An Experimental Access Control System For Enhancing Security And Safety In University Campuses
|
|
|
- Sandra Dickerson
- 10 years ago
- Views:
Transcription
1 Scholars Journal of Engineering and Technology (SJET) ISSN X Sch. J. Eng. Tech., 2013; 1(3): Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) Research Article An Experimental Access Control System For Enhancing Security And Safety In University Campuses 1 Olagbegi P.O, 2 Kwasi-Effah C.C, 3 Ugbi B. A 1,2 Department of Mechanical Engineering, University of Benin, P.M.B 1154, Benin City, Nigeria 3 School of Mechanical, Aerospace and Civil Engineering, University of Manchester, United Kingdom *Corresponding author Kwasi-Effah C., Abstract: Security and safety is a critical factor of concern in Nigerian university campuses. Having a secured environment for learning can help students and staffs meet up with their expectations. The electronic security system is a major approach in reducing the risk against deliberate attack by intruders. This paper has shown that, integrating electronic security and lighting system can be a cost effective approach of security management in reducing the cost spent on tightly controlled university security budgets. Consequently, the savings from the security budget can be spent on other educational programs which are more beneficial to students and staff of the university. Keywords: security, safety, campuses, electronic security, lighting, access control, intrusion detection INTRODUCTION Reducing the risk of accident or protecting against deliberate attack in our social environment is a function of the degree of safety and security in our social environment [1]. Using a preferred safety and security measures or technique depends on the absolute environment of application [2]. However some measures could be essential regardless of the environment of concern. All over the world, university campuses face unique challenges in managing the safety and security of students, staff, visitors and structures. The university campus serves as resident to some staff, students and embodiment to research projects, which requires restricted access and closer scrutiny [3]. The campus warrant special vigilance and access of administrative areas or buildings, visitors management, protection of high valued assets and emergency response. Thus, it is necessary to put in place an effective campus security system for the protection of students, staff and safeguard the campus property [4]. In recent years, many campuses in Nigeria have remained unsafe as a result of violent campus crimes. Meaningful academic progress cannot fully be accomplished by students when cult activities disrupt learning as the students experience inherent fear of homicide and assault on campus. Some campus leaders urgently close down campuses to douse the cult members activities and disturbances [5]. Cultists have violated campus safety, students, faculty, and administrators in most Nigerian campuses [6]. In accordance with reports filed by the University of Benin Security Department, the rate of crimes committed on campus is a never ending story, since intruders are never being caught when carrying out an operation and are usually difficult to trace after a successful operation. Recently, a student was murdered in the University of Benin campus during a biometric exercise by unknown gunmen. The entire operation has been claimed successful by intruders since no atom of trace has been provided by security officers. Security officers on campus do their best to reduce crime, they employ few electronic security systems i.e scanners or detectors to exclusively search those who are coming in or going out of the campus against harmful instruments or illegal weapon possession. Yet, we still experience gunshots and murder on campus [7]. The lack of basic infrastructure like lightings in Nigeria campuses has proved disastrous to safety conditions [8]. Security and safety remains a critical factor of concern on our campuses and in Nigeria at large. It is important for the University of Benin to enhance the level of security by incorporating advanced security measures to assist security officers for effective monitoring and control. Such systems include: a. Digital video recorder (DVR) surveillance b. Access control c. Intrusion detectors (Burglar alarms and sensors) d. Fire protection systems e. Security lighting f. Badging ID cards e.t.c These systems address different security needs. However, they can most likely be integrated as a single unit and used effectively. 172
2 SECURITY SYSTEMS Electronic security system Electronic security systems are; Access control, video surveillance and intrusion detection. These systems are independent of the security level needed or specific area to be applied [9]. If these systems are controlled and monitored by competent and capable security officers, there will be an absolute reduction in crime. Consequently, there will an improvement in tracing crimes that has been committed on campus. Access control Access control is the means by which people are granted or denied access to restricted areas, such as residence halls, laboratory, parking garages, and feefor-service areas [10]. In University of Benin, the balance that must be struck in incorporating access controls, as it is in all security issues, is maintaining an open user-friendly environment while establishing safe and secured facilities at all times; including when the school is in session (i.e during working hours), when limited students and staff are present, and when the school facilities are unoccupied. As a component of a complete security solution, access control systems not only manage physical access to facilities and assets, but creates an audit trail that is valuable for both operational and crime solving purposes. Access control often represent the center of an overall security management implementation since the event database that integrates all security-related actions is most typically controlled by the access control systems. Intrusion detection Intrusion detection involves the combination of audible alarms with use of door or window contacts, glass contacts, or motion sensors. The alarm sounds when a person has forced entry into a building or room. An alert is then sent to the security station to notify authorities of the time and location of the incident. Security officers respond in person to treat the situation. This method of incident response can be adequate for detecting an event and quickly getting to the scene [11]. However, the degree of response at the scene and subsequent prosecution is dependent on: a. Approximate location of security personnel to the incident b. Number of people involved c. Witnesses were present d. seriousness of the incident, and other factors Video surveillance system Video surveillance systems are increasingly being used in security systems. The presence of video cameras acts as a deterrent to potential criminals [12]. One of the major advantages of video surveillance is that possible dangers can be detected at early stage. Rapid intervention by security officers will go a long way to save a situation on ground. Video surveillance is an extremely valuable and economical means of improving the security in an area [13]. Video surveillance has evolved significantly in the last decade. Older versions of video surveillance make use of so many video tapes for continuous recording. This may also require manual monitoring or administration in terms of tape swapping. However, recent technology makes use of embedded processors that enables video to be compressed within the device and transmitted. These video devices include: a. Digital video recorder (DVR) b. Network video recorder (NVR) These video systems can continuously record in days, weeks or months, if no security incident should occur. A time-stamping index on the recent video recorder makes it easy to find an incident from a given date and time. Since the video is digitized, it can be shared through s or backups on CDs DVD, media Cards e.t.c. Digital Video surveillance is cost effective and are highly competitive. The user can improve surveillance by integrating access control and intrusion detection systems. Thus the user improves surveillance and reduces the need for additional security personnel. Lighting systems Security lights can be used as a preventive or corrective measure against criminal activities. Security lights may be provided to aid the detection of intruders or simply increase the feeling of safety. Lighting is integral to crime prevention through environmental design. A simple electric bulb or halogens bulbs can be used to light up an area. Fusing electronic security systems and benefits Access control, video surveillance and intrusion detection systems can be fused together to provide a holistic solution to security challenges faced in the University campus. Security staff at a central monitoring station can view live images from surveillance cameras, or search for video clips stored on digital video recorders (DVRs) with the aid of a fused system. The design may be such that, when an alarm is triggered, it can command the DVR to begin recording, display live video from a linked camera at the location, map the alarm location, and send an to an administrator all at the same moment. Lights can be activated to survey the scene to observe the emergency, depending on the time of day. Lights are also useful for adding extra protection in remote areas, such as parking lots and garages on campus, especially late at night [14]. Universities with diverse populations and building types spread over large areas, integrating various building systems offers numerous advantages. Foremost, integration provides for reduced installation and operating costs because it eliminates component redundancy and allows customers to streamline operations. Fusing electronic security systems reduces training and empowers system operators by allowing 173
3 them to perform their duties more efficiently. Furthermore, integration allows for uniform monitoring and control across a campus and demonstrates that an institution has applied appropriate security strategies at all its buildings. Experimental access control system An experimental access control system was designed within the faculty of engineering, Bniversity of Benin. The system architecture includes the following major components: a. Field Controllers b. Recessed door c. Card Readers/Keypads The flow diagram and circuit description of the system architecture is shown in Figures1 and 2. Reader Field controller box/intelligent system controller Recessed door contact Figure 1: Flow diagram of access control system System specification includes the following: * Intelligent System Controller (ISC): 4 - LNL-1000 cut sheet. * Input control, output control modules, and card reader interface modules are served by the ISC with operational characteristics as follows: AC input: 12 VAC+/- 15%, 600mA RMS; DC input: 12VDC+/- 15%, 350Ma, 3-volt lithium battery back-up, type BR2325. * Alarm: Two Form-C relay contacts, 5A 30VDC or 125VAC, resistive. End-of-line (EOL) resistors are 1000 ohm, 1% tolerance. * Magnetic card reader and 12 VDC electromagnetic locks with 1600 lbs. of holding force. Maximum current is 0.67 amps with residual magnetism within one second of 4 LBF, and inductive kick-back with maximum 53 volts. Operating principle Swiping the card through the reader or, (Magnetic cards), will transmit the data to the field controller. The field controller then compares this data to a verified database of information. If the cardholder is confirmed to have valid access to the door at the reader location, the door locking mechanism is released, and the user may enter. Another method of authorized entry is through a keypad. Figure 2: Circuit description of the access control system Here the user is required to enter a specific PIN - Personal Identification Number. Figures 3, 4 and 5 shows the picture of the experimental mechanism built within the faculty of engineering. These systems shown are integrated with an output alarm. 174
4 DISCUSSIONS A single integrated security system allows security officers to view an incident within a single or common interface. All hardware including video, alarm and printing equipment, can work seamlessly within its framework. One major advantage of fusing security system is that, it reduces the overall hardware and software requirements. This leads to fewer training issues. Figure 5. Dean of engineering entrance door Figure 3. Barrier entrance to Mechanical Engineering Department The following can maximally be prevented by incorporating electronic security and lighting systems; a. Crime can easily be prevented b. Murder/non-negligent manslaughter c. Negligent manslaughter d. Forcible sex offenses e. Non-forcible sex offenses f. Robbery g. Aggravated assault h. Burglary i. Motor vehicle theft j. Arson k. Kidnapping Adequate lightingin the right places is important to the safety and security of school s property, staff and students. Figure 4. Entrance from Civil Engineering Department CONCLUSION AND RECOMMENDATIONS Safety and security is everybody s business. We all have a role to play in keeping our campus safe. Each of us can help promote campus safety by keeping our eyes and ears open and immediately reporting all crimes and public safety problems or concerns. Students require a safe and secured environment for quality learning in other to meet up with their high expectation. Fusing electronic security systems is a cost effective approach which has the capacity to enhance security and safety in university campuses. So far, this paper has been able to highlight the benefits associated with electronic security systems based on the access control experimental design. It is recommended that university campuses in Nigeria should invest more on the electronic systems in other to cut down on the budget raised for security and 175
5 consequently increase budgets towards investing on new programmes that will be of optimum benefit to students. It is also, recommended that safety and security measures should be taught as a general course for the enlightenment of students in other to take caution, since safety and security is everybody business. References 1. Ramachandran J. Designing Security Architecture Solutions. John Wiley & Sons Publishers, Integrity in Automated information System. Technical Report 79-91, Library No. S237, 254., National Computer Security Center, Olagbegi P.O., Kwasi-Effah C.C., Ugbi B. A. Assessment of Health and Safety practice in engineering workshop. International Journal of Engineering Sciences, 2013; 2(7: Jaeger T., and Tidswell J. E. Practical Safety in Flexible Access Control Models. ACM Transactions on Information and System Security, 2001; 4(2): Patricia I.I, Management of campus safety at the university of Benin. Proqeust dissertation, University of Benin Adebayo C. How safe are Nigerian Campuses. Available at Oguntola O., Ogu EW., Omorodion I. and Ehinmisan O..Office environment, health and safety. Department of Mechanical Engineering, University of Benin Technical Report., School safety and security measures - Fast Facts available at 9. Hu V. The Policy Machine for Universal Access Control. University of Idaho Technical Report., Ramaswamy C. and Sandhu R. Role Based Access Control Features in Commercial Database Management Systems. 21st National Information Systems Security Conference, Crystal City, Virginia, Sandhu. R. and Munawer Q. (). Configuring Role Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 2002; 3(2): Atkins D., Buis P., Hare C., Kelley R., Nachenberg C., Nelson A. B., Phillips P., Ritchey T., Sheldon T., and Snyder J. Internet Security Professional Reference. Second Edition, New Riders Publishing, Indianapolis. 1997; P- 668, 13. Barkley J. Comparing Simple Role Based Access Control Models and Access Control, Lists. Proceeding Second ACM Workshop on Role-Based Access Control, page Van-Bommel W.J. Non-visual biological effect of lighting and the practical meaning for lighting for work. Applied Ergonomics, 2006;16:
Integration: The Future of Commercial Office Building Security
Commercial Offices Integration: The Future of Commercial Office Building Security Providing security in commercial offices involves more than the best choice of products and features. Learn how security
2014 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (161581001) User ID: C1615811
2014 Campus Safety and Security Survey Institution: Main Campus (161581001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be
2014 Campus Safety and Security Survey. Screening Questions. Institution: Hebrew College (166045001) User ID: C1660451
2014 Campus Safety and Security Survey Institution: Hebrew College (166045001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will
2013 Campus Safety and Security Survey Institution: Main Campus (153445001) User ID: C1534451
213 Campus Safety and Security Survey Institution: Main Campus (1534451) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be asked
Criminal Offenses - On campus
2014 Campus Safety and Security Survey Institution: Colorado Springs Campus (439701005) Criminal Offenses - On campus For each of the following criminal offenses, enter the number reported to have occurred
2014 Campus Safety and Security Survey. Screening Questions
2014 Campus Safety and Security Survey Institution: Northshore Technical Community College-Sullivan Campus (160667001) Screening Questions Please answer these questions carefully. The answers you provide
2014 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (221397001) User ID: C2213971
2014 Campus Safety and Security Survey Institution: Main Campus (221397001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be
Research Article. ISSN 2347-9523 (Print) *Corresponding author Nathan David Email:
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):868-873 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
2015 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (392354001) User ID: C3923541
2015 Campus Safety and Security Survey Institution: Main Campus (392354001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be
Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014
Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition
Federico Beauty Institute. Campus Safety and Security Handbook
Federico Beauty Institute Campus Safety and Security Handbook I. Campus Geography Federico Beauty Institute is located & controls 1515 Sports Drive, Sacramento, CA 95834. This is The School s only location.
SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS. Harry S Truman College
SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS Harry S Truman College I. MESSAGE FROM THE PRESIDENT DR. REAGAN F. ROMALI Harry S Truman College enrolls more
Riverside Community College District Policy No. 3515 General Institution
Riverside Community College District Policy No. 3515 General Institution BP 3515 REPORTING OF CRIMES Reference: Education Code Section 67380 34 Code of Federal Regulations Section 668.46(b)(7) The Chancellor
Creating Safe Campuses with Integrated Security Solutions
Creating Safe Campuses with Integrated Security Solutions Providing security for colleges universities involves more than the best choice of products features. Learn how security systems such as access
Palm Beach State College Security Plan
Palm Beach State Security Plan Prepared by: J.E. Smith Date: September 17, 2008 INTRODUCTION This Security Plan describes the organization, activities, methodology, and documentation by which Palm Beach
WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform
WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry
IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA
CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA The following statistics are provided as part of the requirement under the Student Right- To Know and Campus Security Act, Public Law 101-542,
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.
ATM AND BANK SECURITY
Robbery & Burglary Security Solution A AND BANK SECURITY www.fogsecure.com.ng OVERVIEW Security For Nigerian Businesses and Homes Against Robbery With the increasing rate of violent crimes in Nigeria,
Invisible EYE for Security System
Invisible EYE for Security System 1 C.Chandravathi, 2 Geetha, 3 Shanmugapriya, 4 Kavitha 1 [email protected], 2 [email protected], 3 [email protected], 4 [email protected]
Crime Statistics. Criminal Offenses, Dalton State College: Main Campus- 650 College Drive Dalton, GA 30720
Crime Statistics Criminal Offenses, Dalton State College: Main Campus- 65 College Drive Dalton, GA 372 Type of Offense On-Campus Residential Housing Non-campus Public Property Criminal Homicide Murder/Non-negligent
Retail Solutions. Why Tyco Security Products for Retail?
Retail Solutions Why Tyco Security Products for Retail? We are a leading provider of integrated retail security solutions, deployed today at more than 80 percent of the world s top 200 retailers. Tyco
Security for Railways and Metros
Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,
Hospitals Meet Security Challenges With Integrated Solutions
Healthcare Hospitals Meet Security Challenges With Integrated Solutions Providing security for hospitals involves more than the best choice of products and features it also requires best practices. Learn
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
TECHNICAL EDUCATION CENTER OSCEOLA ST. CLOUD ANNUAL SECURITY REPORT
TECHNICAL EDUCATION CENTER OSCEOLA ST. CLOUD ANNUAL SECURITY REPORT HISTORY The Technical Education Center Osceola (TECO) opened its doors in April of 1994. TECO provides initial Workforce Development
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One
Preparation of Disclosure of Crime Statistics
Preparation of Disclosure of Crime Statistics Carlos Albizu University prepares this report to comply with the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act. The full text
Campus Security and Safety Report Madison Center September, 2015
Campus Security and Safety Report Madison Center September, 2015 This information is being provided to all students and employees as part of Upper Iowa University's - Madison Center commitment to safety
Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)
Select Agent Program Workshop November 16, 2012 Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Revisions to Regulations 11 (a) through 11 (c)(7): (b) and (c)(2) changed
Buckeye Career Center Adult Education 545 University Drive NE New Philadelphia, Ohio 44663 (330) 308-5720 www.buckeyecareercenter.
Buckeye Career Center Adult Education 545 University Drive NE New Philadelphia, Ohio 44663 (330) 308-5720 www.buckeyecareercenter.org July 1, 2015- June 30, 2016 Buckeye Career Center Adult Workforce Education
LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business
LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM Your Connected Business LYNX Touch Protected and Connected Honeywell s LYNX Touch self-contained business
2015 Campus Safety and Security Survey. Screening Questions
2015 Campus Safety and Security Survey Institution: La Sierra University-Ontario Campus of Criminal Justice (117627003) Screening Questions Please answer these questions carefully. The answers you provide
Campus Safety and Security Survey 2015
Campus Safety and Security Survey 2015 Criminal Offenses On campus Total occurrences On campus Criminal offense 2012 a. Murder/Non negligent manslaughter 0 0 0 c. Sex offenses Forcible 3 2 2 f. Aggravated
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008
THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008 ARRANGEMENT OF REGULATIONS Regulation Title PART I PRELIMINARY PROVISIONS 1. Short title 2. Application 3. Interpretation
College Safety Offices. www.ecc.edu 716-851-1ECC
College Safety Offices North Campus Spring Student Center Room 5 Phone 85-4 South Campus Building 5 Room 5 Phone 85-6 City Campus Main Building Room Phone 85- For emergencies call 76-7-4545 or 9 www.ecc.edu
Moravian College Department of Campus Safety & Police Campus Security Authority Reporting Form. Date of report: Name of campus security authority:
Date of report: Name of campus security authority: Date that incident occurred (mm/dd/yyyy): If multiple incidents were reported or if the date the incident occurred is unknown, please note below: Reporting
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
School of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report Emergencies:
School of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report (known as the Clery Report) Emergencies: Dial [(619) 582 4002] ([911
Totally Wireless Video Security
Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment
BUILDING SECURITY & ACCESS CONTROL
Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of
Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:
Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated
ATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information
ATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information Accreditation & Licensure Net Price Calculator Transfer & Bypass Credit Policy
Campus Crime Awareness
1 of 5 2/24/2009 9:22 AM Campus Crime Awareness Title II of the Student Right to Know and Campus Security Act, know as the Campus Crime Awareness and Campus Security Act of 1990, requires that colleges
Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you
Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department
11. PUBLIC SAFETY DATA & ANALYSIS
11. DATA & ANALYSIS I. University Police Department The mission of the University of Florida Police Department (UPD) is to preserve a safe, secure campus environment where diverse social, cultural and
Campus Security Authority - What it is and Its Functions
Campus security authority cite 34 CFR 668.46(a) The Clery Act regulation Campus Security Authority is a Clery-specific term that encompasses four groups of individuals and organizations associated with
ITT Technical Institute, Orlando, Florida Safety and Security Policies with Crime Statistics Report CRIME STATISTICS
ITT Technical Institute, Orlando, Florida Safety and Security Policies with Crime Statistics Report CRIME STATISTICS In each of the specified calendar years, the following number of crimes were reported
Crime Statistics. The Clery Act requires colleges and universities to publicly publish three years of campus crime statistics.
Crime Statistics The Clery Act requires colleges and universities to publicly publish three years of campus crime statistics. Daytona State College crime statistics have been disclosed in compliance with
Northwestern Michigan College Campus Security and Safety Report and Annual Fire Safety Report
Northwestern Michigan College Campus Security and Safety Report and Annual Fire Safety Report Containing statistics for 2012, 2013 and 2014 1701 E. Front St. Traverse City, MI 49686 (231) 995-1111 The
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out
Watching Your Business Fire & Security Solutions
Watchdog Business Security Access Control CCTV Security Intruder Alarms Fire detection & Extinguishing Watching Your Business Fire & Security Solutions Watchdog Business Security Watching Your Business
SECTION 13850 DETECTION AND ALARM
SECTION 13850 DETECTION AND ALARM PART 1 GENERAL 1.01 SUMMARY A. Section Includes 1. Control Panel 2 Associated Equipment B. Products Installed But Not Supplied Under This Section 1. Section 16140 - Wiring
Campus security Report
Campus security Report Updated as of January 2014 The school s campus security report; CRIME STATISTICS In accordance with the Jeanne Cleary Disclosure of Campus Security Policy and Campus Crime Statistics
SECURITY SOLUTIONS BANKING AND FINANCE
SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of
Hospitals Meet Security Challenges with Integrated Security and Facility Solutions
Hospitals Meet Security Challenges with Integrated Security and Facility Solutions by Steve Nibbelink, CHPA January 2012 / White paper Make the most of your energy SM Summary Executive summary...3 Healthcare
Think Remote Monitoring Think Concept Pro Think VXM4B
The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not
Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.
Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats
Reliable Security Solutions
Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom
Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring
Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate
The Banking and Financial Institutions (Physical Security Measures) Regulations, 2014
GOVERNMENT NOTICE NO 291 published on 22/08/2014 THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2014 ARRANGEMENT OF REGULATIONS Regulation Title PART I PRELIMINARY 1.
Connect and extend your site and asset security
Whitepaper Connect and extend your site and asset security M2M for business security M2M.vodafone.com M2M for business security What this paper is about Security is an industry in flux. While in many cases
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Cisco Physical Access Manager
Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used
This report provides the executive summary for Indicators of School Crime and Safety: 2014.
1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and
The Farmville Police Department
HONOR `` The Farmville Police Department 2015 State of the Department Annual Report 1 Farmville Police Department 2015 Annual Report Table of Contents Chief s Message....3 Agency Accomplishments..4-6 Measureable
Current Products. www.bandmcommunications.com. B and M Communications LLC. The following is a list of our current offerings and services:
www.bandmcommunications.com Current Products The following is a list of our current offerings and services: 2400 W Medtronic Way STE 7 Alarm System Installations, 24 Hour Monitoring and Interactive Services.
Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com
Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3
Annual Security Report LONE STAR COLLEGE SYSTEM
2012 Annual Security Report LONE STAR COLLEGE SYSTEM Department of Public Safety 2012 Annual Security Report System Services and Training Lone Star College Cy-Fair Lone Star College Kingwood Lone Star
CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3
CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION INSTRUCTOR: OFFICE HOURS: Semester Hours Credit: 3 I. Introduction A. This course covers the fundamentals of criminal investigations
CRIME STATISTICS. The U.S., Major Cities and Detroit. Presentation to. Leadership Detroit
CRIME STATISTICS The U.S., Major Cities and Detroit Presentation to Leadership Detroit Kurt Metzger Center for Urban Studies Wayne State University February 1, 24 Uniform Crime Reporting (UCR) Program
Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems
United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water
White paper Mobile duress alarm systems
White paper Mobile duress alarm systems Table of Contents Table of Contents...1 What is a Mobile Duress Alarm System?...2 Who Needs a Mobile Duress Alarm System?...2 Finance...3 Application Note: Bank
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
A&B UPON A POLICE OFFICER OR OTHER LAW OFFICER A&B WITH A DANGEROUS WEAPON
Department of Mental Health and Substance Abuse Services Oklahoma Forensic Center (OFC) Persons Court-Ordered As Treat to Competent List of Pending Charges (Summarized From Available Court Records) PRISONER
Securing Remote and Outdoor Assets Using Video Verification
Securing Remote and Outdoor Assets Using Video Verification About CRC 24/7, utility-focused Contact Center and Central Station specializing in: Consumer Call Handling, Line Crew Dispatch, and Alarm Monitoring.
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Appropriate response: A guide to security system integration, monitoring and verification
Appropriate response: A guide to security system integration, monitoring and verification The benefits of integrating intruder, fire, access control and audio systems with CCTV for verification of alarm
WITURA CORPORATION SDN BHD
WT 1010SA Stand Alone GSM Alarm System User Manual and Installation Instructions Version: 1.2 Updated: 4 JAN 2012 WITURA CORPORATION SDN BHD Stand Alone GSM Alarm System Instruction Manual 1 Introduction:
