SECTION 12: SECURITY CONTENTS 12.1 INTRODUCTION 3 12.2 PRINCIPLES OF SECURITY CLASSIFICATION 3 12.2.1 Classification Criteria 3 12.2.2 Application to Building Design 4 12.3 OPERATIONAL REQUIREMENTS 6 12.4 ELECTRONIC SECURITY SYSTEMS 7 12.4.1 Building Access Control Design Criteria 7 12.4.2 Door Requirements 9 12.4.3 Electronic Intrusion Alarm System 16 12.4.4 CCTV System 17 12.5 LIGHTING 21 12.6 RADIO EQUIPMENT 21 12.7 INTERFACE WITH THE FIRE PANEL 21 12.8 SECURITY EQUIPMENT (HARDWARE) 22 12.8.1 Electric Door Strike 22 12.8.2 Electric Mortice Lock 22 12.8.3 Magnetic (Static) Locks 22 12.8.4 Control Panels (Challengers) 22 12.8.5 Intelligent User Modules (IUM) 22 12.8.6 Door and Lift Controllers 22 12.8.7 Data Gathering Panels (DGP) 23 12.8.8 Access Cards, Card Readers and Exit Devices 23 12.8.9 Break Glass Units 23 12.8.10 Duress Buttons 24 12.8.11 Door Monitoring 24 12.8.12 DC Emergency Power Supplies 25 12.8.13 240 Volt Power Supplies 25 12.8.14 Passive Infra-Red Detectors 25 12.8.15 Glass Break Detector 25 12.8.16 Intercom System 25 12.8.17 Grey Boxes 25 12.8.18 Key Switches 25 12.8.19 Condition of Equipment 26 12.9 INSTALLATION REQUIREMENTS 26 Design Standards page 1 of 29
12.10 CABLING 26 12.11 SYSTEM TRAINING, AS-BUILT DOCUMENTATIONS AND OPERATIONS & MAINTENANCE (O & M) MANUALS 26 12.12 TESTING & COMMISSIONING 27 12.13 NOTICE OF COMPLETION 28 12.14 APPENDICES 28 12.14.1 Appendix A University Approved Contractors 28 12.14.2 Appendix B Electronic Security Management Systems Programming Guidelines 28 12.14.3 Appendix C Automatic Door Wiring Diagram 29 DESIGN STANDARDS CHANGE LOG JULY 2013 12.2.2 Application to Building Design 5 Grey box requirements added 12.4.2 Door Requirements 10-15 Standard doors summary table added for Features/Hardware and door requirements updated. Comms room door requirements added. Biological Resource Facilities added to exclude requirement for sounders and strobes. Door Actuator Criteria Key switch K2 (IN) location, height and type added. 12.4.4 CCTV Systems 17-20 General Principles Power supply requirements to cameras added. General Camera Requirements New section added. Specific Placement Requirements New section added. Recording Equipment Recording capacity requirement added when new cameras are installed. Requirement for licenses added for all new cameras installed. Recording Requirements HD camera recording quality added. Camera Types Section updated with new requirements. Dummy Cameras New section added. Design Standards page 2 of 29
12.1 INTRODUCTION The section provides the minimum standards for the electronic security design of a new developments and/or upgrades to existing buildings. The building security concept shall be established during the design stage of a project based on a risk based approach. The design consultant shall agree with the relevant stakeholders specific security measures to mitigate the security risks. These security measures shall become the basis to formulate the security concept design. The design consultant shall then develop the complete detailed design based on the security concepts identified. The Project Architect shall consult with the University s Manager (Engineering and Infrastructure), Security and Transport or their designate on security issues affecting a project. The design consultant should also refer to the University s requirements with regards to Keying strategy, Lighting strategy, and information on Emergency Warning Intercom Systems and Fire Alarms elsewhere in these standards. These standards shall be read in conjunction with the University of Melbourne Electronic Security Management Systems Programming Guidelines and the CCTV Location and Standards document. It shall be noted that these design standards only take into consideration of physical security measures employed to deter, detect, and delay unlawful activity. Information Technology security measures are considered to be outside the scope of this document. 12.2 PRINCIPLES OF SECURITY CLASSIFICATION The classification of buildings, or areas within buildings, is based on the degree of damage which could be caused to the University through personal injury; loss of, or damage to property (including intellectual data) or interruption to a critical service. 12.2.1 Classification Criteria The following is a general list of functions of particular concern requiring security consideration: Store rooms containing radioactive material or dangerous chemicals; Computer laboratories, with 24-hour access; Biological resource facilities; Lecture theatres (with an equipment cost of more than $100,000.00); Areas of substantial intellectual or monetary value (e.g. computer software design, saleable medical research etc.); Places handling substantial quantities of money; Areas in which critical administrative functions are carried out (e.g. office of The Vice Chancellor, University Information Division Computer Room, Information Division Plant, Network Distribution Switch rooms, Student Records Office and PABX rooms); General administration offices; Sensitive waste storage; Mission critical plant rooms or infrastructure such that the loss of functions would cripple the day-to-day operations of the University or areas of the University; Design Standards page 3 of 29
Rooms where examination papers are stored; Rooms or buildings containing vulnerable or at risk individuals: be they students or staff, male or female and irrespective of political, sexual or religious orientation. These rooms/buildings should be places where at risk individuals can be expected to spend long periods of time such as accommodation areas and dedicated work/study areas; Areas that may be used on a casual basis would not normally justify protective measures. This list is not meant to be exhaustive. There may be rooms or areas requiring security consideration, but whose functions could not be classified based on the above list. These rooms or areas should be clearly identified by the design consultant based on the risk based approach described in section 12.1. 12.2.2 Application to Building Design The protection afforded to the assets is linked to the hierarchy of space that exists within all environments. The general hierarchy is as follows: Category of Space General Condition of use/access Public Areas that are freely accessible to members of the public. Semi-public Semi-private Private Secure Areas that are accessible to members of the public by invitation but where there are no specific criteria in place. Areas that are restricted to those with a legitimate reason for being there plus invitees that meet agreed criteria. Areas that are restricted to those with a legitimate reason for being there. Visitors are escorted at all times. Areas where access is limited to nominated individuals only. Visitors are not normally allowed but where necessary are escorted at all times. Comments External spaces, buildings with free access. Social environments, sporting facilities and free events. Areas where visitors are required to pay a fee or are subject to some form of screening. Working areas of the University restricted to staff members and students etc. Visitors are carrying out specific tasks. Areas containing critical equipment, facilities or items of intrinsic value. Visitors are normally excluded except for essential maintenance staff. In accordance with the principles of Crime Prevention Through Environmental Design (CPTED), the territorial definition of these spaces shall be clear and unambiguous; in addition, the transit between the spaces shall be reflected in the form and function of the access control measures to be adopted. The greater the difference in status between adjacent spaces the more robust shall be the physical measures, the more stringent the access controls between them and the level of surveillance practiced. Therefore, access to a secure area should be via a controlled door (appropriate to the location and usage), be alarmed and monitored by CCTV; whereas, access to a semi-private area may not require a controlled door, an Design Standards page 4 of 29
alarm or to be monitored unless these are identified as appropriate controls during the risk assessment process. Design principles relevant to security include: Access control design shall take into consideration the needs of disabled users; Passenger lift control functions; Design of the shell of the building; Design of internal user areas; Security of accessible low-level windows etc; Combining all high-security functions to one area of a building; External lighting design; Crime Prevention Through Environmental Design (CPTED); Specific operational requirements of the building or areas. Refurbishments and new building designs shall have, as a minimum but not limited to: An access controlled main entry points in line with these standards; Electronic locking and/or monitoring of all external doors; Access control on student A/H facilities; Access control on lift lobbies and communications rooms; Access control on biological resource facilities and lecture theatres; An interface between the fire panel and the Challenger panel CCTV coverage of the main entry point to a standard commensurate with the location and purpose of the image; CCTV coverage of student A/H facilities and computer rooms to a standard commensurate with the location and purpose of the image; Where required by the University, CCTV coverage of external doors to a standard commensurate with the location and purpose of the image; CCTV coverage of entry/exit points of private or restricted areas to a standard commensurate with the location and purpose of the image; Where required by the University, CCTV coverage of all alarmed locations to a standard commensurate with the location and purpose of the image; Where required by the University, intrusion detection devices to monitor external doors (unless access control is to be installed at an external door); Where required by the University, intrusion detection devices to monitor internal common/public circulation areas; Intrusion detection devices to monitor private or restricted areas; Remote arming stations shall be installed at strategic locations for arming/disarming and to provide alarm status and system status monitoring; and A Remote Arming Station shall be installed adjacent to the Challenger Panel for programming and maintenance purposes. A grey box installed keyed to the University s master key system, supplied by the Key Systems office (See 12.8.17 for installation requirements). Design Standards page 5 of 29
12.3 OPERATIONAL REQUIREMENTS Operational requirements for each camera shall be developed in accordance with AS4806.1-2006 allowing field of view and detection grade to be specified. Australian Standards, Codes and Authorities. Security works must meet all the requirements of national and local Statutory Authorities and shall be in accordance with the following: Standard Reference Description International Standard Reference AS/NZS 3080:2003 AS/NZS 3080:2003/Amdt 1-2009 AS/NZS 3084:2003 AS/NZS 3084:2003/Amdt 1-2007 AS/NZS 3085.1-2004 AS/NZS 3000:2007 Telecommunications Installations Generic cabling for commercial premises Telecommunications Installations Generic cabling for commercial premises Telecommunications installations Telecommunications pathways and spaces for commercial buildings Telecommunications installations Telecommunications pathways and spaces for commercial buildings Telecommunications installations Administration of communications cabling system Basic Requirements Electrical installations (known as the Australia/New Zealand Wiring Rules) AS 2201.1-2007 Intruder alarm systems Client s premises Design, installation, commissioning and maintenance AS 2201.2-2004 Intruder alarm systems Monitoring centres AS 2201.3-1991 Intruder alarm systems Detection devices for internal use AS 2201.4-1990 AS 2201.4-1990/Amdt 1-1990 Intruder alarm systems Wirefree systems installed in Superintendent s premises Intruder alarm systems Wirefree systems installed in Superintendent s premises AS 2201.5-2008 Intruder alarm systems Alarm transmission systems AS/NZS 2201 Set-2008 Intruder alarm systems set ISO/IEC 11801:2002, MOD ISO/IEC 18010:2002 IEC 60839-1-1 Ed. 1.0 B (1998) Design Standards page 6 of 29
AS 4360 HB 167:2006 ASTM F571-87 (2201) AS/NZS 60950.1:2003 AS 4806.1-2006 AS 4806.2-2006 AS 4806.3-2006 AS 4806:4-2008 Risk Management Security risk management Standard Practice for Installation of Exit Devices in Security Areas Information Technology Equipment Safety General Requirements Closed Circuit Television (CCTV) Management and Operation Closed Circuit Television (CCTV) Application Guidelines Closed Circuit Television (CCTV) PAL signal timings and levels Closed Circuit Television (CCTV) Part 4: Remote Video IEC 60950-1 Cor 1 Ed. 1.0 E (2202) IEC 60950-1 Ed. 1.0 B (2201) Building Code of Australia and building permit conditions; Environmental protection agency; WorkSafe requirements; Health & Safety regulations; Electricity supply authorities; Fire brigade requirements; Fire engineering requirements; Green Star or ESD requirements; The rules and regulations of local government; All other relevant codes and standards. 12.4 ELECTRONIC SECURITY SYSTEMS The UTC Fire and Security V8 Challenger intruder detection and building access control system shall be specified for intrusion detection and access control applications in University buildings and/or areas. IndigoVision compatible Network Video Recorders shall be specified for recording CCTV cameras for surveillance and monitoring purposes. 12.4.1 Building Access Control Design Criteria Online Access Control System The microprocessor based control unit shall be a fully redundant system (that shall remain in operation if the Forcefield network is offline) with a distributed processing network topology. Whilst operating, the system shall grant or deny access through a door to a card holder based on the presentation of a properly encoded card to an authorised card reader at a valid time of day, day of week and card status. Each individual card transaction, both Design Standards page 7 of 29
through entry or egress card readers, shall log as a separate event at each door, i.e. entry shall be distinguishable from egress at the same door. The system shall be wired on a dedicated security local area network (LAN). Battery backup shall be provided to maintain normal access control operations including all memory and the real time clock calendar for not less than 8 hours should mains power fail. The battery shall be automatically recharged when mains power is applied. When the dedicated security LAN becomes offline, all events and transactions shall be retained in its memory. These events and transactions shall automatically uploaded to the database of the Challenger management software when the security LAN connection re-establish. All events and transactions shall be stored in the central database with time & date stamps. The time & date stamps shall be referenced for security data retrieval. The Challenger management software in use at the University of Melbourne is the Forcefield Enterprise edition. All building security systems shall be connected to the Forcefield network and shall be programmed as per the University of Melbourne Electronic Security Management Systems Programming Guidelines (Appendix B). Noting that not all Forcefield management software functionalities are required. The Security Contractor shall refer to the capabilities of the Forcefield management software and liaise with the end-user to identify specific features or functionalities for implementation. Specific requirements shall include (but not limited to) the following: In principle, the design should encourage persons (staff, students, visitors and contractors) entering or leaving a building through the same access control points. The design should limit the number of public access control points. As far as practical, public access should be limited to one door; Doors shall be named according to convention; Floors shall be named according to convention; Forcefield 4 door controllers (4DC) shall be named according to location; Label all panels (including 4DC), security equipment and cables according to a labelling scheme agreed with the University during installation; Provide regulated power supply and battery system to back up the operations of the access controller and electronic door locking devices for 8 hours when there is a mains failure. Refer to section 12.8.12 for details; Label all batteries with the installation dates; Master barrels shall be installed in all access control door lock; All handles on strike doors shall be locked to avoid doors to be forced open; Install door closers on all monitored doors. The design consultant shall discuss with the stakeholders to identify other specific requirements for implementation. Design Standards page 8 of 29
Electronic Key System Electronic key system shall be Cyberlocks or approved equivalent. Electronic key cylinders shall be installed at locations identified in the security risk assessment (For example University IT Comms rooms). A user shall be able to turn the cylinder and open a door if the user carries a valid electronic key (with pre-programmed data). The transaction or event shall be kept within the memory of the electronic key. The data shall be uploaded to the system database when the user presents the key to an online reader. At the same time when an user presents his/her key to an online reader, the programmed data stored in the electronic key memory will be updated (e.g. to update the list of accessible doors, to bad-list a key, to delete a door from the accessible door list, etc.). 12.4.2 Door Requirements The following sections detailed the security door hardware required for each type of door. The design consultant shall recommend the required door type for each access control point based on the outcomes of the security risk assessment. If a required door hardware configuration does not match any one of the door types, the design consultant shall consult the security delegate of the University to agree with the proposed configuration. It should be noted that not all door hardware (e.g. lever, handle, thumb turn, key cylinder, door seal, etc.) are included in the following sections. These door hardware are normally included in the door hardware schedule under the architectural package. The design consultant is required to coordinate with the Project Architect to ensure all security-related door hardware is included in the door hardware schedule. Bottom rail locks and Euro cylinder are not to be installed unless specifically approved in writing by the Security Systems Client Services Coordinator. Main Entry Doors Where double doors are installed, the inactive leaf shall be secured with a lockable Orb panic bolt of no less than 300mm on the bottom of the door and a Dalco panic bolt no less than 400mm on the top of the door. Alternatively another Orb lockable panic bolt could be installed at the top of the door of no less than 500mm in length, keyed to the external master key system. The design consultant shall arrange for the University Security Systems Client Services Coordinator to supply the correct cylinder prior to installation. Design Standards page 9 of 29
Standard Doors FEATURES / HARDWARE ENTRY: Proximity card reader installed on the unsecured side of the door (See section 12.8.8) EGRESS: Proximity card reader installed on the secured side of the door EGRESS: Push button installed on the secured side of the door unless an electric mortice lock is used Electric door strike, electric mortice lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise) Break glass door release unit. The breakglass unit shall be installed on the secure side and shall be monitored DOOR TYPE A B C D E X X X X X X X X X X X X X X X X X X Reed switch door monitoring X X X X X Orb lockable panic bolt on fixed leaf (where applicable) X X X X ADI or other University approved Blocker plate installed (where applicable) X X X X X Automatic door closer X X X X Door status indicator X Magnetic lock(where applicable) X Doors shall be configured to open out Custom signage No external door furniture The door shall be configured to fail safe and provide free egress at all times X X X X Design Standards page 10 of 29
Type A Door (Full Access Control) These doors shall have the following hardware/features: ENTRY: Proximity card reader installed on the unsecured side of the door (See section 12.8.8); EGRESS: Proximity card reader installed on the secured side of the door; Electric door strike, electric mortice lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Break glass door release unit. The breakglass unit shall be installed on the secure side and shall be monitored; Reed switch door monitoring; Orb lockable panic bolt on fixed leaf (where applicable); ADI or other University approved Blocker plate installed (where applicable); Automatic door closer. The following shall be noted: All Type A doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each entry/egress card transaction at each door shall be logged as a separate transaction in the access control system database. Type B Door (Partial Access Control) These doors shall have the following hardware/features: ENTRY: Proximity card reader installed on the unsecured side of the door (See section 12.8.8); EGRESS: Push button installed on the secured side of the door unless an electric mortice lock is used; Electric door strike, electric mortice lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Break glass door release unit. The breakglass unit shall be installed on the secure side and shall be monitored; Reed switch door monitoring; Orb lockable panic bolt for fixed door leaf (where applicable); ADI or other University approved Blocker plate installed (where applicable); Automatic door closer. The following shall be noted: Design Standards page 11 of 29
Any Partial Access Controlled Door shall be cabled such that a future upgrade to a Type A door shall not require any additional cabling between the "Intelligent 4-door Controller" and the future Egress Proximity card reader. All Type B doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each entry card and push button transaction at each door shall be logged as a separate transaction in the access control system database. Type C Door (Controlled/monitored door) These doors shall have the following hardware/features: Electric door strike, electric mortise lock or magnetic lock. The Security Contractor shall select the appropriate door lock device to suit the specific door type; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Break glass door release unit; Reed switch door monitoring; Door status indicator; Orb lockable panic bolt for fixed door leaf (where applicable); ADI or other University approved Blocker plate installed (where applicable); Automatic door closer; Door status indicator. The following shall be noted: Each access controlled, controlled/monitored door shall have a unique address in the system, which shall allow separate programming and control of the door. The function of automatic arming & disarming and locking & unlocking of controlled/monitored doors shall be carried out individually via time zones. All doors shall be individually monitored for alarms and all transactions & events shall be logged in the access control system database. All Type C doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each transaction shall be logged in the access control system database. Type D Door (24 Hour emergency exit door) These doors shall have the following hardware/features: Electric door strike, electric mortice lock or magnetic lock; Break glass door release unit; Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Orb lockable panic bolt for fixed leaf (where applicable); No external door furniture; Design Standards page 12 of 29
The door shall be configured to be fail safe and provide free egress at all times; Reed switch door monitoring; Doors shall be configured to open out; Custom signage; ADI or other University approved Blocker plate installed (where applicable); Automatic door closer; Door shall be configured to open out; Custom signage; No external door furniture; The door shall be configured to fail safe and provide free egress at all times. The following shall be noted: Each 24-hour emergency door shall have a unique address in the security system, which shall allow separate monitoring, programming and control of the door. The status of each individual door shall be displayed on the main system computer. Entry/egress through these doors shall be restricted at all times. All Type D doors shall be controlled by UTC Fire and Security Intelligent 4-door controllers. Each transaction shall be logged in the access control system database. Type E Door (Monitored Door) These doors shall have the following hardware/features: Magnetic lock (where applicable); Break glass door release unit (where applicable); Local door alarm sounder for DOTL and Forced Door alarms (except in biological resource facilities, unless approved otherwise); Reed switch door monitoring; ADI or other University approved Blocker plate installed (Where Applicable); Automatic door closer Monitoring shall be activated/deactivated by time zone; Magnetic lock (where applicable). The following shall be noted: Each transaction shall be logged in the access control system database. Comms Room Doors Access control door type A or B (minimum) fitted with Padde ES9000 and Cyberlock key system as opposed to the traditional physical University master key system unless otherwise approved by the Security Systems Manager or their delegate. Design Standards page 13 of 29
Biological Resource Facilities Local alarm sounders and strobes shall be excluded from installation into these facilities unless otherwise approved by the Security Systems Manager or their delegate. Electro-Mechanical Doors The installation of an electro-mechanical operated bi-parting door (e.g. main entry doors) shall be discussed between the Project architect, the University University s Manager (Engineering and Infrastructure) and any other contractor or University staff member the architect feels is necessary. The selection of the correct door actuator is vital. Where electronic access control is installed, the system shall be programmed to lock/open the main entry doors on the basis of a user defined time schedule. Proximity card readers shall allow access outside normal business hours. The high-level wiring configuration to achieve this has been illustrated in Appendix C. Door Actuator Criteria The door actuator shall provide: 240 volt operator; Constant rated 5 kg torque capacitor start and run squirrel cage motor; Continuously rated motor; Self-lubricating planetary gearbox with spiral bevel drive; Micro-processor control with a programmable feature that incorporates solid state switching of the motor; The micro-processor shall have a non-volatile memory which remains intact during a power failure; Automatic reversing if obstructed during closing sequence with fully adjustable sensitivity setting; Automatic stop and retry after adjustable delay if obstructed during opening sequence; Safety creep speed facility allowing doors to reduce speed before reaching location of previously detected obstruction; Chain drive with average tensile strength of 1950 kg; Dual sets of safety PE beams; Audible alarm at the door (for DOTL and forced door alarms); Battery backup for a minimum of 50 operations in the event of mains power failure. In the event of an electrical power failure, the battery backup system would keep the doors locked and secure; The ability to physically monitor the doors when open; The ability to physically monitor the doors when closed; Installation of a separate electric lock or rotor lock; The ability to monitor the status of the electric lock; Design Standards page 14 of 29
Fail safe mode allowing a person to open the doors manually when there is a mains failure; Entry radar detector; Exit radar detector; K2 two position spring return key switch keyed to the building master key system (IN); K4 four position key switch (auto/exit/open/locked) keyed to the building master key system (OUT). The electronic access control system shall interface with the door actuator at lowlevel. When access control functionalities are activated (e.g. during afterhours), the entry and exit radar detectors shall be deactivated accordingly. The design consultant shall arrange for the University Security Systems Client Services Coordinator to supply the correct cylinder in the K2 (IN) & K4 (OUT) key switches prior to installation. Key switches K2 (IN) for electro-mechanical doors shall be installed no more than one metre from the door at a height of 900-1200mm unless otherwise approved by the Security Systems Manager or their delegate. The Lock-it-well override key switch, or equal equivalent, keyed to the University master key system shall be used. The door actuator shall be equipped with an inverter fail safe system providing 50 cycles of the door operation under a power failure condition. The door operator shall provide separate individual alarms to the security system (Forcefield) when: there is a 240 volt power failure at the door; low battery voltage is detected at the door; there is a fault with the battery charger. All alarms shall simultaneously be reported to the Campus Security Centre directly and appear at the Forcefield Server & workstation to alert an operator. Sliding Door (Non-auto) For non-automatic sliding doors, the FSH MEM4400 series automatic sliding door locking device is preferred. The contractor is required to provide relevant information to coordinate the installation with the architect and the door supplier. Bicycle Hubs Access Control: The following equipment shall be provide: Unicard M series Reader Slim; Padde Single Magnetic lock; Door closer/self closing hinges; CCTV Camera HD IndigoVision Compatible; Breakglass; Egress Button; Black powdercoat pedestal to suit breakglass & egress. Design Standards page 15 of 29
12.4.3 Electronic Intrusion Alarm System Intrusion alarm system to be installed in new development or upgrade shall be based on UTC Fire & Security Challenger equipment. The alarms are monitored from the Security Control Room at 213 Grattan Street. Specific requirements shall include (but not limited to) the following: Appropriate intrusion detection devices shall be placed at locations or areas identified in the risk assessment; The design consultant shall select the appropriate device types to meet the specific requirements; Communication with Forcefield Server - the Challenger TS 0899 TCP/IP computer interface shall be used on all new projects and shall be programmed for event driven data transfer. It shall be noted that the University s Manager (Engineering and Infrastructure), or his designate, shall arrange for a TCP/IP port to be provided adjacent to the Challenger TCP/IP computer interface. The University Project Manager shall also be responsible for acquiring an appropriate IP address from the University of Melbourne Information Services; Remote Arming Stations (RAS) - all RAS shall be the eight area Challenger TS 0801 device unless other specified by the University Project Manager. All new Challenger systems shall be provided with a master control RAS adjacent to the Challenger panel; Alarms shall simultaneously be reported to the Security Central Control directly. The Security Control Room is located 213 Grattan Street; At each door, sounder shall be installed locally. When an alarm is triggered, the sounder shall go off to providing alarming signal locally; All alarm inputs shall be terminated with end-of-line resistors recommended by the manufacturer; Each alarm device shall be wired to a separate input allowing each device to be monitored individually; Alarms shall be monitored for 4 states (i.e. normal, alarm, tamper (open circuit) and tamper (short circuit)); Provide regulated power supply and battery system to backup the operations of the intrusion detection system for 8 hours when there is a mains failure. Refer to section 12.8.12 for details; The design consultant shall arrange for an Austel Licensed structured cabling contractor to connect the intrusion alarm system to the Forcefield management software by patching through the Security TCP/IP Network; All inputs shall be named according to convention; As required, alarm inputs shall be tied with outputs providing the capabilities to interface third-party system or to switch on/off an alerting devices, e.g: After a DOTL alarm is acknowledge, the sounder shall be deactivated automatically; When an alarm is triggered, switch on the lights installed within the alarmed area. Design Standards page 16 of 29
Interface with the CCTV system allowing the recording frame rate of the CCTV camera covering alarmed area to increase. The design consultant shall discuss with the stakeholders to identify other specific requirements for implementation. 12.4.4 CCTV System General Principles The use of Closed Circuit Television (CCTV) equipment at the University of Melbourne is to assist security personnel to provide staff and students with a safe environment in which they can work and study. This is primarily achieved with CCTV through: Active observation; Providing a visual deterrent; The recording of images; For the CCTV system to be effective in this support role, the hardware needs to: Meet a minimum set of physical requirements; Be of a sufficient durability; Provide a suitable number of images; Work in a variety of locations and environments; Provide an appropriate quality of image. To assist continuity of operation all power for University CCTV cameras shall be derived from the Comms room to which it has been cabled back to. The use of local GPO s (general purpose outlets) to power CCTV cameras is not permitted. General Camera Requirements All cameras and recording devices installed at the University must comply with the Design Standards; No camera will be fixed to a heritage building environment without the appropriate approvals; Planning and placement of all underground infrastructure, including pull boxes, must be approved by Asset Services, Engineering and Infrastructure team and comply with the Design Standards; Placement of external camera poles will be subject to discussion and agreement with Security, Campus Planning and the University Grounds Section; As part of the installation commissioning process, all cameras must be adjusted (if required) to ensure the best possible picture is achieved during the hours of darkness; Wherever possible cameras will be placed at a height that allows them to be safely accessed for repairs and maintenance without the need for specialised access equipment; External cameras will be of a vandal proof design with no loose cables or easily vandalised mounting brackets; Traffic control zone cameras must be mounted so as to provide optimum views without impeding the flow of traffic or coming into contact with pedestrians or vehicles; Design Standards page 17 of 29
In accordance with applicable legislation, cameras will not be used to capture or view private activities unless clear and obvious signage is placed within the area in which the activities take place. Cameras will not be installed in private areas such as toilets or change rooms Specific Placement Requirements The purchase or installation and placement of any security CCTV camera must be authorized by the Manager, Security and Transport, or delegate Cameras must be located according to the following rules; Vehicle access points to the campus Purpose Vehicle number plate capture, facial identification of pedestrian traffic, remote monitoring of traffic flows (vehicle and pedestrian) and remote management of vehicle access Camera Requirements All traffic control zone cameras must, as part of the installation commissioning process, be adjusted to ensure the best possible picture is achieved given lighting levels and the impact from vehicle headlights. Car park entrances and exits Purpose Vehicle number plate capture, facial identification of pedestrian traffic, remote monitoring of traffic flows (vehicle and pedestrian) and remote management of vehicle access Camera and Siting Requirements All traffic control zone cameras must, as part of the installation commissioning process, be adjusted to ensure the best possible picture is achieved given lighting levels and the impact from vehicle headlights. Monitoring of car park entrances required identification of the card number plate and /or driver (front of car/van or truck). The angle and the placement of the camera must take into consideration reflections from sunlight and bright car/street lights. External cameras at building entry and exit points Purpose Monitor pedestrian traffic entering or going past building entry points. Siting Requirements Cameras must be sited so as to provide full body and facial identification of pedestrian traffic (singular or groups) in the entry or around the doorway. Depending on the building environment, the camera may be attached to the subject building or to another building, and provide a visual link with cameras in the immediate area. Internal cameras at building entrance Purpose Monitor pedestrian traffic entering or departing through a building entrance. Siting Requirements The placement of an indoor camera facing a doorway entrance must capture facial features for evidentiary purposes. A 3/4 body view is necessary for the best facial view and lighting needs are to be taken into consideration in order to avoid shadowing of the face. Images must be capable of manipulation by CROs to provide a visual link with other cameras in the building. Cameras must be safely mounted to avoid impeding the natural flow of traffic and to prevent contact with persons and objects. Design Standards page 18 of 29
Help phones and other designated safe zones including light corridors Purpose Monitor traffic along designated light corridors and heavy traffic routes and provide CCTV coverage of University help/information phones Siting Requirements Cameras must be sited to provide full body and facial identification of pedestrian traffic (individual or group) in the area. On activation of the Blue Phone emergency button, cameras must automatically focus on the blue phone. The camera must also be capable of manipulation by CROs to provide a visual link with other cameras in the area. Reception areas and premises where monetary transactions take place Purpose Monitor activity at University reception areas and areas where monetary transactions take place. Siting Requirements Cameras must be sited to provide full facial identification of customers presenting at service counters. Cameras must respond by immediately focusing on the centre of the service counter when an alarm/duress button is activated. Areas of critical infrastructure or where biological resources or dangerous chemicals are housed Purpose Monitor activity in areas containing biological resources, critical infrastructure/equipment, information technologies or communication networks which, if rendered inoperable for an extended period, would significantly impact on the functioning of the University. Examples include generators, senior management offices, major IT server locations, biological resource facilities or dangerous chemical storage areas. Siting Requirements Cameras must be sited so as to provide full facial identification of anyone entering the area. Cameras may be alarm activated to immediately focus on the area when an alarm is activated. Areas containing objects of high value or desirability Purpose Monitor activity in areas containing objects of high value or desirability. Areas include library precious book collections and objects in the Ian Potter art gallery. Cameras are predominantly used to monitor activity and provide evidentiary material in the event of theft. Siting Requirements The cameras must be capable of manipulation by CROs to provide a visual link with other cameras in the area. Camera placement must capture facial features for evidentiary purposes. A 3/4 body view is necessary to achieve the best facial view. Lighting must be considered to avoid shadowing of the face. Areas subject to petty theft, vandalism, or graffiti. Purpose Monitor activity in areas where there is a history of criminal damage or where temporary installations may pose a risk. Such areas may include library spaces and other student study areas, 24 hours computer labs and high profile buildings. Cameras must provide evidentiary material in the event of a theft or other criminal activity. Siting Requirements Cameras must be sited in such a way as to provide full facial identification of anyone entering the areas. Design Standards page 19 of 29
Recording Equipment The IndigoVision Network Video Recorders (NVR s) or compatible shall be specified for recording CCTV Camera for security purposes. Prior to installation of cameras, recording streams/licenses shall be confirmed with the Security department. Where any new installation will require additional recording capability to maintain the current standard (recording capacity 30 days storage) the security contractor shall be responsible for providing an additional NVR. It is the responsibility of the security contractor to ensure all new devices have the appropriate licences required to capture CCTV images onto the University of Melbourne s IndigoVision network. All recording equipment shall be connected to the University of Melbourne network and configured to synchronize their clocks with the University NTP server. Recording Requirements All CCTV cameras shall meet the following recording requirements: Recording capacity: 30 days; Background recording: 8 fps; Alarm / Event triggered recording: 25 fps; Recording format (for IP cameras): H.264; All HD cameras shall record at a minimum of 4096 kbps upon alarm or event; All cameras shall be recording 24/7 unless otherwise approved in advance by the Security Systems Manager or nominated delegate. Camera Types Cameras shall be compatible with the IndigoVision recorders and Control Centre management software. HD cameras shall be used unless it is deemed not suitable in advance by the Security Systems Manager or nominated delegate. To be compatible with the IndigoVision recorders and Control Centre management software all cameras installed should be selected from the IndigoVision range of products or ONVIF compatible products certified as compatible by IndigoVision. All cameras shall be supplied with Enhanced Management Software license. It is the responsibility of the security contractor to ensure all new devices have the appropriate licenses required to stream CCTV images onto the University of Melbourne IndigoVision network. Dummy Cameras Dummy cameras will not be used in any space owned or occupied by the University. It is the responsibility of the security contractor to ensure any newly installed device is operating and recording as soon as practical after its physical installation. Locations Guidelines Exact camera specifications will be based on the application of the cameras. This can be determined by referring to the information set out in section 12.4.4 of these standards Design Standards page 20 of 29
Operational Requirements The University shall define the operational requirements for CCTV systems using the parameters set out in the Australian Standard AS4806.2-2006. The definition shall include: 12.5 LIGHTING Coverage grade identification, recognition, detection, monitoring and vehicle number plate visual recognition; Image size at maximum target distance percentage of picture height; Field of view (FoV); Maximum target distance; Mounting height; The main external entrance to a building shall be well lit after dark. External lighting shall be controlled by a photoelectric cell not by a time clock. At locations or areas where digital recording CCTV cameras will be installed, the location or placement of light fittings will be critical. The security lighting from the building shall extend to the appropriate Campus Security Light Corridor. In order to allow high quality video image to be captured, the lighting level shall be a minimum of 15 lux at a horizontal level of 1.5 metres above the finished floor level. The contrast ratio between the maximum to minimum (average) lighting level shall be no greater than 1:3. Perimeter doors and other ground level points of potential access shall be well illuminated by security lighting after dark as per the Australian Standards (AS/NZS 1158.3.1). The design consultant shall coordinate closely with the lighting designer to achieve the required lighting level. 12.6 RADIO EQUIPMENT Underground car parks shall have a radio repeater installed to facilitate communications on the Motorola digital radio network in place at the University. 12.7 INTERFACE WITH THE FIRE PANEL The Challenger system shall interface with the fire panel at low-level. When a fire alarm is triggered, a relay output shall be provided by the fire panel. When this relay output is received by the Challenger Panel, the Forcefield security management software shall release all controlled fire escapes automatically. The design consultant shall coordinate with the fire engineer or building services engineer to detail the requirements in the specification. The design consultant shall also liaise with the fire engineer or building services engineer in relation to the specific fire regulation or BCA requirements that are required to be implemented for the new development or upgrade. Design Standards page 21 of 29
12.8 SECURITY EQUIPMENT (HARDWARE) 12.8.1 Electric Door Strike Electric door strikes shall be PADDE ES 2000 completed with dead-latch facility or other as approved by the University. Door guards shall be specified to prevent tampering with Padde electric strikes. Each door strike shall be completed with: Keeper security status monitoring (i.e. wired for both N/O & N/C); Each Padde strike shall be configured for fail safe mode, unless specified otherwise by the University Security Delegate. 12.8.2 Electric Mortice Lock Electric mortice lock (with dead latch) shall be LOCKWOOD 3574AM2R/L--SC or other as approved by the University. The electric mortice lock shall be configured for fail safe mode, unless specified otherwise by the University security Delegate; The lock cylinder shall be keyed to the University Master key system. It shall be noted that the Lockwood dead latch is not suitable for all applications; Cable transfer devices shall be specified as Lockwood LC8810 or LC8811 stainless steel concealed recessed flex conduit. 12.8.3 Magnetic (Static) Locks Magnetic locks shall be PADDE FR1200B 24VDC/250 MA or LOCKNETICS range or others as approved by the University; The design consultant shall obtain permission from the Project Manager prior to specifying magnetic locks; Magnetic locks shall require separate power supplies each completed with battery back-up and failure monitoring. 12.8.4 Control Panels (Challengers) All new control panels shall be Challenger TS0816 (version 8). Challenger panels connected to the Forcefield access control management system shall be equipped with an 8MB IUM. Tamper switch must be installed for each panel to monitor the status of the enclosure. 12.8.5 Intelligent User Modules (IUM) All IUM s connected to the Forcefield access control management system shall be Challenger TS0884 with 8MB memory. The IUM s shall enable the Challenger system to handle multiple card formats and protocols simultaneously. 12.8.6 Door and Lift Controllers All door controllers shall be Challenger TS 0867 Intelligent 4 door controllers with the TS0329 enclosure. All lift controllers shall be Challenger TS 0869 Intelligent 4 lift controllers with the TS0329 enclosure. All lift controllers shall be fitted with IUM s. The memory size of the IUM s shall subject to the requirements of each project. Design Standards page 22 of 29
Tamper switch must be installed for each controller to monitor the status of the enclosure. 12.8.7 Data Gathering Panels (DGP) All Data Gathering Panels (DPG s) shall be Challenger TS0820. It shall be noted a standard TS0820 comes with 8 inputs and 8 open collector outputs. Subject to the requirements of each project, input/output expansion boards may be required to increase the capacity of the DGP. Available expansion modules are TS0021 (8 input expansion module), TS0840 ( 4 way relay board), TS0841 (8 way relay board) and TS0842 (16 way open collector controller). The DGP s shall be housed within the Challenger TS0304 enclosure. Tamper switch must be installed for each DGP to monitor the status of the enclosure. 12.8.8 Access Cards, Card Readers and Exit Devices Access Cards Access cards (Staff, Student or Visitor cards) shall be issued by the University of Melbourne Campus Operations Group. Access cards shall be fully compatible with card readers. Card Readers Unicard Mifare 26 bit wiegand card readers shall be used on all new installations. If the installation is part of an existing mag swipe card reader system, the existing card readers and associated cabling shall be upgraded to the Unicard 26bit Wiegand card readers. All card readers are preferred to be installed at a height between 1000-1200mm providing easy access to disabled persons. If a DDA consultant is engaged by the University for a particular project, advice shall be sought from the consultant in relation to the required mounting arrangement. Request-To-Exit Push Button Where required, the design consultant shall specify Green mushroom head SEADAN SSE, 4350, DP/DT or similar as approved by the University. The push buttons shall be installed at a height between 1000-1200mm adjacent to the controlled door. 12.8.9 Break Glass Units Break glass release units shall be double-pole KAC WW2200/SW, SEADAN kw200/sw/b or similar University approved. They shall be installed at a height of between 1000-1200mm adjacent to the secure side of the door. When the glass is broken in an emergency, the controlled door shall: Unlock automatically (1st pole); Initiate an alarm (2nd pole). All break glass units shall be monitored for tamper and shall be installed in the secure side of access control points. Design Standards page 23 of 29
12.8.10 Duress Buttons All new duress button installations must be accompanied by the installation of a CCTV camera, (see 12.4.4 for CCTV System principles & requirements). The location of the camera is to be confirmed with the University of Melbourne Security Systems Manager or nominated delegate prior to installation. Duress Hold-Up Button (Hard Wired) Where required, the design consultant shall specify from the Honeywell 269R/270R/269SN Range of hold-up devices or approved equivalent. Duress Hold-Up Button (Wireless) Where required, the design consultant shall specify from the Honeywell 269R/270R/269SN. Range of hold-up devices or approved equivalent. 12.8.11 Door Monitoring Reed Switches SENTROL 1078 1 (one inch) reed switch shall be specified for all doors connected to the access control or intruder detection systems. Each encapsulated reed switch shall consist of an individual magnet to be installed in the door leaf. Under normal situation, the magnet shall be installed at 100mm from the leading edge of the door. Whilst the switch and the end of line circuitry (ELOR) shall be mounted in each door jamb head at the location matching the mounting location of the magnet. The magnet to operate the reed switch shall be concealed by recessing into the door leaf and the gap between the reed switch and magnet shall not exceed 4.0 mm. For wide gap and roller door applications, other reed switches would be required. The design consultant shall propose brand and model to suit the application to the University for approval. For applications which require surface mount reed switches, the design consultant shall propose the brand and model to the University for approval. Door Status Indicators Door status indicators shall be specified for all Type C doors. Each door status indicator shall consist of: Clipsal series 2000 plate; Green LED (engraved: Door Available ); Red LED (engraved: Door Un-available ). The design consultant shall specify custom mounting brackets where required. Local Door Sounders All local door sounders shall be Fulleon AWD sounder (RS Stock No. 626-141) or other as approved by the University. They shall be triggered via software programming (Macro) and driven off a separate relay on a DGP or an expansion module, but not via the relay on the 4 Door Controller. The local door sounder shall go off for a programmed period of time when a DOTL or door forced alarm is triggered. Design Standards page 24 of 29
12.8.12 DC Emergency Power Supplies 12-volt/24 volt DC battery backup regulated power supply and battery system shall be specified to maintain power to the electric locks and security systems (including access control, intrusion detection and CCTV systems) for an 8 hour period should normal mains power be disrupted. The backup power supply system shall be fully monitored by the Forcefield security system. 12.8.13 240 Volt Power Supplies All security panels and other equipment & devices shall be wired on circuits dedicated to security. A Lock-dog shall be installed on each associated circuit breaker. Each 240V GPO shall be labelled with ESSENTIAL SECURITY EQUIPMENT DO NOT DISCONNECT. 12.8.14 Passive Infra-Red Detectors Where required the design consultant shall specify from the Bosch Tritech range of PIR s, or other University approved intruder detectors. 12.8.15 Glass Break Detector Where required the design consultant shall specify from the Bosch DS110i Series Glass Break Detectors, or other as approved by the University. The contractor is invited to submit a sample of their recommended unit to the University for approval during the design stage. 12.8.16 Intercom System Where required the design consultant shall specify from the Commend range of equipment for intercom applications. 12.8.17 Grey Boxes As per Section 8 of the University Design Standards all buildings classified Category 3 and above are required to have a University of Melbourne grey box installed for emergency service access. This includes all refurbishments and new building designs unless otherwise specified by the Security Systems Manager or nominated delegate. Grey boxes are keyed to the University s master key system and are supplied (cylinder included by the Client Services office. The following installation requirements apply; To be installed at main entry within 500mm adjacent to FIP or MIMIC panel whichever is applicable To be fixed at a height of 900-1200mm to a concrete pillar To be fixed using Dyna bolts at a minimum depth of 300mm (4 fixing points) The installation of a grey box is considered critical and should be completed as part of a project handover. 12.8.18 Key Switches Where required, for electromagnetic doors and/or lifts or other applications, the design consultant shall specify that the Lock-it-well override key switch (or approved equivalent) with cylinder keyed to University master key system shall be used. The following installation requirements apply; To be installed no more than one meter from door at a height of 900-1200mm unless otherwise approved by the Security Systems Manager or delegate. Design Standards page 25 of 29
12.8.19 Condition of Equipment All equipment supplied to the University must be new. The use of Refurbished or second hand materials and parts is not permitted. Parts that include a manufacturers stamping should not exceed 18 months. 12.9 INSTALLATION REQUIREMENTS All security installations shall be performed by businesses and individuals holding a Private Security License in accordance with the Private Security Act 2004. Electronic security devices shall only be installed and programmed by a specialist University of Melbourne Campus Operations approved Security Contractor. The Security Contractor must be Forcefield Enterprise accredited. Evidence of this accreditation shall be required prior to a log on to the management software is provided. Specific requirements shall include: 12.10 CABLING The control of security devices shall be centralised via the Forcefield management software; Security data of all security devices shall be maintained in a single database (Forcefield management software database); The University prefers that the Security Contractor shall be a direct Sub-contractor to the Builder - not to the Electrical Contractor; Create graphical maps of the development or areas allowing icons of doors, breakglass units, Challenger panels (including 4DC), cameras, DVR s, remote arm station, PIR, etc. All cabling on Challenger LAN (Local Area Network) equipment shall be Belden 8723 or equivalent with a separate earth wire (2.5mm2 Green/Yellow); The cabling from the door controllers to the readers shall be shielded 7-core (14/0.20mm2) cable with cable runs not exceeding 50m as per manufacturer s specifications; Figure 8 cable (min 24/0.20mm2) shall be used on electric locks; All Break Glass Units, Egress Buttons, Duress Buttons, Reed Switches, Local Sounders, PIR s and Door Status Indicators shall use 4-core (14/0.20mm2) cable; Cat6 standard cable shall be used to connect IP equipment (e.g. IP cameras) to data point or network switches. The IP cabling standards for the University can be found here http://www.unimelb.edu.au/about/it-policies The security contractor shall submit samples (with technical product data sheet) of all cable types for approval before procurement. 12.11 SYSTEM TRAINING, AS-BUILT DOCUMENTATIONS AND OPERATIONS & MAINTENANCE (O & M) MANUALS The security contractor is required to provide the following to the University: System training to the operators. The training should be tailored to meet the project specific features and functionalities of the systems installed. The security contractor Design Standards page 26 of 29
shall liaise with the University to identify the training needs including breakdown the trainings into levels to meet the operational requirements and the preparation of training materials; As-built documentation the security contractor shall prepare the as-built documentation to document the as-installed status of the security systems. This shall include (but not limited to the following): As-built layout drawings; As-built schematic wiring diagrams; Conduit layout (if any); O & M Manuals the security contractor shall prepare the O & M manuals to document the following: Product data sheets; Operating procedures of the security systems; Maintenance procedures of the security systems; User guide; Call-out procedures; Troubleshooting guide; Test results; Final commissioning checklist; The design consultant must include all these requirements in the specification. 12.12 TESTING & COMMISSIONING The testing & commissioning shall be a two-stage process. The security contractor shall undertake internal testing to check the functionalities of every device and equipment against the performance of the security systems specified in the specification. The test results shall be recorded in test results record sheets, which shall be submitted to the design consultant for review and approval. The security contractor shall also submit a test plan to detail the steps or procedures to verify the performance of the security systems against the specification. The test plan shall be submitted to the design consultant for review and approval. The approved test plan shall become the reference document for final commissioning. Upon the approval of the test results & the test plan and the security contractor is satisfied that the security systems are ready for final commissioning, the security contractor shall organise with relevant stakeholders (including representative from the University, representative from the managing contractor and design consultant) to witness the final commissioning of the systems. The test plan shall cover (but not limited to): The verification of all system functions and facilities sufficient to demonstrate the correct installation and operation of the system as a whole; Both night and daytime tests as applicable to the system components; Operational tests designed to verify the operation of all aspects of the system, together with the interfaces between the various security sub-systems and any nonsecurity systems e.g. Fire Panel. Design Standards page 27 of 29
The test plan shall be thorough in its testing and recording, and shall effectively demonstrate all performance and operational aspects of the specified security systems. The form of the document shall be mainly a check sheet of system operations, functions and facilities with space to insert numerical values where applicable. A separate column or space shall be provided for comments to be inserted. Provide at least two persons to conduct the tests and hand-held radios such that they may carry out tests and demonstrations in accordance with the test plan for relevant stakeholders to witness. In the case of CCTV testing, supply all test targets and recording equipment as may be necessary for the tests. The security contractor shall note that final adjustment on cameras (e.g. focus, angle of view and field of view) may be required to achieve the operational requirements. With the security contractor undertaking internal testing before final commissioning, it is reasonable to expect that tests can proceed without delays due to wiring errors or poor adjustment. As part of the testing & commissioning process, the security contractor shall note that a copy of the final camera view (after final adjustments) for each camera shall be printed. The copy shall form part of the as-built documentations. The print out of the camera view shall be the reference for the maintainer to adjust the camera view after maintenance works. The design consultant shall include all these requirements in the specification. 12.13 NOTICE OF COMPLETION The security contractor is to ensure that the security systems are completed and commissioned prior to practical completion. This process shall not be considered complete until the Manager, Security andtransport, or his/her designate, has signed off that he/she is satisfied with the installed systems and they are ready to operate. This sign off shall be through the submission of completed test results. The design consultant shall be responsible to witness the final commissioning of the security systems and prepare the final acceptance certification of the completed installation. Upon satisfactory completion of the project the design consultant shall forward the completed test results to the University Project Manager and the Manager, Security and Transport. The design consultant shall invite representatives from the University and the managing contractor to participate in the witnessing of the final commissioning of the security systems. 12.14 APPENDICES 12.14.1 Appendix A University Approved Contractors For a current list if approved contractors, please contact the University of Melbourne Security System Manager. 12.14.2 Appendix B Electronic Security Management Systems Programming Guidelines Please refer to THE UNIVERSITY OF MELBOURNE ELECTRONIC SECURITY MANAGEMENT SYSTEMS PROGRAMMING GUIDELINES available on request. Design Standards page 28 of 29
12.14.3 Appendix C Automatic Door Wiring Diagram Design Standards page 29 of 29