Motion capture video privacy and security: technically speaking
These comprehensive measures work together to create multiple security layers that protect all customer data, including any temporarily stored unobscured video, from unauthorized access.
The Industrial Ergonomics software implements a two-tier approach for video privacy protection:
- For face blocking, we use a computer vision-based detection system that identifies facial regions in each frame. We then apply a temporal smoothing algorithm that tracks facial movements across sequential frames, ensuring consistent and stable blocking. The system dynamically calculates an optimal-sized black circular mask based on detected face dimensions and positions it precisely over the facial region.
- For whole-frame anonymization (blurring), we use OpenCV's optimized blur algorithm with a dynamically sized kernel that automatically adapts to the video resolution. This approach ensures effective anonymization while preserving the motion data essential for accurate ergonomics assessments.
Yes, unblurred video is temporarily stored on our secure processing server only during the motion capture and anonymization workflow. This data is immediately and permanently deleted when video processing is complete.
We implement multiple layers of security to protect this temporary data throughout the brief processing period:
- Storage on secure servers with strict access control mechanisms
- Credential-based authentication limited to a small subset of authorized development team members
- Deployment within a private AWS VPN network with no public IP accessibility
- Network isolation to prevent external access to the processing environment
If the customer selects blurring/face blocking privacy features, our strict data retention policy mandates that all original unobscured video be permanently deleted from our secure processing servers immediately upon completion of motion capture processing. We do not maintain backups or archives of original video under any circumstances.
Our automated deletion process uses secure erasure methods to ensure complete data removal. This policy is consistently enforced across all customer data processing operations without exception whenever the customer selects any of the privacy features (blurring/face blocking).
We implement a defense-in-depth security approach to protect all data:
- Secure server infrastructure with strict access controls and authentication requirements
- Credentials provided only to a limited number of authorized development team members with a legitimate need for access
- Network isolation through private AWS VPN deployment, making servers inaccessible from public networks
- Regular security audits and monitoring to detect any unusual access patterns
- Automated logging of all access attempts for security review