What type of technology is this?


De-identified video

collects video footage of a sufficient resolution where individuals can be identified, for example by capturing images of faces or unique numbers such as vehicle license plates. However, the video is processed in a way that removes identifying characteristics before it is used or stored (known as de-identified before first use or de-identified on device), for example by blurring faces using computer vision.

Person detection

refers to when a system can detect the presence of humans in images or videos, and identify where they are located or how many there are in an image, but does not identify individuals. The technology does not retain or use any personally identifiable information.

Motion detector

is a sensor that detects the movement of nearby objects. This project uses motion detection only for lighting and does not capture data.


What is the purpose of this technology?


Planning & Decision-making

Supports the development of future plans; or to enable or measure the impact of a decision. Examples include urban planning.

Research & Development

Supports exploratory research and testing.


How will this data be processed?!


Artificial intelligence

Data that is processed by automated, algorithmic or artificial intelligence systems to derive a new result or data point. Specifically, we use computer vision, which refers to computer science methodologies that enable computers to derive data from digital images or video. We process our de-identified video with the YOLOv8 algorithm.

Reviewed internally

The NSW Government has review processes that consider the potential benefits, risks and implications for privacy and harm for new technologies or data collection activities. The NSW Gov Artificial Intelligence Assurance Framework was completed and the team constantly assesses the data for accuracy and inconsistencies.


How is the data stored?


Cloud storage

Anonymized data is stored on behalf of the organization or the data collector in an off-site data centre.

Encrypted

Data has been encoded so that only authorized parties can access it, which can reduce risk related to handling private or sensitive information.


Who can access this data?


Data

Data is available to the accountable organisation - University of NSW. It is also available to Transport for NSWs as well as to the data collection technology vendors and partners - MIT Leventhal Center for Advanced Urbanism and VivaCity.