SECTION 12: SECURITY CONTENTS

Size: px
Start display at page:

Download "SECTION 12: SECURITY CONTENTS"

Transcription

1 SECTION 12: SECURITY CONTENTS 12.1 INTRODUCTION PRINCIPLES OF SECURITY CLASSIFICATION Classification Criteria Application to Building Design OPERATIONAL REQUIREMENTS ELECTRONIC SECURITY SYSTEMS Building Access Control Design Criteria Door Requirements Electronic Intrusion Alarm System CCTV System LIGHTING RADIO EQUIPMENT INTERFACE WITH THE FIRE PANEL SECURITY EQUIPMENT (HARDWARE) Electric Door Strike Electric Mortice Lock Magnetic (Static) Locks Control Panels (Challengers) Intelligent User Modules (IUM) Door and Lift Controllers Data Gathering Panels (DGP) Access Cards, Card Readers and Exit Devices Break Glass Units Duress Buttons Door Monitoring DC Emergency Power Supplies Volt Power Supplies Passive Infra-Red Detectors Glass Break Detector Intercom System Grey Boxes Key Switches Condition of Equipment INSTALLATION REQUIREMENTS 26 Design Standards page 1 of 29

2 12.10 CABLING SYSTEM TRAINING, AS-BUILT DOCUMENTATIONS AND OPERATIONS & MAINTENANCE (O & M) MANUALS TESTING & COMMISSIONING NOTICE OF COMPLETION APPENDICES Appendix A University Approved Contractors Appendix B Electronic Security Management Systems Programming Guidelines Appendix C Automatic Door Wiring Diagram 29 DESIGN STANDARDS CHANGE LOG JULY Application to Building Design 5 Grey box requirements added Door Requirements Standard doors summary table added for Features/Hardware and door requirements updated. Comms room door requirements added. Biological Resource Facilities added to exclude requirement for sounders and strobes. Door Actuator Criteria Key switch K2 (IN) location, height and type added CCTV Systems General Principles Power supply requirements to cameras added. General Camera Requirements New section added. Specific Placement Requirements New section added. Recording Equipment Recording capacity requirement added when new cameras are installed. Requirement for licenses added for all new cameras installed. Recording Requirements HD camera recording quality added. Camera Types Section updated with new requirements. Dummy Cameras New section added. Design Standards page 2 of 29

3 12.1 INTRODUCTION The section provides the minimum standards for the electronic security design of a new developments and/or upgrades to existing buildings. The building security concept shall be established during the design stage of a project based on a risk based approach. The design consultant shall agree with the relevant stakeholders specific security measures to mitigate the security risks. These security measures shall become the basis to formulate the security concept design. The design consultant shall then develop the complete detailed design based on the security concepts identified. The Project Architect shall consult with the University s Manager (Engineering and Infrastructure), Security and Transport or their designate on security issues affecting a project. The design consultant should also refer to the University s requirements with regards to Keying strategy, Lighting strategy, and information on Emergency Warning Intercom Systems and Fire Alarms elsewhere in these standards. These standards shall be read in conjunction with the University of Melbourne Electronic Security Management Systems Programming Guidelines and the CCTV Location and Standards document. It shall be noted that these design standards only take into consideration of physical security measures employed to deter, detect, and delay unlawful activity. Information Technology security measures are considered to be outside the scope of this document PRINCIPLES OF SECURITY CLASSIFICATION The classification of buildings, or areas within buildings, is based on the degree of damage which could be caused to the University through personal injury; loss of, or damage to property (including intellectual data) or interruption to a critical service Classification Criteria The following is a general list of functions of particular concern requiring security consideration: Store rooms containing radioactive material or dangerous chemicals; Computer laboratories, with 24-hour access; Biological resource facilities; Lecture theatres (with an equipment cost of more than $100,000.00); Areas of substantial intellectual or monetary value (e.g. computer software design, saleable medical research etc.); Places handling substantial quantities of money; Areas in which critical administrative functions are carried out (e.g. office of The Vice Chancellor, University Information Division Computer Room, Information Division Plant, Network Distribution Switch rooms, Student Records Office and PABX rooms); General administration offices; Sensitive waste storage; Mission critical plant rooms or infrastructure such that the loss of functions would cripple the day-to-day operations of the University or areas of the University; Design Standards page 3 of 29

4 Rooms where examination papers are stored; Rooms or buildings containing vulnerable or at risk individuals: be they students or staff, male or female and irrespective of political, sexual or religious orientation. These rooms/buildings should be places where at risk individuals can be expected to spend long periods of time such as accommodation areas and dedicated work/study areas; Areas that may be used on a casual basis would not normally justify protective measures. This list is not meant to be exhaustive. There may be rooms or areas requiring security consideration, but whose functions could not be classified based on the above list. These rooms or areas should be clearly identified by the design consultant based on the risk based approach described in section Application to Building Design The protection afforded to the assets is linked to the hierarchy of space that exists within all environments. The general hierarchy is as follows: Category of Space General Condition of use/access Public Areas that are freely accessible to members of the public. Semi-public Semi-private Private Secure Areas that are accessible to members of the public by invitation but where there are no specific criteria in place. Areas that are restricted to those with a legitimate reason for being there plus invitees that meet agreed criteria. Areas that are restricted to those with a legitimate reason for being there. Visitors are escorted at all times. Areas where access is limited to nominated individuals only. Visitors are not normally allowed but where necessary are escorted at all times. Comments External spaces, buildings with free access. Social environments, sporting facilities and free events. Areas where visitors are required to pay a fee or are subject to some form of screening. Working areas of the University restricted to staff members and students etc. Visitors are carrying out specific tasks. Areas containing critical equipment, facilities or items of intrinsic value. Visitors are normally excluded except for essential maintenance staff. In accordance with the principles of Crime Prevention Through Environmental Design (CPTED), the territorial definition of these spaces shall be clear and unambiguous; in addition, the transit between the spaces shall be reflected in the form and function of the access control measures to be adopted. The greater the difference in status between adjacent spaces the more robust shall be the physical measures, the more stringent the access controls between them and the level of surveillance practiced. Therefore, access to a secure area should be via a controlled door (appropriate to the location and usage), be alarmed and monitored by CCTV; whereas, access to a semi-private area may not require a controlled door, an Design Standards page 4 of 29

5 alarm or to be monitored unless these are identified as appropriate controls during the risk assessment process. Design principles relevant to security include: Access control design shall take into consideration the needs of disabled users; Passenger lift control functions; Design of the shell of the building; Design of internal user areas; Security of accessible low-level windows etc; Combining all high-security functions to one area of a building; External lighting design; Crime Prevention Through Environmental Design (CPTED); Specific operational requirements of the building or areas. Refurbishments and new building designs shall have, as a minimum but not limited to: An access controlled main entry points in line with these standards; Electronic locking and/or monitoring of all external doors; Access control on student A/H facilities; Access control on lift lobbies and communications rooms; Access control on biological resource facilities and lecture theatres; An interface between the fire panel and the Challenger panel CCTV coverage of the main entry point to a standard commensurate with the location and purpose of the image; CCTV coverage of student A/H facilities and computer rooms to a standard commensurate with the location and purpose of the image; Where required by the University, CCTV coverage of external doors to a standard commensurate with the location and purpose of the image; CCTV coverage of entry/exit points of private or restricted areas to a standard commensurate with the location and purpose of the image; Where required by the University, CCTV coverage of all alarmed locations to a standard commensurate with the location and purpose of the image; Where required by the University, intrusion detection devices to monitor external doors (unless access control is to be installed at an external door); Where required by the University, intrusion detection devices to monitor internal common/public circulation areas; Intrusion detection devices to monitor private or restricted areas; Remote arming stations shall be installed at strategic locations for arming/disarming and to provide alarm status and system status monitoring; and A Remote Arming Station shall be installed adjacent to the Challenger Panel for programming and maintenance purposes. A grey box installed keyed to the University s master key system, supplied by the Key Systems office (See for installation requirements). Design Standards page 5 of 29

6 12.3 OPERATIONAL REQUIREMENTS Operational requirements for each camera shall be developed in accordance with AS allowing field of view and detection grade to be specified. Australian Standards, Codes and Authorities. Security works must meet all the requirements of national and local Statutory Authorities and shall be in accordance with the following: Standard Reference Description International Standard Reference AS/NZS 3080:2003 AS/NZS 3080:2003/Amdt AS/NZS 3084:2003 AS/NZS 3084:2003/Amdt AS/NZS AS/NZS 3000:2007 Telecommunications Installations Generic cabling for commercial premises Telecommunications Installations Generic cabling for commercial premises Telecommunications installations Telecommunications pathways and spaces for commercial buildings Telecommunications installations Telecommunications pathways and spaces for commercial buildings Telecommunications installations Administration of communications cabling system Basic Requirements Electrical installations (known as the Australia/New Zealand Wiring Rules) AS Intruder alarm systems Client s premises Design, installation, commissioning and maintenance AS Intruder alarm systems Monitoring centres AS Intruder alarm systems Detection devices for internal use AS AS /Amdt Intruder alarm systems Wirefree systems installed in Superintendent s premises Intruder alarm systems Wirefree systems installed in Superintendent s premises AS Intruder alarm systems Alarm transmission systems AS/NZS 2201 Set-2008 Intruder alarm systems set ISO/IEC 11801:2002, MOD ISO/IEC 18010:2002 IEC Ed. 1.0 B (1998) Design Standards page 6 of 29

7 AS 4360 HB 167:2006 ASTM F (2201) AS/NZS :2003 AS AS AS AS 4806: Risk Management Security risk management Standard Practice for Installation of Exit Devices in Security Areas Information Technology Equipment Safety General Requirements Closed Circuit Television (CCTV) Management and Operation Closed Circuit Television (CCTV) Application Guidelines Closed Circuit Television (CCTV) PAL signal timings and levels Closed Circuit Television (CCTV) Part 4: Remote Video IEC Cor 1 Ed. 1.0 E (2202) IEC Ed. 1.0 B (2201) Building Code of Australia and building permit conditions; Environmental protection agency; WorkSafe requirements; Health & Safety regulations; Electricity supply authorities; Fire brigade requirements; Fire engineering requirements; Green Star or ESD requirements; The rules and regulations of local government; All other relevant codes and standards ELECTRONIC SECURITY SYSTEMS The UTC Fire and Security V8 Challenger intruder detection and building access control system shall be specified for intrusion detection and access control applications in University buildings and/or areas. IndigoVision compatible Network Video Recorders shall be specified for recording CCTV cameras for surveillance and monitoring purposes Building Access Control Design Criteria Online Access Control System The microprocessor based control unit shall be a fully redundant system (that shall remain in operation if the Forcefield network is offline) with a distributed processing network topology. Whilst operating, the system shall grant or deny access through a door to a card holder based on the presentation of a properly encoded card to an authorised card reader at a valid time of day, day of week and card status. Each individual card transaction, both Design Standards page 7 of 29

8 through entry or egress card readers, shall log as a separate event at each door, i.e. entry shall be distinguishable from egress at the same door. The system shall be wired on a dedicated security local area network (LAN). Battery backup shall be provided to maintain normal access control operations including all memory and the real time clock calendar for not less than 8 hours should mains power fail. The battery shall be automatically recharged when mains power is applied. When the dedicated security LAN becomes offline, all events and transactions shall be retained in its memory. These events and transactions shall automatically uploaded to the database of the Challenger management software when the security LAN connection re-establish. All events and transactions shall be stored in the central database with time & date stamps. The time & date stamps shall be referenced for security data retrieval. The Challenger management software in use at the University of Melbourne is the Forcefield Enterprise edition. All building security systems shall be connected to the Forcefield network and shall be programmed as per the University of Melbourne Electronic Security Management Systems Programming Guidelines (Appendix B). Noting that not all Forcefield management software functionalities are required. The Security Contractor shall refer to the capabilities of the Forcefield management software and liaise with the end-user to identify specific features or functionalities for implementation. Specific requirements shall include (but not limited to) the following: In principle, the design should encourage persons (staff, students, visitors and contractors) entering or leaving a building through the same access control points. The design should limit the number of public access control points. As far as practical, public access should be limited to one door; Doors shall be named according to convention; Floors shall be named according to convention; Forcefield 4 door controllers (4DC) shall be named according to location; Label all panels (including 4DC), security equipment and cables according to a labelling scheme agreed with the University during installation; Provide regulated power supply and battery system to back up the operations of the access controller and electronic door locking devices for 8 hours when there is a mains failure. Refer to section for details; Label all batteries with the installation dates; Master barrels shall be installed in all access control door lock; All handles on strike doors shall be locked to avoid doors to be forced open; Install door closers on all monitored doors. The design consultant shall discuss with the stakeholders to identify other specific requirements for implementation. Design Standards page 8 of 29

9 Electronic Key System Electronic key system shall be Cyberlocks or approved equivalent. Electronic key cylinders shall be installed at locations identified in the security risk assessment (For example University IT Comms rooms). A user shall be able to turn the cylinder and open a door if the user carries a valid electronic key (with pre-programmed data). The transaction or event shall be kept within the memory of the electronic key. The data shall be uploaded to the system database when the user presents the key to an online reader. At the same time when an user presents his/her key to an online reader, the programmed data stored in the electronic key memory will be updated (e.g. to update the list of accessible doors, to bad-list a key, to delete a door from the accessible door list, etc.) Door Requirements The following sections detailed the security door hardware required for each type of door. The design consultant shall recommend the required door type for each access control point based on the outcomes of the security risk assessment. If a required door hardware configuration does not match any one of the door types, the design consultant shall consult the security delegate of the University to agree with the proposed configuration. It should be noted that not all door hardware (e.g. lever, handle, thumb turn, key cylinder, door seal, etc.) are included in the following sections. These door hardware are normally included in the door hardware schedule under the architectural package. The design consultant is required to coordinate with the Project Architect to ensure all security-related door hardware is included in the door hardware schedule. Bottom rail locks and Euro cylinder are not to be installed unless specifically approved in writing by the Security Systems Client Services Coordinator. Main Entry Doors Where double doors are installed, the inactive leaf shall be secured with a lockable Orb panic bolt of no less than 300mm on the bottom of the door and a Dalco panic bolt no less than 400mm on the top of the door. Alternatively another Orb lockable panic bolt could be installed at the top of the door of no less than 500mm in length, keyed to the external master key system. The design consultant shall arrange for the University Security Systems Client Services Coordinator to supply the correct cylinder prior to installation. Design Standards page 9 of 29

10 Standard Doors FEATURES / HARDWARE ENTRY: Proximity card reader installed on the unsecured side of the door (See section ) EGRESS: Proximity card reader installed on the secured side of the door EGRESS: Push button installed on the secured side of the door unless an electric mortice lock is used Electric door strike, electric mortice lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise) Break glass door release unit. The breakglass unit shall be installed on the secure side and shall be monitored DOOR TYPE A B C D E X X X X X X X X X X X X X X X X X X Reed switch door monitoring X X X X X Orb lockable panic bolt on fixed leaf (where applicable) X X X X ADI or other University approved Blocker plate installed (where applicable) X X X X X Automatic door closer X X X X Door status indicator X Magnetic lock(where applicable) X Doors shall be configured to open out Custom signage No external door furniture The door shall be configured to fail safe and provide free egress at all times X X X X Design Standards page 10 of 29

11 Type A Door (Full Access Control) These doors shall have the following hardware/features: ENTRY: Proximity card reader installed on the unsecured side of the door (See section ); EGRESS: Proximity card reader installed on the secured side of the door; Electric door strike, electric mortice lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Break glass door release unit. The breakglass unit shall be installed on the secure side and shall be monitored; Reed switch door monitoring; Orb lockable panic bolt on fixed leaf (where applicable); ADI or other University approved Blocker plate installed (where applicable); Automatic door closer. The following shall be noted: All Type A doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each entry/egress card transaction at each door shall be logged as a separate transaction in the access control system database. Type B Door (Partial Access Control) These doors shall have the following hardware/features: ENTRY: Proximity card reader installed on the unsecured side of the door (See section ); EGRESS: Push button installed on the secured side of the door unless an electric mortice lock is used; Electric door strike, electric mortice lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Break glass door release unit. The breakglass unit shall be installed on the secure side and shall be monitored; Reed switch door monitoring; Orb lockable panic bolt for fixed door leaf (where applicable); ADI or other University approved Blocker plate installed (where applicable); Automatic door closer. The following shall be noted: Design Standards page 11 of 29

12 Any Partial Access Controlled Door shall be cabled such that a future upgrade to a Type A door shall not require any additional cabling between the "Intelligent 4-door Controller" and the future Egress Proximity card reader. All Type B doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each entry card and push button transaction at each door shall be logged as a separate transaction in the access control system database. Type C Door (Controlled/monitored door) These doors shall have the following hardware/features: Electric door strike, electric mortise lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Break glass door release unit; Reed switch door monitoring; Door status indicator; Orb lockable panic bolt for fixed door leaf (where applicable); ADI or other University approved Blocker plate installed (where applicable); Automatic door closer; Door status indicator. The following shall be noted: Each access controlled, controlled/monitored door shall have a unique address in the system, which shall allow separate programming and control of the door. The function of automatic arming & disarming and locking & unlocking of controlled/monitored doors shall be carried out individually via time zones. All doors shall be individually monitored for alarms and all transactions & events shall be logged in the access control system database. All Type C doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each transaction shall be logged in the access control system database. Type D Door (24 Hour emergency exit door) These doors shall have the following hardware/features: Electric door strike, electric mortice lock or magnetic lock; Break glass door release unit; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Orb lockable panic bolt for fixed leaf (where applicable); No external door furniture; Design Standards page 12 of 29

13 The door shall be configured to be fail safe and provide free egress at all times; Reed switch door monitoring; Doors shall be configured to open out; Custom signage; ADI or other University approved Blocker plate installed (where applicable); Automatic door closer; Door shall be configured to open out; Custom signage; No external door furniture; The door shall be configured to fail safe and provide free egress at all times. The following shall be noted: Each 24-hour emergency door shall have a unique address in the security system, which shall allow separate monitoring, programming and control of the door. The status of each individual door shall be displayed on the main system computer. Entry/egress through these doors shall be restricted at all times. All Type D doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each transaction shall be logged in the access control system database. Type E Door (Monitored Door) These doors shall have the following hardware/features: Magnetic lock (where applicable); Break glass door release unit (where applicable); Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Reed switch door monitoring; ADI or other University approved Blocker plate installed (Where Applicable); Automatic door closer Monitoring shall be activated/deactivated by time zone; Magnetic lock (where applicable). The following shall be noted: Each transaction shall be logged in the access control system database. Comms Room Doors Access control door type A or B (minimum) fitted with Padde ES9000 and Cyberlock key system as opposed to the traditional physical University master key system unless otherwise approved by the Security Systems Manager or their delegate. Design Standards page 13 of 29

14 Biological Resource Facilities Local alarm sounders and strobes shall be excluded from installation into these facilities unless otherwise approved by the Security Systems Manager or their delegate. Electro-Mechanical Doors The installation of an electro-mechanical operated bi-parting door (e.g. main entry doors) shall be discussed between the Project architect, the University University s Manager (Engineering and Infrastructure) and any other contractor or University staff member the architect feels is necessary. The selection of the correct door actuator is vital. Where electronic access control is installed, the system shall be programmed to lock/open the main entry doors on the basis of a user defined time schedule. Proximity card readers shall allow access outside normal business hours. The high-level wiring configuration to achieve this has been illustrated in Appendix C. Door Actuator Criteria The door actuator shall provide: 240 volt operator; Constant rated 5 kg torque capacitor start and run squirrel cage motor; Continuously rated motor; Self-lubricating planetary gearbox with spiral bevel drive; Micro-processor control with a programmable feature that incorporates solid state switching of the motor; The micro-processor shall have a non-volatile memory which remains intact during a power failure; Automatic reversing if obstructed during closing sequence with fully adjustable sensitivity setting; Automatic stop and retry after adjustable delay if obstructed during opening sequence; Safety creep speed facility allowing doors to reduce speed before reaching location of previously detected obstruction; Chain drive with average tensile strength of 1950 kg; Dual sets of safety PE beams; Audible alarm at the door (for DOTL and forced door alarms); Battery backup for a minimum of 50 operations in the event of mains power failure. In the event of an electrical power failure, the battery backup system would keep the doors locked and secure; The ability to physically monitor the doors when open; The ability to physically monitor the doors when closed; Installation of a separate electric lock or rotor lock; The ability to monitor the status of the electric lock; Design Standards page 14 of 29

15 Fail safe mode allowing a person to open the doors manually when there is a mains failure; Entry radar detector; Exit radar detector; K2 two position spring return key switch keyed to the building master key system (IN); K4 four position key switch (auto/exit/open/locked) keyed to the building master key system (OUT). The electronic access control system shall interface with the door actuator at lowlevel. When access control functionalities are activated (e.g. during afterhours), the entry and exit radar detectors shall be deactivated accordingly. The design consultant shall arrange for the University Security Systems Client Services Coordinator to supply the correct cylinder in the K2 (IN) & K4 (OUT) key switches prior to installation. Key switches K2 (IN) for electro-mechanical doors shall be installed no more than one metre from the door at a height of mm unless otherwise approved by the Security Systems Manager or their delegate. The Lock-it-well override key switch, or equal equivalent, keyed to the University master key system shall be used. The door actuator shall be equipped with an inverter fail safe system providing 50 cycles of the door operation under a power failure condition. The door operator shall provide separate individual alarms to the security system (Forcefield) when: there is a 240 volt power failure at the door; low battery voltage is detected at the door; there is a fault with the battery charger. All alarms shall simultaneously be reported to the Campus Security Centre directly and appear at the Forcefield Server & workstation to alert an operator. Sliding Door (Non-auto) For non-automatic sliding doors, the FSH MEM4400 series automatic sliding door locking device is preferred. The contractor is required to provide relevant information to coordinate the installation with the architect and the door supplier. Bicycle Hubs Access Control: The following equipment shall be provide: Unicard M series Reader Slim; Padde Single Magnetic lock; Door closer/self closing hinges; CCTV Camera HD IndigoVision Compatible; Breakglass; Egress Button; Black powdercoat pedestal to suit breakglass & egress. Design Standards page 15 of 29

16 Electronic Intrusion Alarm System Intrusion alarm system to be installed in new development or upgrade shall be based on UTC Fire & Security Challenger equipment. The alarms are monitored from the Security Control Room at 213 Grattan Street. Specific requirements shall include (but not limited to) the following: Appropriate intrusion detection devices shall be placed at locations or areas identified in the risk assessment; The design consultant shall select the appropriate device types to meet the specific requirements; Communication with Forcefield Server - the Challenger TS 0899 TCP/IP computer interface shall be used on all new projects and shall be programmed for event driven data transfer. It shall be noted that the University s Manager (Engineering and Infrastructure), or his designate, shall arrange for a TCP/IP port to be provided adjacent to the Challenger TCP/IP computer interface. The University Project Manager shall also be responsible for acquiring an appropriate IP address from the University of Melbourne Information Services; Remote Arming Stations (RAS) - all RAS shall be the eight area Challenger TS 0801 device unless other specified by the University Project Manager. All new Challenger systems shall be provided with a master control RAS adjacent to the Challenger panel; Alarms shall simultaneously be reported to the Security Central Control directly. The Security Control Room is located 213 Grattan Street; At each door, sounder shall be installed locally. When an alarm is triggered, the sounder shall go off to providing alarming signal locally; All alarm inputs shall be terminated with end-of-line resistors recommended by the manufacturer; Each alarm device shall be wired to a separate input allowing each device to be monitored individually; Alarms shall be monitored for 4 states (i.e. normal, alarm, tamper (open circuit) and tamper (short circuit)); Provide regulated power supply and battery system to backup the operations of the intrusion detection system for 8 hours when there is a mains failure. Refer to section for details; The design consultant shall arrange for an Austel Licensed structured cabling contractor to connect the intrusion alarm system to the Forcefield management software by patching through the Security TCP/IP Network; All inputs shall be named according to convention; As required, alarm inputs shall be tied with outputs providing the capabilities to interface third-party system or to switch on/off an alerting devices, e.g: After a DOTL alarm is acknowledge, the sounder shall be deactivated automatically; When an alarm is triggered, switch on the lights installed within the alarmed area. Design Standards page 16 of 29

17 Interface with the CCTV system allowing the recording frame rate of the CCTV camera covering alarmed area to increase. The design consultant shall discuss with the stakeholders to identify other specific requirements for implementation CCTV System General Principles The use of Closed Circuit Television (CCTV) equipment at the University of Melbourne is to assist security personnel to provide staff and students with a safe environment in which they can work and study. This is primarily achieved with CCTV through: Active observation; Providing a visual deterrent; The recording of images; For the CCTV system to be effective in this support role, the hardware needs to: Meet a minimum set of physical requirements; Be of a sufficient durability; Provide a suitable number of images; Work in a variety of locations and environments; Provide an appropriate quality of image. To assist continuity of operation all power for University CCTV cameras shall be derived from the Comms room to which it has been cabled back to. The use of local GPO s (general purpose outlets) to power CCTV cameras is not permitted. General Camera Requirements All cameras and recording devices installed at the University must comply with the Design Standards; No camera will be fixed to a heritage building environment without the appropriate approvals; Planning and placement of all underground infrastructure, including pull boxes, must be approved by Asset Services, Engineering and Infrastructure team and comply with the Design Standards; Placement of external camera poles will be subject to discussion and agreement with Security, Campus Planning and the University Grounds Section; As part of the installation commissioning process, all cameras must be adjusted (if required) to ensure the best possible picture is achieved during the hours of darkness; Wherever possible cameras will be placed at a height that allows them to be safely accessed for repairs and maintenance without the need for specialised access equipment; External cameras will be of a vandal proof design with no loose cables or easily vandalised mounting brackets; Traffic control zone cameras must be mounted so as to provide optimum views without impeding the flow of traffic or coming into contact with pedestrians or vehicles; Design Standards page 17 of 29

18 In accordance with applicable legislation, cameras will not be used to capture or view private activities unless clear and obvious signage is placed within the area in which the activities take place. Cameras will not be installed in private areas such as toilets or change rooms Specific Placement Requirements The purchase or installation and placement of any security CCTV camera must be authorized by the Manager, Security and Transport, or delegate Cameras must be located according to the following rules; Vehicle access points to the campus Purpose Vehicle number plate capture, facial identification of pedestrian traffic, remote monitoring of traffic flows (vehicle and pedestrian) and remote management of vehicle access Camera Requirements All traffic control zone cameras must, as part of the installation commissioning process, be adjusted to ensure the best possible picture is achieved given lighting levels and the impact from vehicle headlights. Car park entrances and exits Purpose Vehicle number plate capture, facial identification of pedestrian traffic, remote monitoring of traffic flows (vehicle and pedestrian) and remote management of vehicle access Camera and Siting Requirements All traffic control zone cameras must, as part of the installation commissioning process, be adjusted to ensure the best possible picture is achieved given lighting levels and the impact from vehicle headlights. Monitoring of car park entrances required identification of the card number plate and /or driver (front of car/van or truck). The angle and the placement of the camera must take into consideration reflections from sunlight and bright car/street lights. External cameras at building entry and exit points Purpose Monitor pedestrian traffic entering or going past building entry points. Siting Requirements Cameras must be sited so as to provide full body and facial identification of pedestrian traffic (singular or groups) in the entry or around the doorway. Depending on the building environment, the camera may be attached to the subject building or to another building, and provide a visual link with cameras in the immediate area. Internal cameras at building entrance Purpose Monitor pedestrian traffic entering or departing through a building entrance. Siting Requirements The placement of an indoor camera facing a doorway entrance must capture facial features for evidentiary purposes. A 3/4 body view is necessary for the best facial view and lighting needs are to be taken into consideration in order to avoid shadowing of the face. Images must be capable of manipulation by CROs to provide a visual link with other cameras in the building. Cameras must be safely mounted to avoid impeding the natural flow of traffic and to prevent contact with persons and objects. Design Standards page 18 of 29

19 Help phones and other designated safe zones including light corridors Purpose Monitor traffic along designated light corridors and heavy traffic routes and provide CCTV coverage of University help/information phones Siting Requirements Cameras must be sited to provide full body and facial identification of pedestrian traffic (individual or group) in the area. On activation of the Blue Phone emergency button, cameras must automatically focus on the blue phone. The camera must also be capable of manipulation by CROs to provide a visual link with other cameras in the area. Reception areas and premises where monetary transactions take place Purpose Monitor activity at University reception areas and areas where monetary transactions take place. Siting Requirements Cameras must be sited to provide full facial identification of customers presenting at service counters. Cameras must respond by immediately focusing on the centre of the service counter when an alarm/duress button is activated. Areas of critical infrastructure or where biological resources or dangerous chemicals are housed Purpose Monitor activity in areas containing biological resources, critical infrastructure/equipment, information technologies or communication networks which, if rendered inoperable for an extended period, would significantly impact on the functioning of the University. Examples include generators, senior management offices, major IT server locations, biological resource facilities or dangerous chemical storage areas. Siting Requirements Cameras must be sited so as to provide full facial identification of anyone entering the area. Cameras may be alarm activated to immediately focus on the area when an alarm is activated. Areas containing objects of high value or desirability Purpose Monitor activity in areas containing objects of high value or desirability. Areas include library precious book collections and objects in the Ian Potter art gallery. Cameras are predominantly used to monitor activity and provide evidentiary material in the event of theft. Siting Requirements The cameras must be capable of manipulation by CROs to provide a visual link with other cameras in the area. Camera placement must capture facial features for evidentiary purposes. A 3/4 body view is necessary to achieve the best facial view. Lighting must be considered to avoid shadowing of the face. Areas subject to petty theft, vandalism, or graffiti. Purpose Monitor activity in areas where there is a history of criminal damage or where temporary installations may pose a risk. Such areas may include library spaces and other student study areas, 24 hours computer labs and high profile buildings. Cameras must provide evidentiary material in the event of a theft or other criminal activity. Siting Requirements Cameras must be sited in such a way as to provide full facial identification of anyone entering the areas. Design Standards page 19 of 29

20 Recording Equipment The IndigoVision Network Video Recorders (NVR s) or compatible shall be specified for recording CCTV Camera for security purposes. Prior to installation of cameras, recording streams/licenses shall be confirmed with the Security department. Where any new installation will require additional recording capability to maintain the current standard (recording capacity 30 days storage) the security contractor shall be responsible for providing an additional NVR. It is the responsibility of the security contractor to ensure all new devices have the appropriate licences required to capture CCTV images onto the University of Melbourne s IndigoVision network. All recording equipment shall be connected to the University of Melbourne network and configured to synchronize their clocks with the University NTP server. Recording Requirements All CCTV cameras shall meet the following recording requirements: Recording capacity: 30 days; Background recording: 8 fps; Alarm / Event triggered recording: 25 fps; Recording format (for IP cameras): H.264; All HD cameras shall record at a minimum of 4096 kbps upon alarm or event; All cameras shall be recording 24/7 unless otherwise approved in advance by the Security Systems Manager or nominated delegate. Camera Types Cameras shall be compatible with the IndigoVision recorders and Control Centre management software. HD cameras shall be used unless it is deemed not suitable in advance by the Security Systems Manager or nominated delegate. To be compatible with the IndigoVision recorders and Control Centre management software all cameras installed should be selected from the IndigoVision range of products or ONVIF compatible products certified as compatible by IndigoVision. All cameras shall be supplied with Enhanced Management Software license. It is the responsibility of the security contractor to ensure all new devices have the appropriate licenses required to stream CCTV images onto the University of Melbourne IndigoVision network. Dummy Cameras Dummy cameras will not be used in any space owned or occupied by the University. It is the responsibility of the security contractor to ensure any newly installed device is operating and recording as soon as practical after its physical installation. Locations Guidelines Exact camera specifications will be based on the application of the cameras. This can be determined by referring to the information set out in section of these standards Design Standards page 20 of 29

21 Operational Requirements The University shall define the operational requirements for CCTV systems using the parameters set out in the Australian Standard AS The definition shall include: 12.5 LIGHTING Coverage grade identification, recognition, detection, monitoring and vehicle number plate visual recognition; Image size at maximum target distance percentage of picture height; Field of view (FoV); Maximum target distance; Mounting height; The main external entrance to a building shall be well lit after dark. External lighting shall be controlled by a photoelectric cell not by a time clock. At locations or areas where digital recording CCTV cameras will be installed, the location or placement of light fittings will be critical. The security lighting from the building shall extend to the appropriate Campus Security Light Corridor. In order to allow high quality video image to be captured, the lighting level shall be a minimum of 15 lux at a horizontal level of 1.5 metres above the finished floor level. The contrast ratio between the maximum to minimum (average) lighting level shall be no greater than 1:3. Perimeter doors and other ground level points of potential access shall be well illuminated by security lighting after dark as per the Australian Standards (AS/NZS ). The design consultant shall coordinate closely with the lighting designer to achieve the required lighting level RADIO EQUIPMENT Underground car parks shall have a radio repeater installed to facilitate communications on the Motorola digital radio network in place at the University INTERFACE WITH THE FIRE PANEL The Challenger system shall interface with the fire panel at low-level. When a fire alarm is triggered, a relay output shall be provided by the fire panel. When this relay output is received by the Challenger Panel, the Forcefield security management software shall release all controlled fire escapes automatically. The design consultant shall coordinate with the fire engineer or building services engineer to detail the requirements in the specification. The design consultant shall also liaise with the fire engineer or building services engineer in relation to the specific fire regulation or BCA requirements that are required to be implemented for the new development or upgrade. Design Standards page 21 of 29

22 12.8 SECURITY EQUIPMENT (HARDWARE) Electric Door Strike Electric door strikes shall be PADDE ES 2000 completed with dead-latch facility or other as approved by the University. Door guards shall be specified to prevent tampering with Padde electric strikes. Each door strike shall be completed with: Keeper security status monitoring (i.e. wired for both N/O & N/C); Each Padde strike shall be configured for fail safe mode, unless specified otherwise by the University Security Delegate Electric Mortice Lock Electric mortice lock (with dead latch) shall be LOCKWOOD 3574AM2R/L--SC or other as approved by the University. The electric mortice lock shall be configured for fail safe mode, unless specified otherwise by the University security Delegate; The lock cylinder shall be keyed to the University Master key system. It shall be noted that the Lockwood dead latch is not suitable for all applications; Cable transfer devices shall be specified as Lockwood LC8810 or LC8811 stainless steel concealed recessed flex conduit Magnetic (Static) Locks Magnetic locks shall be PADDE FR1200B 24VDC/250 MA or LOCKNETICS range or others as approved by the University; The design consultant shall obtain permission from the Project Manager prior to specifying magnetic locks; Magnetic locks shall require separate power supplies each completed with battery back-up and failure monitoring Control Panels (Challengers) All new control panels shall be Challenger TS0816 (version 8). Challenger panels connected to the Forcefield access control management system shall be equipped with an 8MB IUM. Tamper switch must be installed for each panel to monitor the status of the enclosure Intelligent User Modules (IUM) All IUM s connected to the Forcefield access control management system shall be Challenger TS0884 with 8MB memory. The IUM s shall enable the Challenger system to handle multiple card formats and protocols simultaneously Door and Lift Controllers All door controllers shall be Challenger TS 0867 Intelligent 4 door controllers with the TS0329 enclosure. All lift controllers shall be Challenger TS 0869 Intelligent 4 lift controllers with the TS0329 enclosure. All lift controllers shall be fitted with IUM s. The memory size of the IUM s shall subject to the requirements of each project. Design Standards page 22 of 29

23 Tamper switch must be installed for each controller to monitor the status of the enclosure Data Gathering Panels (DGP) All Data Gathering Panels (DPG s) shall be Challenger TS0820. It shall be noted a standard TS0820 comes with 8 inputs and 8 open collector outputs. Subject to the requirements of each project, input/output expansion boards may be required to increase the capacity of the DGP. Available expansion modules are TS0021 (8 input expansion module), TS0840 ( 4 way relay board), TS0841 (8 way relay board) and TS0842 (16 way open collector controller). The DGP s shall be housed within the Challenger TS0304 enclosure. Tamper switch must be installed for each DGP to monitor the status of the enclosure Access Cards, Card Readers and Exit Devices Access Cards Access cards (Staff, Student or Visitor cards) shall be issued by the University of Melbourne Campus Operations Group. Access cards shall be fully compatible with card readers. Card Readers Unicard Mifare 26 bit wiegand card readers shall be used on all new installations. If the installation is part of an existing mag swipe card reader system, the existing card readers and associated cabling shall be upgraded to the Unicard 26bit Wiegand card readers. All card readers are preferred to be installed at a height between mm providing easy access to disabled persons. If a DDA consultant is engaged by the University for a particular project, advice shall be sought from the consultant in relation to the required mounting arrangement. Request-To-Exit Push Button Where required, the design consultant shall specify Green mushroom head SEADAN SSE, 4350, DP/DT or similar as approved by the University. The push buttons shall be installed at a height between mm adjacent to the controlled door Break Glass Units Break glass release units shall be double-pole KAC WW2200/SW, SEADAN kw200/sw/b or similar University approved. They shall be installed at a height of between mm adjacent to the secure side of the door. When the glass is broken in an emergency, the controlled door shall: Unlock automatically (1st pole); Initiate an alarm (2nd pole). All break glass units shall be monitored for tamper and shall be installed in the secure side of access control points. Design Standards page 23 of 29

24 Duress Buttons All new duress button installations must be accompanied by the installation of a CCTV camera, (see for CCTV System principles & requirements). The location of the camera is to be confirmed with the University of Melbourne Security Systems Manager or nominated delegate prior to installation. Duress Hold-Up Button (Hard Wired) Where required, the design consultant shall specify from the Honeywell 269R/270R/269SN Range of hold-up devices or approved equivalent. Duress Hold-Up Button (Wireless) Where required, the design consultant shall specify from the Honeywell 269R/270R/269SN. Range of hold-up devices or approved equivalent Door Monitoring Reed Switches SENTROL (one inch) reed switch shall be specified for all doors connected to the access control or intruder detection systems. Each encapsulated reed switch shall consist of an individual magnet to be installed in the door leaf. Under normal situation, the magnet shall be installed at 100mm from the leading edge of the door. Whilst the switch and the end of line circuitry (ELOR) shall be mounted in each door jamb head at the location matching the mounting location of the magnet. The magnet to operate the reed switch shall be concealed by recessing into the door leaf and the gap between the reed switch and magnet shall not exceed 4.0 mm. For wide gap and roller door applications, other reed switches would be required. The design consultant shall propose brand and model to suit the application to the University for approval. For applications which require surface mount reed switches, the design consultant shall propose the brand and model to the University for approval. Door Status Indicators Door status indicators shall be specified for all Type C doors. Each door status indicator shall consist of: Clipsal series 2000 plate; Green LED (engraved: Door Available ); Red LED (engraved: Door Un-available ). The design consultant shall specify custom mounting brackets where required. Local Door Sounders All local door sounders shall be Fulleon AWD sounder (RS Stock No ) or other as approved by the University. They shall be triggered via software programming (Macro) and driven off a separate relay on a DGP or an expansion module, but not via the relay on the 4 Door Controller. The local door sounder shall go off for a programmed period of time when a DOTL or door forced alarm is triggered. Design Standards page 24 of 29

25 DC Emergency Power Supplies 12-volt/24 volt DC battery backup regulated power supply and battery system shall be specified to maintain power to the electric locks and security systems (including access control, intrusion detection and CCTV systems) for an 8 hour period should normal mains power be disrupted. The backup power supply system shall be fully monitored by the Forcefield security system Volt Power Supplies All security panels and other equipment & devices shall be wired on circuits dedicated to security. A Lock-dog shall be installed on each associated circuit breaker. Each 240V GPO shall be labelled with ESSENTIAL SECURITY EQUIPMENT DO NOT DISCONNECT Passive Infra-Red Detectors Where required the design consultant shall specify from the Bosch Tritech range of PIR s, or other University approved intruder detectors Glass Break Detector Where required the design consultant shall specify from the Bosch DS110i Series Glass Break Detectors, or other as approved by the University. The contractor is invited to submit a sample of their recommended unit to the University for approval during the design stage Intercom System Where required the design consultant shall specify from the Commend range of equipment for intercom applications Grey Boxes As per Section 8 of the University Design Standards all buildings classified Category 3 and above are required to have a University of Melbourne grey box installed for emergency service access. This includes all refurbishments and new building designs unless otherwise specified by the Security Systems Manager or nominated delegate. Grey boxes are keyed to the University s master key system and are supplied (cylinder included by the Client Services office. The following installation requirements apply; To be installed at main entry within 500mm adjacent to FIP or MIMIC panel whichever is applicable To be fixed at a height of mm to a concrete pillar To be fixed using Dyna bolts at a minimum depth of 300mm (4 fixing points) The installation of a grey box is considered critical and should be completed as part of a project handover Key Switches Where required, for electromagnetic doors and/or lifts or other applications, the design consultant shall specify that the Lock-it-well override key switch (or approved equivalent) with cylinder keyed to University master key system shall be used. The following installation requirements apply; To be installed no more than one meter from door at a height of mm unless otherwise approved by the Security Systems Manager or delegate. Design Standards page 25 of 29

26 Condition of Equipment All equipment supplied to the University must be new. The use of Refurbished or second hand materials and parts is not permitted. Parts that include a manufacturers stamping should not exceed 18 months INSTALLATION REQUIREMENTS All security installations shall be performed by businesses and individuals holding a Private Security License in accordance with the Private Security Act Electronic security devices shall only be installed and programmed by a specialist University of Melbourne Campus Operations approved Security Contractor. The Security Contractor must be Forcefield Enterprise accredited. Evidence of this accreditation shall be required prior to a log on to the management software is provided. Specific requirements shall include: CABLING The control of security devices shall be centralised via the Forcefield management software; Security data of all security devices shall be maintained in a single database (Forcefield management software database); The University prefers that the Security Contractor shall be a direct Sub-contractor to the Builder - not to the Electrical Contractor; Create graphical maps of the development or areas allowing icons of doors, breakglass units, Challenger panels (including 4DC), cameras, DVR s, remote arm station, PIR, etc. All cabling on Challenger LAN (Local Area Network) equipment shall be Belden 8723 or equivalent with a separate earth wire (2.5mm2 Green/Yellow); The cabling from the door controllers to the readers shall be shielded 7-core (14/0.20mm2) cable with cable runs not exceeding 50m as per manufacturer s specifications; Figure 8 cable (min 24/0.20mm2) shall be used on electric locks; All Break Glass Units, Egress Buttons, Duress Buttons, Reed Switches, Local Sounders, PIR s and Door Status Indicators shall use 4-core (14/0.20mm2) cable; Cat6 standard cable shall be used to connect IP equipment (e.g. IP cameras) to data point or network switches. The IP cabling standards for the University can be found here The security contractor shall submit samples (with technical product data sheet) of all cable types for approval before procurement SYSTEM TRAINING, AS-BUILT DOCUMENTATIONS AND OPERATIONS & MAINTENANCE (O & M) MANUALS The security contractor is required to provide the following to the University: System training to the operators. The training should be tailored to meet the project specific features and functionalities of the systems installed. The security contractor Design Standards page 26 of 29

27 shall liaise with the University to identify the training needs including breakdown the trainings into levels to meet the operational requirements and the preparation of training materials; As-built documentation the security contractor shall prepare the as-built documentation to document the as-installed status of the security systems. This shall include (but not limited to the following): As-built layout drawings; As-built schematic wiring diagrams; Conduit layout (if any); O & M Manuals the security contractor shall prepare the O & M manuals to document the following: Product data sheets; Operating procedures of the security systems; Maintenance procedures of the security systems; User guide; Call-out procedures; Troubleshooting guide; Test results; Final commissioning checklist; The design consultant must include all these requirements in the specification TESTING & COMMISSIONING The testing & commissioning shall be a two-stage process. The security contractor shall undertake internal testing to check the functionalities of every device and equipment against the performance of the security systems specified in the specification. The test results shall be recorded in test results record sheets, which shall be submitted to the design consultant for review and approval. The security contractor shall also submit a test plan to detail the steps or procedures to verify the performance of the security systems against the specification. The test plan shall be submitted to the design consultant for review and approval. The approved test plan shall become the reference document for final commissioning. Upon the approval of the test results & the test plan and the security contractor is satisfied that the security systems are ready for final commissioning, the security contractor shall organise with relevant stakeholders (including representative from the University, representative from the managing contractor and design consultant) to witness the final commissioning of the systems. The test plan shall cover (but not limited to): The verification of all system functions and facilities sufficient to demonstrate the correct installation and operation of the system as a whole; Both night and daytime tests as applicable to the system components; Operational tests designed to verify the operation of all aspects of the system, together with the interfaces between the various security sub-systems and any nonsecurity systems e.g. Fire Panel. Design Standards page 27 of 29

28 The test plan shall be thorough in its testing and recording, and shall effectively demonstrate all performance and operational aspects of the specified security systems. The form of the document shall be mainly a check sheet of system operations, functions and facilities with space to insert numerical values where applicable. A separate column or space shall be provided for comments to be inserted. Provide at least two persons to conduct the tests and hand-held radios such that they may carry out tests and demonstrations in accordance with the test plan for relevant stakeholders to witness. In the case of CCTV testing, supply all test targets and recording equipment as may be necessary for the tests. The security contractor shall note that final adjustment on cameras (e.g. focus, angle of view and field of view) may be required to achieve the operational requirements. With the security contractor undertaking internal testing before final commissioning, it is reasonable to expect that tests can proceed without delays due to wiring errors or poor adjustment. As part of the testing & commissioning process, the security contractor shall note that a copy of the final camera view (after final adjustments) for each camera shall be printed. The copy shall form part of the as-built documentations. The print out of the camera view shall be the reference for the maintainer to adjust the camera view after maintenance works. The design consultant shall include all these requirements in the specification NOTICE OF COMPLETION The security contractor is to ensure that the security systems are completed and commissioned prior to practical completion. This process shall not be considered complete until the Manager, Security andtransport, or his/her designate, has signed off that he/she is satisfied with the installed systems and they are ready to operate. This sign off shall be through the submission of completed test results. The design consultant shall be responsible to witness the final commissioning of the security systems and prepare the final acceptance certification of the completed installation. Upon satisfactory completion of the project the design consultant shall forward the completed test results to the University Project Manager and the Manager, Security and Transport. The design consultant shall invite representatives from the University and the managing contractor to participate in the witnessing of the final commissioning of the security systems APPENDICES Appendix A University Approved Contractors For a current list if approved contractors, please contact the University of Melbourne Security System Manager Appendix B Electronic Security Management Systems Programming Guidelines Please refer to THE UNIVERSITY OF MELBOURNE ELECTRONIC SECURITY MANAGEMENT SYSTEMS PROGRAMMING GUIDELINES available on request. Design Standards page 28 of 29

29 Appendix C Automatic Door Wiring Diagram Design Standards page 29 of 29

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

Doc 10. UTM Standards: Card Access Security System

Doc 10. UTM Standards: Card Access Security System Doc 10 UTM Standards: Card Access Security System 1. GENERAL... 2 1.1. GENERAL REQUIREMENTS.... 2 1.2. SUMMARY OF WORK INCLUDED... 2 1.3. OVERVIEW... 2 1.4. MANDATORY REQUIREMENTS... 3 1.5. ACCESS CONTROL

More information

Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS

More information

Appendix G. Security management plan

Appendix G. Security management plan Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter

More information

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES PART 1 DESIGN DIRECTIVES 1.1 OVERVIEW SECTION 13825 SECURITY MANAGEMENT SYSTEMS A. The access control, surveillance, and intrusion detection system implemented for use at Dartmouth College is a Lenel International

More information

MANAGEMENT SOLUTION (P.A.M.S.)

MANAGEMENT SOLUTION (P.A.M.S.) DOORKING SYSTEMS ACCESS CONTROL SOLUTIONS PERIMETER ACCESS MANAGEMENT SOLUTION (P.A.M.S.) Revision N, updated 01.12 PERIMETER ACCESS MANAGEMENT SOLUTION (P.A.M.S.) Design Concept How the System Works TYPICAL

More information

Conventional Fire Detection and Extinguishant Control System Specification

Conventional Fire Detection and Extinguishant Control System Specification Conventional Fire Detection and Extinguishant Control System Specification Page 1 of 9 Scope Furnish a complete 24VDC Conventional, electrically supervised, combined fire detection and extinguishant release

More information

SECTION 13850 DETECTION AND ALARM

SECTION 13850 DETECTION AND ALARM SECTION 13850 DETECTION AND ALARM PART 1 GENERAL 1.01 SUMMARY A. Section Includes 1. Control Panel 2 Associated Equipment B. Products Installed But Not Supplied Under This Section 1. Section 16140 - Wiring

More information

Electronic Security Systems. Specifications and. Installation Guidelines Change Document

Electronic Security Systems. Specifications and. Installation Guidelines Change Document Electronic Security Systems Specifications and Installation Guidelines Change Document Changes below are highlighted in RED Version No. Description of Change Date Author Approved 1.12.2 Revision July 2012

More information

NESS D16. 16 Zone Control Panel and Dialler OWNER S MANUAL

NESS D16. 16 Zone Control Panel and Dialler OWNER S MANUAL NESS D16 16 Zone Control Panel and Dialler OWNER S MANUAL REVISION 2, JULY 2001 Ness Security Products Pty Ltd Quality Endorsed Company ISO9001 LIC.No. QEC2074 NSW Head Office only WWW.NESS.COM.AU Australia

More information

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM

38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM 38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM 38.1 GENERAL Scope Modification and extension of the existing CDU Cardax security system and CCTV System including: Cardax (FT 3000 series) Access control

More information

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM GENERAL: To provide minimum standards for Access Control Systems. PART 1 Common Work Results for Access Control System 1.1 Owner will provide server and software for connecting control panels through the

More information

Crime Prevention through Environmental Design (CPTED) - Checklist

Crime Prevention through Environmental Design (CPTED) - Checklist Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the

More information

AC-115 Compact Networked Single Door Controller. Installation and User Manual

AC-115 Compact Networked Single Door Controller. Installation and User Manual AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.

More information

UCL ESTATES SECURITY DEPARTMENT. CCTV, Intruder Alarm & Alarm Monitoring. Specification Guidance Document

UCL ESTATES SECURITY DEPARTMENT. CCTV, Intruder Alarm & Alarm Monitoring. Specification Guidance Document UCL ESTATES SECURITY DEPARTMENT CCTV, Intruder Alarm & Alarm Monitoring Specification Guidance Document CCTV UCL has an extensive Pelco Endura CCTV system comprising of in excess of 500 cameras, a number

More information

Understanding Access Control

Understanding Access Control Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Security Systems Intrusion Alarm

Security Systems Intrusion Alarm Dufferin-Peel Catholic District School Board STANDARD TEXT GUIDELINE FOR Security Systems for SECONDARY AND ELEMENTARY SCHOOLS Prepared by the Plant Department With Assistance from Vision Dynamics Formatted

More information

How To Control A Car Alarm On A Car With A Remote Control System

How To Control A Car Alarm On A Car With A Remote Control System MODEL CA100 REMOTE CONTROL AUTO ALARM SYSTEM INSTALLATION & OPERATION INSTRUCTIONS WIRING DIAGRAM Black Antenna Wire 6 Pin 6 Pin Mini Connector Valet Switch Blue LED Indicator Blue Wire: (-) 200mA Unlock

More information

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3

More information

D24 ALARM CONTROL PANEL USER S MANUAL REVISION 1.1 A$12.00 INC GST

D24 ALARM CONTROL PANEL USER S MANUAL REVISION 1.1 A$12.00 INC GST D24 ALARM CONTROL PANEL USER S MANUAL REVISION 1.1 A$12.00 INC GST Ness Security Products Pty Ltd Quality Endorsed Company ISO9001 LIC.No. QEC2074 NSW Head Office only WWW.NESS.COM.AU Australia s largest

More information

Solution 862 Operators Manual. Issue 1.00

Solution 862 Operators Manual. Issue 1.00 Solution 862 Operators Manual Issue 1.00 Solution 862 Operators Manual Copyright 1998 by Electronics Design and Manufacturing Pty Limited, SYDNEY, AUSTRALIA Document Part Number MA406O Document Issue

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

PAC1 Door Access Controller

PAC1 Door Access Controller PAC1 Door Access Controller Series 2 IMPORTANT DIFFERENCES FROM SERIES 1 1. A PACDL data logger revision 4.0 or higher attached to the DLOG terminal is able to program all features (i.e. times, relay type,

More information

CONTENTS QUICK SETUP & INSTALLATION USER MANUAL. SUPA8 Quick Setup & User Manual

CONTENTS QUICK SETUP & INSTALLATION USER MANUAL. SUPA8 Quick Setup & User Manual SUPA8 Quick Setup & User Manual QUICK SETUP & INSTALLATION CONTENTS FACTORY DEFAULTS... 1 INSTALLATION OF THE SECURITY SYSTEM... 2 COMMISSIONING THE DIALLER PANEL... 5 ZONE INPUT CONNECTIONS... 7 PANEL

More information

NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems

NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems 1.0 Purpose A. The following guideline provides the minimum standards and requirements for fire alarm systems. 2.0

More information

1R / 4-BUTTON SERIES

1R / 4-BUTTON SERIES Button 1 1R / 4-BUTTON SERIES VEHICLE SECURITY SYSTEM Standard Features: Two 4-Button Remote Transmitters Status indicator (LED) Valet / override switch Multi-tone siren Dual stage impact detector Remote

More information

SECTION 16721 FIRE ALARM AND SMOKE DETECTION SYSTEMS

SECTION 16721 FIRE ALARM AND SMOKE DETECTION SYSTEMS SECTION 16721 PART 1 - GENERAL 1.1 SECTION INCLUDES A. Fire Alarm Control Panels B. Manual Fire Alarm Stations C. Automatic Smoke D. Fire Alarm Notification Appliances E. Auxiliary Fire Alarm Equipment

More information

EQUIPMENT SPECIFICATIONS

EQUIPMENT SPECIFICATIONS EQUIPMENT SPECIFICATIONS IC-1600 Intelligent Controller The IC-1600 Intelligent Controller is a fully intelligent panel that has a complete database on board. It operates in conjunction with the Access

More information

D24 USER S MANUAL ALARM CONTROL PANEL AND DIALLER. Ness D24 control panel User s manual A$15.00 INC GST. Revision 2

D24 USER S MANUAL ALARM CONTROL PANEL AND DIALLER. Ness D24 control panel User s manual A$15.00 INC GST. Revision 2 D24 ALARM CONTROL PANEL AND DIALLER USER S MANUAL A$15.00 INC GST Ness D24 control panel User s manual Revision 2 Ness Security Products Pty Ltd Quality Endorsed Company ISO9001 LIC.No. QEC2074 NSW Head

More information

Electronic Security Systems. Specifications and. Installation Guidelines

Electronic Security Systems. Specifications and. Installation Guidelines ELECTRONIC SECURITY SYSTEMS SPECIFICATION & DESIGN GUIDELINES SECURITY IN CONFIDENCE Electronic Security Systems Specifications and Installation Guidelines Version No. Description of Change Date Author

More information

Panic & emergency exit devices

Panic & emergency exit devices CFPA-E Guideline CFPA-E No 2:2007 - Appendix Appendix No: 1 Panic & emergency exit devices FOREWORD This Appendix offers technical solutions according to table 8.1 in the European Guide Line ""Panic &

More information

Alliance System Ordering Guide

Alliance System Ordering Guide Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

Fire Alarm system Installation Guide

Fire Alarm system Installation Guide Fire Alarm system Installation Guide Fire Alarm System Categories Systems designed for Protection of Property only, fall into two classifications P1 or P2. but a manual system is also needed, then this

More information

ABLOY EL490 AND EL590 SCANDINAVIAN RANGE MOTOR LOCKS Flexible multifunctional locking ABLOY EL490 and EL590 motor locks have been developed to further increase both the security and safety of the entire

More information

PRODUCT WARRANTY. Page 20

PRODUCT WARRANTY. Page 20 PRODUCT WARRANTY Manufactured equipment is warranted to be free from defects in material and workmanship for a period of twelve (12) months from date of manufacture as indicated by the date stamp and/or

More information

ICP-CP500. User's Guide ICP-CP500 Codepads

ICP-CP500. User's Guide ICP-CP500 Codepads ICP-CP500 EN User's Guide ICP-CP500 Codepads ICP-CP500 User's Guide 1.0 ICP-CP500 Series Codepads Overview EN 2 1.0 ICP-CP500 Series Codepads Overview The codepad is the communications interface between

More information

ICP-CC488. Installation Guide ICP-CC488 Control Panel

ICP-CC488. Installation Guide ICP-CC488 Control Panel ICP-CC488 EN Installation Guide ICP-CC488 Control Panel ICP-CC488 Installation Guide Notices EN 2 Copyright Notice Unless otherwise indicated, this publication is the copyright of Bosch Security Systems,

More information

Solution 880 Operators Manual ISSUE 1.10

Solution 880 Operators Manual ISSUE 1.10 Solution 880 Operators Manual ISSUE 1.10 Solution 880 Operators Manual Copyright 2001 by, SYDNEY, AUSTRALIA Document Part Number MA408O DOCUMENT ISSUE 1.10 Printed 25 May 2001 This documentation is provided

More information

A VOLUTION. S series. Avolution S Series Security System. ASSA ABLOY, the global leader in door opening solutions

A VOLUTION. S series. Avolution S Series Security System. ASSA ABLOY, the global leader in door opening solutions A VOLUTION TM S series Avolution S Series Security System ASSA ABLOY, the global leader in door opening solutions We know securing and safeguarding your home, family and your business is important to you

More information

GSM ALARM SYSTEM USER MANUAL

GSM ALARM SYSTEM USER MANUAL GSM ALARM SYSTEM USER MANUAL 1. Instruction The alarm system is based on GSM network. With a GSM SIM card, it can be used wherever you want and no need to connect any wire, which is convenient and easy

More information

TS510 & TS500. Installation & User Guide. Compatible Equipment

TS510 & TS500. Installation & User Guide. Compatible Equipment Installation & User Guide Compatible Equipment TS510 REM - Remote Keypad 9040 - Loudspeaker DC54/58 - Digital Communicator SD1+ - Speech Dialler 496525 Issue A 1 of 10 TS510 and TS500 Overview Introduction

More information

ACTIVE 5 ENGINEERING MANUAL

ACTIVE 5 ENGINEERING MANUAL ACTIVE 5 ENGINEERING MANUAL C & K Systems Ltd C031-066 Issue 3 THE ACTIVE 5 INSTALLATION MANUAL. Date: Feb 1997 INTRODUCTION. The Active 5 is a microprocessor controlled intruder alarm panel. It features

More information

FIRE ALARM SYSTEM TECHNICAL SPECIFICATIONS Page 1 of 10

FIRE ALARM SYSTEM TECHNICAL SPECIFICATIONS Page 1 of 10 TECHNICAL SPECIFICATIONS Page 1 of 10 FIRE DETECTION AND ALARM SYSTEM Scope Furnish a complete 24V DC conventional, electrically supervised, zone annunciated, fire detection and alarm system as specified

More information

CSP Combined Series. Telephone Door Entry. with. Proximity Keyfob Access

CSP Combined Series. Telephone Door Entry. with. Proximity Keyfob Access CSP Combined Series Telephone Door Entry with Proximity Keyfob Access PD-094 Issue 3 General Description The CSP series systems are combined Door Entry Telephone and Proximity Access Systems. The entrance

More information

9452/9453 Installation and User Guide

9452/9453 Installation and User Guide 9452/9453 Installation and User Guide Compatible Equipment 9425 Remote Keypad 9040 Internal Sounder 660 Speech Communicator 8440 4-Channel Minicom 496330 Issue 1 1 of 10 9452/3 Introduction The 9452 and

More information

Fire detection equipment

Fire detection equipment PRODUCT CATALOG Fire detection equipment www.apollo-fire.com Apollo Fire Detectors is one of the world s largest manufacturers of fire detectors, modules and notification devices. Established in 1980,

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

HARDWIRED CONTROL PANELS

HARDWIRED CONTROL PANELS USER GUIDE 9651 HARDWIRED CONTROL PANELS Contents 1. Introduction...3 The Alarm System...3 The Keypad...3 About This Guide...5 2. Everyday Operation...6 How Do I Know if the System is Working?...6 Setting

More information

ABLOY DA60 SWING DOOR OPERATOR Installation and commissioning manual Abloy Oy An ASSA ABLOY Group company APPROVALS / STANDARDS Low Voltage directive 7//EEC as amended by the directive 9/68/EEC EMC directive

More information

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE The University of Arizona has implemented a Keyless Access and Security System program to provide a cost effective, efficient, and maintainable means

More information

Engineering Standard

Engineering Standard Public Transport Services Engineering Standard Stations - Bicycle Facilities PART 129013 AR-PW-PM-SPE-00129013 (D073) Document Control Document Status Document Amendment Record Revision Change Description

More information

Fire. The Fire Installers Mate. A guide to fire alarm systems design

Fire. The Fire Installers Mate. A guide to fire alarm systems design Fire The Fire Installers Mate A guide to fire alarm systems design BS 5839 Part 1:2002 A guide to BS 5839 Part 1:2002 Disclaimer This booklet is not intended to be a comprehensive guide to all aspects

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

WaterCress - Critical Infrastructure Protection

WaterCress - Critical Infrastructure Protection What is? - Critical Infrastructure Protection is a range of water protection technology protecting 80% of the UK s potable drinking water. Our portfolio uses a range of sophisticated sensors to protect

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

ICP-CC488 ICP-CC488 EN. Control Panel. User s Guide

ICP-CC488 ICP-CC488 EN. Control Panel. User s Guide ICP-CC488 EN User s Guide ICP-CC488 Control Panel ICP-CC488 User's Guide Notices EN 2 Copyright Notice Unless otherwise indicated, this publication is the copyright of Bosch Security Systems, Inc. ( Bosch

More information

Designing Out Crime Assessment

Designing Out Crime Assessment Designing Out Crime Assessment New Flats (Affordable Housing) Yew Tree Road Moreton Wirral CH46 8UA Construction of flats complex. For Bernard Taylor Partnership Ltd [email protected] Tel 0161 443

More information

FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL

FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL January, 2003 Environmental Health and Safety Florida Atlantic University 777 Glades Rd. Boca Raton, FL 33431 Phone: 561-297-3129 Fax:

More information

CB200W Water Leak Detection Panel Application Guide

CB200W Water Leak Detection Panel Application Guide Checked by: AJC Approved by: JBJ Contents CB200W Water Leak Detection Panel Application Guide 1. Cabinet Specifications... 2 2. Panel Hardware Specifications... 3 3. Panel Configuration... 4 4. Technical

More information

Solution-16 Operators Manual ISSUE 1.60

Solution-16 Operators Manual ISSUE 1.60 Solution-16 Operators Manual ISSUE 1.60 !"#$%&"'()*+ Operators Manual Copyright 2002 by, SYDNEY, AUSTRALIA Document Part Number MA880O DOCUMENT ISSUE 1.60 Printed 22 March 2002 This documentation is provided

More information

Innovative DOOR STATION Solutions

Innovative DOOR STATION Solutions Innovative DOOR STATION Solutions When a visitor arrives at your front door or gate we ring... Your mobile when you are out Your normal telephones in your home Your PABX system in your office Communicating

More information

Users Guide to Keypad Functions

Users Guide to Keypad Functions Users Guide to Keypad Functions MANUAL NO. 700-175-01J ISSUED JAN 2002 VERSION 1.41 Summary of Operation A rm/ disarm [#] + [USER CODE] Quick Quick Quick Panic Fire Medical Away Arm Stay Arm Stay Arm &

More information

User s Information Guide R1A

User s Information Guide R1A HSC505-R Home Security Controller - User Manual Release R1a Pi HSC505 and Pi HSC505R Home Security Controller User s Information Guide R1A Page 1 QD Dynamics (Pty) Ltd reserves the right to make changes

More information

conventional system operation

conventional system operation conventional system operation detection line operation Conventional detection systems normally operate on a 24VDC line. In the standby condition, the detectors will draw a low current, typically less than

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

I.S. 3218 :2013 Fire Detection & Alarm Systems

I.S. 3218 :2013 Fire Detection & Alarm Systems I.S. 3218 :2013 Fire Detection & Alarm Systems Overview of significant changes 26 th March 2014 FPS Ltd Today s Programme Commencement Transition Competence & Qualifications System Certification System

More information

FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011

FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011 FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM DATE: December 8, 2011 ADDENDUM NO. 4 Competitive Solicitation Number ITB 5530-0

More information

NX-10-V3 wireless system. To wire or not to wire?

NX-10-V3 wireless system. To wire or not to wire? NX-10-V3 wireless system To wire or not to wire? Now your security goes where you go Our NX-10-V3 system is fully wireless with a keypad in a designer housing. The hybrid series goes where no security

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

SECTION 16721 FIRE ALARM AND DETECTION SYSTEMS

SECTION 16721 FIRE ALARM AND DETECTION SYSTEMS SECTION 16721 FIRE ALARM AND DETECTION SYSTEMS The equipment requirements of this section apply to the IUB Campus. The IUPUI Campus has a preferred vendor agreement for fire alarm systems. Contact Pat

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

Button 1 Button 2. Button 3 Button 4. Programmed Remote Transmitter. Button Function Condition

Button 1 Button 2. Button 3 Button 4. Programmed Remote Transmitter. Button Function Condition WWW.STELLAR.COM ST9000 SECURITY SYSTEM Button Function Condition 1 a. Arm and lock doors b. Car finder with sound c. Temporary stop alarm from sounding d. Remote lock doors 1 for 2 sec. Panic Anytime a.

More information

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems Content Introduction Preventing unauthorized access by perimeter surveillance Monitoring unauthorized access by indoor surveillance

More information

FIRE ALARM SYSTEM. A. Shop drawings shall be submitted as follows: 1. Manufacturer's published literature. for aspproval.

FIRE ALARM SYSTEM. A. Shop drawings shall be submitted as follows: 1. Manufacturer's published literature. for aspproval. Polk School District Specifications for the New Fire Alarm in the Existing Building Eastside Elementary School FIRE ALARM SYSTEM 1.01 SUBMITTALS A. Shop drawings shall be submitted as follows: 1. Manufacturer's

More information

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18 INHEP DIGITAL IDS S E C U R I T Y Users Guide to Keypad Functions MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18 Summary of Operation A rm/ disarm [#] + [USER CODE] Quick Quick Quick Away Arm Stay

More information

The Challenger Version 8 User Guide

The Challenger Version 8 User Guide Issue III : October 1997 The Challenger Version 8 User Guide CONTENTS Introduction... 3 Glossary... 4 The Challenger Console.. Liquid Crystal Display... 6 Keypad... 7 Indicator Lights... 8 User Identification...PIN...

More information

ODYSSEY. Security System Owner s Manual. Kit No. 08E51-SHJ-100 08E55-SHJ-100. 2004 American Honda Motor Co., Inc. - All Rights Reserved.

ODYSSEY. Security System Owner s Manual. Kit No. 08E51-SHJ-100 08E55-SHJ-100. 2004 American Honda Motor Co., Inc. - All Rights Reserved. Kit No. 08E5-SHJ-00 08E55-SHJ-00 Security System Owner s Manual ODYSSEY 004 American Honda Motor Co., Inc. - All Rights Reserved. Contents Introduction... 3 Emergency Disarming During the Panic Alarm Activation...

More information

NESS D8 ALARM CONTROL PANEL AND DIALLER USER S MANUAL. NESS D8 CONTROL PANEL V4 USER MANUAL Revision 5 A$12.00 INC GST

NESS D8 ALARM CONTROL PANEL AND DIALLER USER S MANUAL. NESS D8 CONTROL PANEL V4 USER MANUAL Revision 5 A$12.00 INC GST NESS D8 ALARM CONTROL PANEL AND DIALLER USER S MANUAL NESS D8 CONTROL PANEL V4 USER MANUAL Revision 5 A$12.00 INC GST Ness Security Products Pty Ltd Quality Endorsed Company ISO9001 LIC.No. QEC2074 NSW

More information

GUARDIAN REFUGE & EMERGENCY VOICE COMMUNICATION SYSTEMS

GUARDIAN REFUGE & EMERGENCY VOICE COMMUNICATION SYSTEMS GUARDIAN REFUGE & EMERGENCY VOICE COMMUNICATION SYSTEMS All Guardian Refuge and EVC Systems are BS9999 & BS5839 Pt9. 2010 compliant, and we offer our consultants assistance for BS5839, BS9999, (Fire safety

More information

IDS X-Series User Manual 700-398-01D Issued July 2012

IDS X-Series User Manual 700-398-01D Issued July 2012 1 2 Contents 1. Introduction to the IDS X-Series Panels... 7 2. Before Operating Your Alarm System... 7 3. Understanding the Keypad LEDs... 8 3.1 Viewing Data on an LED Keypad... 12 3.1.1 LED Status Indicators...

More information

Adaptability to Enhanced Security

Adaptability to Enhanced Security Installer Guide Adaptability to Enhanced Security AdapTec Plus combines power supply and door access controller features in a compact casing for an encrypted and secure I/O function, enhancing door access

More information

PRO PLM Installation Instructions

PRO PLM Installation Instructions PRO PLM Installation Instructions PROFESSIONAL INSTALLATION STRONGLY RECOMMENDED Installation Precautions: Roll down window to avoid locking keys in vehicle during installation Avoid mounting components

More information

FIRE DETECTION AND ALARM SYSTEMS

FIRE DETECTION AND ALARM SYSTEMS HMO Information Sheet No 1 FIRE DETECTION AND ALARM SYSTEMS 1. Introduction When a property is in multiple occupation, the risk of fire breaking out is greater than in an ordinary single family home. Some

More information

Multi Function, User Configurable Remote Vehicle Security System with 4 Button Replaceable Membrane Remote Transmitter

Multi Function, User Configurable Remote Vehicle Security System with 4 Button Replaceable Membrane Remote Transmitter MODEL PRO-9744 INSTALLATION MANUAL Multi Function, User Configurable Remote Vehicle Security System with 4 Button Replaceable Membrane Remote Transmitter This System Allows The Transmitter Buttons To Be

More information

HAM841K ALARM CONTROL PANEL FOR COMMERCIAL AND RESIDENTIAL SECURITY SYSTEMS

HAM841K ALARM CONTROL PANEL FOR COMMERCIAL AND RESIDENTIAL SECURITY SYSTEMS ALARM CONTROL PANEL FOR COMMERCIAL AND RESIDENTIAL SECURITY SYSTEMS USER MANUAL USER MANUAL ALARM CONTROL PANEL FOR COMMERCIAL AND RESIDENTIAL SECURITY SYSTEMS INTRODUCTION The (HA-841K) is a complete

More information

RADAR. 227 www.ncdirect.co.uk

RADAR. 227 www.ncdirect.co.uk RADAR solutions RADAR RADAR Key System 228 RADAR Lockset 229 RADAR Cover Plate 229 RADAR Padlock 230 RADAR Automatic Toilet Entry System 231 RADAR Ramp 231 RADAR Ramp Sign 231 227 www.ncdirect.co.uk RADAR

More information

VEHICLE SECURITY SYSTEM G25/G20

VEHICLE SECURITY SYSTEM G25/G20 VEHICLE SECURITY SYSTEM G25/G20 Limited Lifetime Warranty This vehicle security system is warranted to the original purchaser, to be free from defects in material and workmanship. The manufacturer will

More information

SECURITY ALARM CONTROL PANEL QUICK SETUP & USER MANUAL

SECURITY ALARM CONTROL PANEL QUICK SETUP & USER MANUAL SECURITY ALARM CONTROL PANEL QUICK SETUP & USER MANUAL PINKERTON Quick Setup & User Manual QUICK SETUP & INSTALLATION CONTENTS FACTORY DEFAULTS...1 INSTALLATION OF THE SECURITY SYSTEM...2 COMMISSIONING

More information

Product Specification instalert Rapid Messenger Variable Message Sign

Product Specification instalert Rapid Messenger Variable Message Sign instalert 2 units to cover any application instalert 18 (ia18): 18 x 28 full matrix instalert 24: (ia24): 24 x 60 full matrix Size, Weight without battery ia18: 30 x 20 x 2.74, 29 lbs ia24: Folds to fits

More information

ACCESS AUDIT OF WESTPORT HOUSE

ACCESS AUDIT OF WESTPORT HOUSE ACCESS AUDIT OF WESTPORT HOUSE Large sign on the highway to indicate the entrance to Purbeck District Council Large and wide entrance Entrance showing sign for opening times Entrance sign Main entrance

More information

(68.52) X. June 2000 Supercedes February 2000. xenex CONVENTIONAL FIRE DETECTION & ALARM SYSTEM. we look @ business differently

(68.52) X. June 2000 Supercedes February 2000. xenex CONVENTIONAL FIRE DETECTION & ALARM SYSTEM. we look @ business differently (68.52) X June 2000 Supercedes February 2000 xenex CONVENTIONAL FIRE DETECTION & ALARM SYSTEM.... we look @ business differently XENEX SYSTEM ARCHITECTURE Note: This schematic is for guidance only please

More information