoring and reporting

6.1 The Manager, Security and Emergency Management is responsible for managing the University's CCTV and security surveillance systems including its maintenance, operation and the protection of privacy interests.

6.2 The Manager, Security and Emergency Management is responsible for ensuring that all SafeUniSC officers involved in recording, observation, and image capture are trained on their ethical and legal responsibilities.

6.3 Any misuse of security system technologies and the personal data they capture by staff members are considered a breach of the Staff Code of Conduct – Governing Policy and handled accordingly along with appropriate measures taken to prevent recurrence.

7. Authorities and responsibilities

7.1 As the Approval Authority, Vice-Chancellor and President approves this policy in accordance with the University of the Sunshine Coast Act 1998 (Qld).

7.2 As the Responsible Executive Member the Chief Operating Officer can approve procedures and guidelines to operationalise this policy. All procedures and guidelines must be compatible with the provisions of this policy.

7.3 As the Designated Officer the Director, Campus Development can approve associated documents to support the application of this policy. All associated documents must be compatible with the provisions of the policy.

7.4 This policy operates from the last amended date, with all previous iterations of policy documents on security surveillance technologies are replaced and no longer operating from this date.

7.5 All records relating to security surveillance technologies must be stored and managed in accordance with the Records Management - Procedures.

7.6 This policy must be maintained in accordance with the University Policy Documents – Procedures and reviewed on a standard 5-year policy review cycle.

7.7 Any exception to this policy to enable a more appropriate result must be approved in accordance with the University Policy Documents – Procedures prior to deviation from the policy.

7.8 Refer to University Delegations – Governing Policy in relation to the approved delegations detailed within this policy.

END