Refer to important correspondence and other material documents for details on the latest in the security industry.

GDPR fact sheet 2
, ,

General Data Protection Regulation Fact Sheet 2: Operational Privacy

This resource, as part of SIA’s GDPR guidance, shares an overview of operational privacy for security services, key GDPR terms and helpful resources.

Keep Reading »
GDPR fact sheet 1
, ,

General Data Protection Regulation Fact Sheet 1

The Security Industry Association shares General Data Protection Regulation (GDPR) guidelines, questions and answers and resources for security companies.

Keep Reading »
, , , ,

Update on Video Surveillance Procurement Provisions in 2019 Defense Bill (Sec. 889)

This update follows a July 2018 communication to SIA members on a provision under consideration as part of the annual defense bill (National Defense Authorization Act, “NDAA”) that would restrict federal procurement of products and services involving video surveillance, telecommunications and radio communications equipment produced by certain Chinese firms.

Keep Reading »
Section 301 SIA comments

Comments on Latest Proposed Tariffs on Chinese Goods Under Section 301 of the Trade Act

SIA filed comments with the U.S. Trade Representative expressing concerns with the latest series of tariffs proposed by the Trump administration. SIA’s comments detail member concerns surrounding the impact on the security industry from the latest proposal to impose up to 25 percent in additional tariffs on approximately $200 billion in goods imported from China, targeting a number of key security products that are widely imported.

Keep Reading »
privacy profile references
, ,

SIA Privacy Profile References

The Security Industry Association shares General Data Protection Regulation (GDPR) references for physical security and identity in the United States.

Keep Reading »
, , ,

An Information Security Overview

Modern information security doctrine emphasizes multiple concentric rings, creating a multilayered defensive perimeter. This white paper by Adam Firestone explores key data and information security concepts and mechanisms.

Keep Reading »
Back to Top