Milestone introduces ‘Copenhagen Clause,’ discusses cloud strategy at MIPS 2019
In an age where the value of data is at all-time, issues surrounding privacy and security of user information have been brought to the forefront. This is especially true in the video surveillance industry in which the protection of data being generated by ubiquitous cameras is being increasingly scrutinized by privacy watchdogs and government regulators.
Milestone Systems, one of the world’s leading developers of video management software, took a stand as it relates to the responsible use of surveillance technology, announcing at its annual MIPS (Milestone Integration Platform Symposium) conference in Nashville that it would including a new “Copenhagen Clause” in its end-user licensing agreements.
According to Tim Palmquist, VP Americas at Milestone Systems, the idea behind the clause was born out of the “Copenhagen Letter”, a document published in 2017 and signed at that time by over 150 individuals representing tech companies from around the world that calls for organizations to consider the impact of technology on humans ahead of what it could potentially do for their business or profits.
“We recognize that our technology has never been more powerful than it is today and with that, we should consider some responsible use positions both because of the power of the technology and some of the conversations we’re having globally in the marketplace,” Palmquist says. “We should answer questions, such as who do we sell to? Who do we partner with? And, what is our technology used for?
Though the company initially addressed issues surrounding responsible use of their technology via language included in their end-user licensing agreements in 2008, Palmquist says they decided last year that it was time to strengthen their position and put more focus on what they wanted to say about the subject. In a separate interview with SecurityInfoWatch, Palmquist said Milestone has always had a position on how people should ethically use their technology, however, the development of the Copenhagen Letter gave the company a guide for how they wanted to frame the language in the clause.
The Cloud Journey
Another key theme during keynote addresses at MIPS focused on Milestone’s cloud strategy. Despite reports to the contrary, Palmquist said that the company is not “sitting out” cloud.
“Nothing could be further from the truth,” he says. “We’ve been investing in preparing for the development of the cloud for many years, even sacrificing some of our capabilities to develop our client-server products you understand today.”
Milestone’s dedication to cloud development, according to Palmquist, also extends to all of the companies in the Canon portfolio. “We are in full support of all of the investments by the Canon family of companies on the journey to cloud, including that company in southern California known as Arcules. Their mission is to build new generation enterprise cloud with an IoT framework and they have the opportunity to go fast.”
While Milestone and Arcules may operate independently, Palmquist pointed out that Lars Thinggaard, Milestone’s President and CEO, also serves as Chairman of Arcules. “I don’t think people realize that,” he says. “So even though we’re different entities, we are very connected in our ambitions moving forward.
For their part, Palmquist says that Milestone is taking a more hybrid approach to the cloud that involves helping end-users migrate from the classic client-server environment to cloud-based architectures.
“The definition of cloud is really viewed in many different ways and not exactly well-defined. The journey out of client-server, as we unpack what we understand today, can be really interesting and richly rewarding, he adds. “We think this makes a lot of sense because when you look at the product of today, XProtect, we together sell a lot of licenses and nothing is going to change in that equation tomorrow.”
While the future of surveillance may indeed be in the cloud, Palmquist, using the different versions of Milestone’s own code base as example, emphasized that technology in the security industry lasts for a long time and that it will take some time for the industry, especially in the enterprise environment, to make the transition.
“We recognize as well that it will take many years before cloud, in that iteration, will be able to catch up with the reliability and functionality of client-server as we understand it today,” he says. “That’s a practical reality, meaning that all of this is a journey.”