What is closed circuit television (CCTV)? - Definition from WhatIs.com


closed circuit television (CCTV)

Part of the Security management glossary:

CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.

CCTV relies on strategic placement of cameras and private observation of the camera's input on monitors. The system is called "closed-circuit" because the cameras, monitors and/or video recorders communicate across a proprietary coaxial cable run or wireless communication link.  Access to data transmissions is limited by design.

Older CCTV systems used small, low-resolution black and white monitors with no interactive capabilities. Modern CCTV displays can be high-resolution color, providing the CCTV administrator with the ability to zoom in on an image or track something (or someone). Talk CCTV allows the administrator to speak to people within range of the camera's associated speakers.

CCTV is commonly used for a variety of purposes, including:

  • Maintaining perimeter security.
  • Monitoring traffic.
  • Obtaining a visual record of human activity.

The use of CCTV surveillance in public places has fueled privacy concerns in many parts of the world.


Learn more

Wikipedia has more information about closed-circuit television.

The Home Office in the U.K. put out this report on the effectiveness of CCTV.

Ron Condon explores the question of whether CCTV systems can stop employee theft.

This was last updated in March 2011
Contributor(s): Lasse Pedersen
Posted by: Margaret Rouse

Related Terms


  • access recertification

    - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and co... (WhatIs.com)

  • access governance (AG)

    - Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts. (WhatIs.com)

  • email spoofing

    - Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. (SearchSecurity.com)


  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About closed circuit television (CCTV)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.