GLOSSARY of SECURITY TERMS

Size: px
Start display at page:

Download "GLOSSARY of SECURITY TERMS"

Transcription

1 GLOSSARY of SECURITY TERMS ACAMS (Access Control and Alarm Monitoring System) An electronic system or network of integrated systems designed to control physical access and monitor events such as intrusion. Access Card A card, generally the size and shape of a credit card, containing encoded data. The data can be encoded in a variety of ways, sometimes including more than one encoding technology. (i.e. Magnetic Stripe, Proximity, Smart Card, Wiegand.) Access Control The physical process of controlling who can access an area and when determined by what they have (an access card), what they know (a PIN), and/or something they are (biometrics). ACU (Access Control Unit) An electronic control panel to which readers and alarm devices are wired. The ACU can be a standalone unit or wired to a CPU. Anti-Passback The process or software control that prevents a user from allowing someone else to utilize his or her access card to enter a specific access controlled point while the user is in the protected area. Typically this control is used in parking garages and high-security areas. AHC (Architectural Hardware Consultant) A certified consultant with expertise in the design of doors and door locking hardware. AHC s are typically employed by an architect to prepare hardware specifications Biometrics A family of products that electronically scans or reads unique traits of the human body for verification or identification purposes. Biometrics can utilize unique patterns of the iris, retina, hand geometry, or fingerprint. Biometric Reader A device that stores enrolled templates of a unique human trait such as a fingerprint, hand geometry, voice, or retina pattern and looks for a match against a live presentation, to grant access to a secure area. Used as an alternate to card readers. CDT (Construction Document Technology Certification) The Construction Documents Technology (CDT) Program provides a comprehensive overview for anyone who writes, interprets, enforces, or manages construction documents, and specifically CSI specifications. Project architects, engineers, contractors, contract administrators, material suppliers, and manufacturers representatives are all realizing the advantages of being Construction Documents Technologists. By being able to understand and interpret written construction documents, CDTs perform their jobs more

2 effectively. By understanding the roles and relationships of all participants, CDTs improve communication among all members of the construction team, and facilitate a more comprehensive, better coordinated design, with significantly fewer problems and changes during construction. CPP (Certified Protection Professional) The Certified Protection Professional (CPP) designation is acknowledged as the security profession's highest recognition of practitioners. It is awarded based on experience and passage of an examination that provides an objective measure of an individual's broad-based knowledge and competency in security management. Digital Signal Processing (DSP) Digital signal processing (DSP) refers to various techniques for improving the accuracy and reliability of digital communications. DSP works by clarifying, or standardizing, the levels or states of a digital signal. A DSP circuit is able to differentiate between human-made signals, which are orderly, and noise which is inherently chaotic. In security, DSP is deployed in signaling devices such as motion detectors to minimize false alarms, and surveillance cameras to improve image quality. Digital Video Recorder (DVR) Digital Video Recorder is the industry standard term applied to standalone and PC-based systems that record video images to a computer hard drive providing high quality recording. DVR s provide a quicker method of retrieving the recorded information unlike media such as VHS tapes and other equipment that stores information in a sequential manner. Disarm The act of disabling or shunting a security system or portions of the system to ignore input signals that normally result in alarms. Disarming can occur with user intervention, such as pass codes entered into a keypad, or on schedule through a PC based Access Control System. Door Control Relay The relay used to control the unlocking and locking functions of door hardware in an access control system. Door Forced A door forced alarm is the resulting logical alarm that occurs at a portal when the door is sensed to be in an open state without an associated valid access card transaction or an associated REX signal. Door Held A door held alarm is the resulting logical alarm that occurs at a portal when the door was opened after a valid access transaction or a valid. Door Held Time The length of time that a portal can remain open after a valid access transaction or valid REX signal before a door held alarm is generated. (Also Door Open Time.) Door Switch Monitor (DSM) or Door Contact

3 A device, typically a magnetic based contact, installed in a door to detect the position of the door. The signal from a DSM is connected to a security system to report conditions such as FORCED and HELD and in instances where electrified locking hardware is included, relocking of the door. Dual Technology Utilization of two different technologies in one device to increase reliability and functionality. Dual technology motion sensors, for example, use both passive infrared and microwave technology in order to reduce false alarms and increase detection. Duress Alarm A device, such as a push button or pull station, connected to a security system to signal an alarm when an individual is threatened or forced to do something. Bank Clerks typically have a duress alarm installed beneath their counter to signal robbery attempts. Exit Device Locking hardware designed to allow immediate exiting at all times, and does not require lever or knob rotation. Usually located on the perimeter doors of a building and always in the designated means of egress route. Sometimes referred to as panic hardware, the touchpad feature of the device allows doors to unlock and open by simply leaning on it Fail-Safe A lock that defaults to the unlocked position when power is removed. Requires power to go to a locked position. Fail-Secure A lock that defaults to the locked position when power is removed. Requires power to go to an unlocked position. Host Panel In a security system, an access control unit (ACU) that primarily provides services such as decision making, data base access, or special programs; the primary or controlling panel in a multiple ACU installation. Interlock A pair or group of separate doors equipped with a control system that prevent the simultaneous opening of more than one door at a time. Clean rooms typically include an entry vestibule with a two door interlock that prevents opening the clean room door until the entry to vestibule door is fully closed and vice versa. Isolation Relay A relay used to isolate two different systems that must integrate with one another through contact closures, or when the controlling systems relays are underrated for the load. Keypad A device that provides a localized user interface to control a security system or subsystem. Typically includes a numerical 10-key touchpad to allow entering of passcodes and commands.

4 Local Audible Alarm (LAL) A device used to annunciate locally an alarm condition or security violation. Locking Hardware Locking hardware is considered to be the electrified lock that controls a portal. Typical hardware includes electrified locksets, either mortise or cylindrical, electric strikes, electrified panic hardware, and magnetic locks, either face-on or shear. Mag Lock Fail safe devices that require constant power to remain locked. They are comprised of a lock body, typically mounted to the door head jamb, and an armature plate which is mounted on the door stile. The armature plate is a passive piece of steel that pivots on its mount, and when aligned with the lock body in its powered state, is magnetically drawn together. Some mag locks are capable of providing up to 2000 lbs of holding force. Magnetic Stripe The black or brown stripe that you see on your credit card, airline ticket or access card. The stripe is made up of tiny magnetic particles in a resin. The magnetic property of the stripe allows it to be encoded with a number of bits. In access control this data would include a facility code and card number. Man Trap A method used to provide strict access control by preventing access at one specified entrance while another entrance is being utilized. Typically two doors, separated by an enclosed spaced, are interlocked. When one door is opened the second door is incapable of being opened. Matrix Switch A video switcher that provides a scalable number of video inputs and monitor outputs, allowing routing of any available input signal to any output signal (crosspoint switching). Matrix switchers are usually located at a security operations center where all video concentrates and will display on multiple monitors. Users control the matrix via a joystick keyboard that allows switching and pan tilt zoom control of domes. Optical Turnstile An access control portal that utilizes optical beams (infrared sensors) to prevent tailgating and to grant or deny access into a facility. Units can control single or bidirectional pedestrian access. Passive Infrared (PIR) Typically, a sensor device that can sense movement within a specific area and change the state of a set of internal contacts as a result. These contacts can then be wired to a Request to Exit point of an Access Control System for automated egress shunting when a person approaches an Access Point from inside a protected area. PIRs are also common burglar alarm sensors. PE (Registered Professional Engineer)

5 Professional Engineer, refers to a person engaged in the professional practice of rendering service or creative work requiring education, training and experience in engineering sciences, as well as the application of special knowledge of the mathematical and physical sciences. A Professional Engineer is typically engaged for consultation, investigation, evaluation, planning and design of buildings or projects, and supervision of construction for the purpose of securing compliance with specifications and drawings for any such work. When your project requires the services of an engineer, be sure that he or she is properly licensed by the California Department of Consumer Affairs. Unlicensed persons are allowed to offer or perform professional engineering services only if they are working under the direction of a licensed engineer. Electrical engineers design the electrical systems in commercial buildings, educational facilities, and other projects. Electrical engineering generally includes the design of power distribution, lighting, communications, and other electrical based systems. For further information, go to: Portal A controlled break in a barrier between a more public and a more private space. The control could consist of a card reader on a locked access controlled door. Programmable Logic Controller (PLC) A Programmable Logic Controller is a rugged, special purpose computer that reads input signals, runs control logic, and then writes output signals according to its programming. Proximity In access control terms, proximity refers to presenting an access card within the reader s Radio Frequency (RF) field without having to make actual physical contact with the reader itself. Proximity Reader A reader that employs a radio frequency link between the reader and the card also known as prox reader and prox card). Encoded information is passed between the card and reader, usually supplying a unique pattern enabling identification of the cardholder. Reader A device a cardholder presents his access card to that will read the card's encoded data and transmit it to an access control unit (ACU). The ACU then make a decision as to what action to take as a result of that card read. Request to Exit (REX) A device used to disable a door alarm, thus allowing valid exit through an access controlled door. Usually a motion detector but can also be a pushbutton. Security Equipment Enclosure (SEC) A cabinet or enclosure containing security equipment or controls. Security Operations Center (SOC) The central commanded center location where security personnel monitor and respond to security and safety related incidents.

6 Shear Lock A type of magnetic lock installed flush in the head jamb of a door frame. The shear lock differs from a standard magnetic lock in that the holding force is based in the lateral -- or shear -- movement of the armature plate away from the lock body, rather than opposing tension direction. Smart Card A card containing a microchip that can store significantly larger amounts of data than a standard magstripe or proximity card. Bank account details, Social Security Numbers and employee identification numbers are examples of data that can be stored on a Smart Card. Storeroom Function The type of lock function most often specified on access control doors. The Storeroom Function lock is always locked from the unsecure side. If a key is used to open the door the lockset will always return to a locked state once the key is removed. This is referred to as a nightlatch by some manufacturers. Supervision The electronic process of continually metering the integrity of an electrical circuit that connects signaling devices to a processing host panel. Supervision can measure up to 5 conditions and typically checks for shorts, open loops, and power failures Tailgating Following an authorized and credentialed person through an access control point without having or using a separate valid credential. Turnstile A physical barrier device used to manage pedestrian traffic flow and access control at a security checkpoint. Wiegand A communication protocol widely accepted as an industry standard in the manufacturing of access control equipment. Wiegand data is typically the protocol used between the reader and the host panel.

Understanding Access Control

Understanding Access Control Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

System components portfolio overview. Power supplies, electromagnetic locks, electric strikes and system accessories

System components portfolio overview. Power supplies, electromagnetic locks, electric strikes and system accessories System components portfolio overview Power supplies, electromagnetic locks, electric strikes and system accessories Our comprehensive commercial portfolio includes everything you need to hang, protect,

More information

TABLE OF CONTENTS. Introduction 1. Components of a System 2. Door Control Hardware 3. Request to Exit Devices 5. Credential Technology 6

TABLE OF CONTENTS. Introduction 1. Components of a System 2. Door Control Hardware 3. Request to Exit Devices 5. Credential Technology 6 TABLE OF CONTENTS Page Introduction 1 Components of a System 2 Door Control Hardware 3 Request to Exit Devices 5 Credential Technology 6 Controller Panels 8 WEB Based Systems 9 Retrofitting and Upgrading

More information

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

Doc 10. UTM Standards: Card Access Security System

Doc 10. UTM Standards: Card Access Security System Doc 10 UTM Standards: Card Access Security System 1. GENERAL... 2 1.1. GENERAL REQUIREMENTS.... 2 1.2. SUMMARY OF WORK INCLUDED... 2 1.3. OVERVIEW... 2 1.4. MANDATORY REQUIREMENTS... 3 1.5. ACCESS CONTROL

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES PART 1 DESIGN DIRECTIVES 1.1 OVERVIEW SECTION 13825 SECURITY MANAGEMENT SYSTEMS A. The access control, surveillance, and intrusion detection system implemented for use at Dartmouth College is a Lenel International

More information

AC-115 Compact Networked Single Door Controller. Installation and User Manual

AC-115 Compact Networked Single Door Controller. Installation and User Manual AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.

More information

SECTION 13850 DETECTION AND ALARM

SECTION 13850 DETECTION AND ALARM SECTION 13850 DETECTION AND ALARM PART 1 GENERAL 1.01 SUMMARY A. Section Includes 1. Control Panel 2 Associated Equipment B. Products Installed But Not Supplied Under This Section 1. Section 16140 - Wiring

More information

Harris County Fire Code Electronic Lock Procedures

Harris County Fire Code Electronic Lock Procedures Harris County Fire Code Electronic Lock Procedures Based on the current adopted edition of the International Building & Fire Code with Harris County Amendments For New Electronic Locking Systems March

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

Tradition of quality and innovation

Tradition of quality and innovation Bosch Security Systems 130 Perinton Parkway Fairport, New York 14450 phone: 800.289.0096 fax: 585.223.9180 www.boschsecurity.us All rights reserved Printed in U.S.A. Part # F01U008588B Tradition of quality

More information

Comprehensive Security with one Powerful System. G Series integrated security, fire and access control panels

Comprehensive Security with one Powerful System. G Series integrated security, fire and access control panels Comprehensive Security with one Powerful System G Series integrated security, fire and access control panels 2 3 Designed for Flexibility Bosch s G Series panels provide the ultimate in security controls

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

Your Canadian Security Specialists. Eddie D Orazio

Your Canadian Security Specialists. Eddie D Orazio Your Canadian Security Specialists Eddie D Orazio Commercial Sales Structured Security Systems Toll Free: 1-888-693-1118 Tel: 905-640-0069 Fax: 905-576-2836 Mobile: 905-424-0050 eddie.dorazio@structuredss.com

More information

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4 Complete Security One Powerful Solution GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4 2 Complete Control GV4 panels are the product of choice for many of the

More information

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training) TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:

More information

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS 500-54 Administrative Procedure 542 SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS Background Recognizing the significant investment in buildings, grounds, supplies and equipment, the District has a responsibility

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

integrated fire and security solutions Maximum protection for buildings

integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Johnson Controls: expert qualified in building protection Johnson Controls is the recognised

More information

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

Table of Contents - 3 -

Table of Contents - 3 - Table of Contents Glossary of Common Electrified Locking Terms 4 Locking & Latching Mean Different Things 5 Common Electrified Locking Solutions 6 Mortised Electric Strikes for Frame or Inactive Door 6

More information

Element D Services Electrical

Element D Services Electrical Security Systems PART 1 - GENERAL 1.01 OVERVIEW A. The objective for each security design element is to help MD Anderson meet its mission and vision by promoting an environment in which higher education,

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

DIVISION 28 ELECTRONIC SAFETY AND SECURITY DIVISION 28 ELECTRONIC SAFETY AND SECURITY CENTRALLY MANAGED ELECTRONIC ACCESS CONTROL, VIDEO SURVEILLANCE, AND INTRUSION ALARM SYSTEMS 1. All questions on equipment approvals in this section shall be

More information

Understanding Alarm Systems

Understanding Alarm Systems Understanding Alarm Systems A false alarm occurs when an alarm signal designed to elicit an immediate emergency Law Enforcement, Fire, or Medical response is activated, when in fact no emergency exists.

More information

Access Control Glossary

Access Control Glossary Access Control Glossary 125kHz Radio transmission operating at 125 thousand cycles per second. This technology has historically been the standard for proximity cards/readers 128 Bit AES A specification

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS

DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS Features: INSTALLATION Install in accordance with NFPA 70. DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS Up to 1.95 Amps Load Capacity Class 2 Rated Outputs Overload, Over Voltage, and Short

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Two-way communication, keep checking the commnunication between the panel and accessories, make sure the system safer.

Two-way communication, keep checking the commnunication between the panel and accessories, make sure the system safer. Innovative GSM & WIFI dual network operating platform. On WIFI network, the alarm system will work without any fee. If no WIFI, it will work on GSM automatically. With state-of-the-art WIFI network technology,

More information

MANAGEMENT SOLUTION (P.A.M.S.)

MANAGEMENT SOLUTION (P.A.M.S.) DOORKING SYSTEMS ACCESS CONTROL SOLUTIONS PERIMETER ACCESS MANAGEMENT SOLUTION (P.A.M.S.) Revision N, updated 01.12 PERIMETER ACCESS MANAGEMENT SOLUTION (P.A.M.S.) Design Concept How the System Works TYPICAL

More information

EQUIPMENT SPECIFICATIONS

EQUIPMENT SPECIFICATIONS EQUIPMENT SPECIFICATIONS IC-1600 Intelligent Controller The IC-1600 Intelligent Controller is a fully intelligent panel that has a complete database on board. It operates in conjunction with the Access

More information

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM GENERAL: To provide minimum standards for Access Control Systems. PART 1 Common Work Results for Access Control System 1.1 Owner will provide server and software for connecting control panels through the

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

B. Division 16 Basic Materials and Methods sections apply to work of this section.

B. Division 16 Basic Materials and Methods sections apply to work of this section. SECTION 28 05 00 PAGE 1 SECTION 28 05 00 INTRUSION DETECTION PART 1 - GENERAL 1.1 RELATED DOCUMENTS: A. Drawings and general provisions of Contract, including General and Supplementary Conditions apply

More information

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems Content Introduction Preventing unauthorized access by perimeter surveillance Monitoring unauthorized access by indoor surveillance

More information

Security Systems Intrusion Alarm

Security Systems Intrusion Alarm Dufferin-Peel Catholic District School Board STANDARD TEXT GUIDELINE FOR Security Systems for SECONDARY AND ELEMENTARY SCHOOLS Prepared by the Plant Department With Assistance from Vision Dynamics Formatted

More information

A VOLUTION. S series. Avolution S Series Security System. ASSA ABLOY, the global leader in door opening solutions

A VOLUTION. S series. Avolution S Series Security System. ASSA ABLOY, the global leader in door opening solutions A VOLUTION TM S series Avolution S Series Security System ASSA ABLOY, the global leader in door opening solutions We know securing and safeguarding your home, family and your business is important to you

More information

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution

More information

1.2.3. Types of Verification. Two broad forms of verification may be employed. These include:

1.2.3. Types of Verification. Two broad forms of verification may be employed. These include: Alarm Verification and Notification Procedures (CS-V-01) 1. Scope and Use This standard has been prepared under the direction of The Security Industry Standards Council (SISC) members with the participation

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 13 00 SECURITY AND ACCESS CONTROL SYSTEM

DIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 13 00 SECURITY AND ACCESS CONTROL SYSTEM DIVISION 28 ELECTRONIC SAFETY AND SECURITY PART 1 GENERAL 1.01 DESCRIPTION A. Division 28 Contractor shall extend a complete Matrix Systems Access Control System as shown on the Drawings and as specified

More information

Solution Ultima ICP-CC488 Home security you can rely on

Solution Ultima ICP-CC488 Home security you can rely on Solution Ultima ICP-CC488 Home security you can rely on Keeping your home and family safe doesn t need to be complicated. That s why we ve made the Ultima security system so easy to use all it takes is

More information

Overview. Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products

Overview. Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products Basic Security 101 Overview Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products Components of an Alarm System Main Control

More information

A specifier s guide to access control systems

A specifier s guide to access control systems A specifier s guide to access control systems October 2012 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk

More information

ACX 780, ACX 781 Access Control Units and Expansion Module

ACX 780, ACX 781 Access Control Units and Expansion Module Infinity ACX 780, ACX 781 Access Control Units and Expansion Module The Infinity ACX 780 is a programmable, stand-alone access controller that is a basic building block of the Infinity Security Management

More information

Performance/Acceptance Testing of Access Control Systems 1

Performance/Acceptance Testing of Access Control Systems 1 Performance/Acceptance Testing of Access Control Systems 1 These tests and procedures will check and provide assurance that the access control system components are functioning at a known performance level

More information

Destiny 4100. Destiny 4100. Owners Manual

Destiny 4100. Destiny 4100. Owners Manual Destiny 4100 Destiny 4100 Owners Manual TABLE OF CONTENTS INTRODUCTION Control Panel...3 Detection Devices...3 Telephone Keypads...3 GLOSSARY... 4-5 LOCAL PHONE ACCESS Using Your Telephones As Keypads...6

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

Securing your school. Door hardware solutions for primary education

Securing your school. Door hardware solutions for primary education Securing your school Door hardware solutions for primary education Security at every layer Successful school operation combines a safe and secure environment with the freedom needed to focus on education.

More information

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12 Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

THE RESOURCE FOR UNMATCHED SERVICE AND EXPERTISE.

THE RESOURCE FOR UNMATCHED SERVICE AND EXPERTISE. THE RESOURCE FOR UNMATCHED SERVICE AND EXPERTISE. DOORWAY SOLUTIONS, a division of Colorado Doorways, Inc., specializes in sales, installation, and servicing of all commercial and institutional door openings.

More information

Appendix A - Cost Estimate Spreadsheet

Appendix A - Cost Estimate Spreadsheet CCTV Camera, PTZ Per Each $18,500 $1,250 12 $33,500 Closed circuit television (CCTV) camera with pan, tilt, zoom (PTZ) functionality in a dome enclosure. CCTV Camera, Fixed Per Each $14,000 $1,250 12 $29,000

More information

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property.

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property. Department of Homeland Security Management Directives System MD Number: 11030.1 Issue Date: 04/21/2003 PHYSICAL PROTECTION OF FACILITIES AND REAL PROPERTY I. Purpose This directive establishes Department

More information

Solution Ultima ICP-CC488 Home security you can rely on

Solution Ultima ICP-CC488 Home security you can rely on Solution Ultima ICP-CC488 Home security you can rely on Keeping your home and family safe doesn t need to be complicated. That s why we ve made the Ultima security system so easy to use all it takes is

More information

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints Error Rate False Reject Rate

More information

Intelliguard 5800/5900/5924. Application Guide

Intelliguard 5800/5900/5924. Application Guide Intelliguard 5800/5900/5924 Application Guide C Version and DSCC Version Update January 1997 HOME & BUILDING CONTROL Security Monitoring HONEYWELL PROPRIETARY Note: THIS APPLICATION GUIDE IS THE PROPERTY

More information

INTEGRATED SOFTWARE SOLUTIONS

INTEGRATED SOFTWARE SOLUTIONS INTEGRATED SOFTWARE SOLUTIONS 1.0 INTEGRATED SOFTWARE SOLUTIONS > B.A.S.I.S. ET650 from Stanley Security Solutions combines flexibility with enormous capabilities. Using a single database server and a

More information

Honeywell s WIN-PAK Access Control SystemGuide Specifications in CSI Format. www.honeywellaccess.com SECTION 281300

Honeywell s WIN-PAK Access Control SystemGuide Specifications in CSI Format. www.honeywellaccess.com SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network-enabled access control system for security management, including engineering, supply,

More information

If you ve been waiting for uncompromising. wireless intelligence to show up at your. door, Wi-Q Technology has just arrived.

If you ve been waiting for uncompromising. wireless intelligence to show up at your. door, Wi-Q Technology has just arrived. If you ve been waiting for uncompromising wireless intelligence to show up at your door, Wi-Q Technology has just arrived. Developed and patented by Stanley Security Solutions, Wi-Q Technology is quickly

More information

We suppy surveillance equipment, wireless security systems, CCTV surveillance camera, access control security systems, service provider of system

We suppy surveillance equipment, wireless security systems, CCTV surveillance camera, access control security systems, service provider of system We suppy surveillance equipment, wireless security systems, CCTV surveillance camera, access control security systems, service provider of system integration. Also into indigenous product development works

More information

Security Management System

Security Management System Security Management System Schlage Security Management System High Security Enables you to maximize the effectiveness of multiple security applications in one powerful system Allows transactions, associated

More information

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate

More information

GT Series. Multi-Tenant Security Intercom. Architectural and Engineering Specifications

GT Series. Multi-Tenant Security Intercom. Architectural and Engineering Specifications GT Series Multi-Tenant Security Intercom Architectural and Engineering Specifications 13702-1 SECTION 13711 MULTI-TENANT ENTRY SECURITY SYSTEM Logo Display hidden notes to specifier by using Tools / Options

More information

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD. MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard

More information

VR8. User Guide Intruder Alarm System

VR8. User Guide Intruder Alarm System VR8 EN User Guide Intruder Alarm System VR8 User Guide Notices EN 2 Copyright Notice Unless otherwise indicated, this publication is the copyright of Bosch Security Systems Pty Ltd ( Bosch ). All rights

More information

Securing Remote and Outdoor Assets Using Video Verification

Securing Remote and Outdoor Assets Using Video Verification Securing Remote and Outdoor Assets Using Video Verification About CRC 24/7, utility-focused Contact Center and Central Station specializing in: Consumer Call Handling, Line Crew Dispatch, and Alarm Monitoring.

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

DIVISION 28 ELECTRONIC SAFETY AND SECURITY DIVISION 28 ELECTRONIC SAFETY AND SECURITY CENTRALLY MANAGED ELECTRONIC ACCESS CONTROL, VIDEO SURVEILLANCE, AND INTRUSION ALARM SYSTEMS 1. All questions on equipment approvals in this section shall be

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Security, Access Management and Key Control Policy and Procedures

Security, Access Management and Key Control Policy and Procedures 1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment

More information

2.0 Installation 1. Remove the cover using a small flat blade screwdriver. Figure 2: Cover Removal

2.0 Installation 1. Remove the cover using a small flat blade screwdriver. Figure 2: Cover Removal O N DS160/DS161 Installation Guide High Performance Request-to-Exit Sensors 1.0 Description The DS160/161 is a passive-infrared (PIR) detector designed for Request to Exit (REX) interior applications.

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

COMBINE BURGLARY AND FIRE PROTECTION WITH ACCESS CONTROL IN A SINGLE,

COMBINE BURGLARY AND FIRE PROTECTION WITH ACCESS CONTROL IN A SINGLE, securıty COMMERCIAL the power of integration A truly effective commercial security system must be smart, flexible, and adaptable: Smart to provide a combination of intrusion, fire, access control, and

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms DIY Friendly Easy Fit Range of Alarms 60% of burglaries attempted on UK homes fitted with burglar alarms are unsuccessful. Introducing the new Easy Fit range of alarms With decades of experience in residential

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

Mechanical Pushbutton Locks Keyless Convenience

Mechanical Pushbutton Locks Keyless Convenience Mechanical Pushbutton Locks Keyless Convenience Discover the Latest in Kaba Technology Meet all your needs with the 5000 SERIES Information is available at www.e-plexlock.com, or call 1-800-849-8320 S

More information

CCTV & Video Surveillance over 10G ip

CCTV & Video Surveillance over 10G ip CCTV & Video Surveillance over 10G ip Background With the increase in data, research and development and corporate competition, many companies are realizing the need to not only protect their data, but

More information

Physical Access Control with BACnet White Paper

Physical Access Control with BACnet White Paper Physical Access Control with BACnet White Paper Abstract This document outlines the use of existing definitions of as well as extensions to ANSI/ASHRAE 135-2004 BACnet to enable the implementation of and

More information

V Series. Intelligent Programmer Software (DOS Version) User Manual

V Series. Intelligent Programmer Software (DOS Version) User Manual V Series Intelligent Programmer Software (DOS Version) User Manual Copyright 1996, 1997, 1999, 2002 Best Lock Corporation dba Best Access Systems. All rights reserved. Printed in the United States of America.

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM

INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM Revised: August 28, 2014 PRODUCT REFERENCE MOUNTING ACCESSORIES PIR / MOTION DETECTION UNIT MAIN UNIT POWER ADAPTER MOUNTING ACCESSORIES

More information

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK Security Door Controls 3580 Willow Lane, Westlake Village, CA 91361-4921 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

White Papers: Delayed Egress Hardware

White Papers: Delayed Egress Hardware www.sdcsecurity.com service@sdcsecurity.com [t] 800.413.8783 805.494.0622 [f] 805.494.8681 801 Avenida Acaso, Camarillo CA 93012 PO Box 3670, Camarillo CA 93011-3670 www.sdcsecurity.com White Papers: Delayed

More information

S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY. SIERRA Page 1

S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY. SIERRA Page 1 S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY SIERRA Page 1 C O N T E N T S USING YOUR SIERRA SYSTEM: Turning On/Off Home Arming Instant Home Arming Quick Exit Mode Chime Mode SPECIAL FUNCTIONS:

More information

FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011

FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011 FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM DATE: December 8, 2011 ADDENDUM NO. 4 Competitive Solicitation Number ITB 5530-0

More information