Docstoc

Master Spec

Document Sample
Master Spec Powered By Docstoc
					POLICY AND PROCEDURES


        FOR


 ELECTRONIC SECURITY



       SYSTEMS
                                                    TABLE OF CONTENTS



I. INTRODUCTION......................................................................................................... 1

II. GUIDELINES FOR BUILDING SECURITY AND SECURITY INSTALLATIONS ...... 1
   1. Purpose:..................................................................................................................................... 1
   2. Definitions:................................................................................................................................ 1
   3. Responsibilities of the Parties: .................................................................................................. 2
   4. Security Systems: ...................................................................................................................... 3

III. PROCEDURE FOR REQUESTING NEW SECURITY SYSTEMS............................ 5
   1. The Installer/Contractor– Responsibilities................................................................................ 6
   2. The Security Systems Section – Responsibilities ..................................................................... 8
   3. Campus Property & Services/Project Manager - Responsibilities............................................ 9

APPENDIX A: HARDWARE SPECIFICATION .......................................................... 12
 A. Cardax Hardware Specification ............................................................................................. 14
 B. Locksmith Hardware Specification ........................................................................................ 17
 C. Dial-up Alarm Hardware Specification.................................................................................. 22
 E. Tamper Loops Specification................................................................................................... 26
 F. General Hardware Specification ............................................................................................. 27
                          SPECIFICATION


I. Introduction

The University has in place a comprehensive and integrated Campus wide security system,
monitoring most of the main Camperdown and Darlington Campus buildings as well as the
facilities at remote Campus sites.
The system is comprised of “Cardax” access control and alarm equipment and a
communications receiver and alarm receiver software to monitor alarm panels at remote
locations. This system communicates with an on site Central Monitoring Station. CCTV
installations are monitored and recorded locally, but communication is also returned to the
Central Monitoring Station.
The following guidelines delineate the roles and responsibilities of the parties involved in
electronic security installations.

II. Guidelines for Building Security and Security Installations

1. Purpose:

These guidelines describe the roles and responsibilities of the parties involved relating to
the security of buildings including security systems and installations.

2. Definitions:

 2.1    Security - the state of being safe from physical harm and from loss or
        damage to property.

2.2     The University Security System - a network of movement detectors, access
        control devices, other alarm devices and CCTV usually connected to the
        Central Monitoring Station or some central point on certain remote
        campuses.

2.3     Individual Security installations - The combination of detectors, alarms,
        barrier devices and locks which secure an individual building or area within
        a building.

2.4     Security Service - the University organisation responsible for overall
        campus security.

2.5     User/Occupant - University staff or students or other party occupying or
        planning to occupy the facility in question.

2.6     Campus Property & Services - is the University organisation responsible for
        planning and managing building and construction work and maintenance
        on the University’s facilities.
010906 Policy & Procedures for Electronic Security Systems                                 1
3. Responsibilities of the Parties:

3.1     The Occupant is responsible for the security of the buildings and, in some
        cases, the campuses they occupy during the time the buildings are in use.
        They are also responsible for ensuring an area is secure on closing and
        departure. Where a building attendant is provided, part of the attendant’s
        role is to assist the Occupant maintain security in the building.

3.2     Ways in which Occupants can maintain security include:

        3.2.1 Encourage staff to lock away valuables at all times and valuable
        portable equipment when absent from the office /workplace.
        3.2.2 Encourage staff to lock rooms and offices when no one is there.
        3.2.3 Encourage staff to challenge people who are in the area and
               unknown to the department using non-confrontational means such
               as “Can I help you” – suspicious responses should be reported
               immediately to Security. Staff should never place themselves in
               positions of personal risk.
        3.2.4 Report unusual occurrences, suspicious behavior, threatening
               situations and perceived security risks to the Security Service on
               extension 13487 (or extension 13333 in emergencies only).
        3.2.5 Install a security detection and alarm system.
        3.2.6 Use passwords to protect data and ensure information systems data
               is regularly backed up to a secure and remote location
        3.2.7 Install tamper loops for computers or lock down computers (see
4.6).
        3.2.8 Do not leave valuable equipment on display (close blinds at night,
               limit equipment visibility in the day, etc).
        3.2.9 Ensure staff and students do not allow tailgating through secured
               doors.
        3.2.10 Ensure doors are not propped open, particularly at fire exits.
        3.2.11 Maintain good control of issues keys, access cards and code (no
               sharing, swapping etc)
        3.2.12 Take responsibility to ensure work area is secure on departure/close
               of business.

3.3     The Security Service is responsible for the overall University security,
        particularly the grounds of various campuses and buildings when
        unattended, including public spaces within the buildings. The Security
        Service also monitors the alarm network that protects University premises.
        It is the role of the Security Service to respond to alarms and requests for
        assistance. (See III, Section B, 2).

3.4     Campus Property & Services (CPS), in consultation with or otherwise
        through the Security Service, is responsible for installation and
        maintenance of physical and electronic systems to secure the perimeter of
        buildings and departments. It is also responsible for duress alarms in
        campus grounds. The ability to install new, or upgrade existing systems, is
        dependent on budget allocated for the purpose (See III, Section B).
010906 Policy & Procedures for Electronic Security Systems                         2
4. Security Systems:

4.1     University campus grounds, although generally fenced, or otherwise
        identifiable cannot be shut off and secured after hours. Security patrols,
        environmental design, external lighting and adequately lit pedestrian routes
        provide a level of security outside the buildings. Duress alarms,
        emergency help points and CCTV are increasingly being provided in the
        grounds of various campuses to augment other security arrangements.

4.2     Building perimeters are protected after hours by locks and electronic
        access control on external doors and where necessary bars and alarms on
        windows. The University has standardised on the use of ‘Bi-lock’ locks for
        all new locks, especially on building perimeters and where access control is
        installed.

4.3     Where the level of security, described above, is inadequate, indicated by
        crime statistics, assessed vulnerability or a functional need, electronic
        alarm systems can be adopted. These systems can include movement
        detectors, detectors on windows and doors, and electronic access control
        and other measures. The University has selected ‘Cardax’ FT
        access/alarm systems and DAS alarm panels as the standard for all new
        installations. These systems are to be connected to the Security Service’s
        Central Monitoring Station

4.4     Internal security includes the security of all spaces inside the building. In a
        single occupied (Faculty/College) building the Occupant is responsible for
        the installation and maintenance of security systems other than those
        relating to the perimeter of the building. CP&S primarily through the
        Security Service will assist Building Occupants with technical advice and
        management and operational support in fulfilling this responsibility.

        In a multi occupied building (more than one college or administration group)
        CP&S is responsible for the systems necessary to protect the public
        spaces. Occupants are responsible for the security of their own areas.
        CP&S primarily through the Security Service will assist affected Occupants
        with technical advice and management and operational support in fulfilling
        this responsibility.

4.5     All systems approved by CP&S will be included on a central database and
        have preventative maintenance (regular servicing) carried out on them.
        This includes systems in the Occupants’ areas at no cost to the Occupant.
        Repair of breakdowns or damage may be charged to the Occupant
        including equipment renewal if needed.




010906 Policy & Procedures for Electronic Security Systems                           3
4.6     Computers in computer laboratories should be fitted with ‘tamper loops’.
        These are cables connecting all computers with each other, which can be
        monitored through the existing alarm infrastructure. An alarm is raised in
        the CMS on removal of a computer out of the loop. The second advantage
        is that the lid of a computer is wired up, therefore preventing the theft of
        memory from the PC. (See Appendix A, Section E)
        Tie-down cables and/or brackets, as a physical barrier to theft, should also
        be used to support this kind of security.




010906 Policy & Procedures for Electronic Security Systems                         4
III. Procedure for Requesting New Security Systems

New security systems must be arranged by CP&S, in consultation with the Security
Service, to prevent the introduction of non-complying systems that may not be monitored
from the Security Central Monitoring Station. CP&S can only fund systems in its area of
responsibility within the limits of available budget. If occupants perceive a perimeter or
public space system is to urgent to wait for prioritised funding, possibly in subsequent
budgets, then occupants may elect to fund the system.
If an occupant perceives a need for an increased level of security in a particular building,
advice should be sought from the Security Service and/or CP&S. Internal security needs
are the budgetary responsibility of the occupant, but are to be designed by CP&S, in
consultation with the Security Service, and installed by a contractor chosen from an
approved list of authorised installers and consistent with the University Purchasing Policy
Perimeter security needs are the budgetary responsibility of CP&S and can only be
progressed by considering the funds available and priority.


a) Procedure for requesting a new security system
The Assistant Director Campus Services, CP&S, will initially assess the case for a new
security system or upgrade. Occupants can write to the Assistant Director Campus
Services, CP&S requesting an increased level of security with the following information:

•    New security system or upgraded systems required
•    Building, level and area affected
•    Circumstances justifying the need for increased security
•    Contact details and Department/Faculty involved
•    Advice on whether access control is needed
•    Proposed funding source

(NOTE: Following initial assessment, these requests may be referred to University
procedures from time to time


Where an occupant is obtaining a new or refurbished building or area the issue of the
appropriate level of security should be addressed through consultation with Project
Managers from CP&S, who are responsible for managing the relocation or refurbishment.
If this issue is not addressed in this fashion, it should be referred in a memorandum as
outlined above. Initial liaison with the Security Service is required during the
planning and the document specification stages of any security upgrade.




010906 Policy & Procedures for Electronic Security Systems                                5
b) Responsibilities for New Security Installations
•     A Department or Occupant requests an assessment of a security installation or
      upgrade from the Assistant Director Campus Services, CP&S (See section II).
•     The Assistant Director Campus Services, CPS, may liaise with Assistant
      Director Campus Planning and Development and, as appropriate, the Director
      CPS of upcoming projects.
•     The Assistant Director Campus Planning and Development will assign a
      Project Manager and advise the Assistant Director Campus Services and the
      Security Systems Section in writing (email advice is appropriate), the nature of
      the project, the name of the Project Manager, and the location of the site.
•     A Project Working Group (including the Project Manager, Manager Security
      Systems and/or Security Systems, Technical Resources Manager, and the
      Occupant), organised by the Project Manager, will assess the needs of the
      Occupant, funds, extent of upgrade required, and will inspect the site if
      required.
•     In circumstances where the meeting described above is attended by
      consultants, retained by the Project Manager to draw plans and provide
      technical advice, draft plans may be prepared by that consultant based on
      information gathered at the meeting. Alternatively, the Security Systems
      Section will provide recommendations on the installation options, based on the
      Project Working Group’s assessment, to the Project Manager, the Occupant of
      the site and the Assistant Director Campus Services.
•     Where recommendations are prepared and supplied by the Systems Section,
      as indicated above, the Project Manager will then arrange draft specifications
      and drawings of the installation through consultants.
•     Draft plans devised by either means indicated above will be returned to the
      Project Manager who will then send a copy to the Security Systems Section (to
      sign off the project specifications and plans), a copy to the Assistant Director
      Campus Services and a copy to the Assistant Director campus Planning and
      Development.
•     The Security Systems Section will sign off on the agreed plans and
      specifications prior to commencement of works.


Following these procedures, the responsibilities for new installations of electronic
systems, installed at the University of Sydney (Cardax-, DAS Alarm Panels-, CCTV- etc.),
will be shared between the Project Manager, installer/contractor, Sydney University
Security Maintenance Contractor and the Security Systems Section as outlined below.
Testing and commissioning of the new installation and signing off on the project will be
managed by the Project Manager with Security Systems Section.

1. The Installer/Contractor– Responsibilities

1.1      Contact Security Systems Section for:

      a) For clarification of these procedures (if required) and any necessary
         additional initial advices about systems compatibility (including Electronics
         and Locks)

010906 Policy & Procedures for Electronic Security Systems                           6
      b) Obtain from Security Systems Section: Tamper Loop Kits, Fibre Optic
         cable, Electric Mortice Locks (inclusive door furniture) and signs for exit
         doors monitored by electronic security, all at a cost to the project.
      c) Unit # availability / Existing controller space availability, Controller ID
      d) To be given card access to test the new unit with appropriate cards issued
         to access site and for initialising purposes
      e) Inform Security Systems Section of time of testing, location of Controller,
         MAC numbers, and to supply licence files.
      f) Provide location and description of particular unit
      g) Ensure compatibility of all installed equipment with existing infrastructure
      h) Advise Security Systems Section prior to connection of new equipment to
         Controllers, controller comms or activating new network based equipment.
      i) Obtain from and return to the Security Systems Section commissioning
         forms for both access control and dial-up alarm systems.

1.2        Supply details to the Security Systems Section relating to input/information,
           relay mapping, alarm zones, alarm descriptions, tamper, not responding
           etc. Forms are available at the Security Systems Section.

1.3        Test operation, including all alarms, in consultation with the Central
           Monitoring Station (9351 3487) and in the presence of a representative of
           the Security Systems Section and the Sydney University Security
           Maintenance Contractor.

1.4.       Return issued access card for the site to the Security Systems Section.
           These cards are available at the Security Service Office, Level 2, Services
           Building, G12.

1.5.1. Supply to the Security Systems Section commissioning sheet/s with
       drawings of equipment, location and cabling details, Installer and Master
       Codes and after hours contacts for emergency, warranty or breakdown call
       outs, date of install, length and type of Communication cable etc.

1.6        Contact Brett Tamasauskas, Technical Resources Management, in the
           Security Systems Section on Ext 13055 to advise Security of MAC address
           details of units installed in the field and any other communication enquires.

1.7        All installed equipment must be wired and programmed accordingly. (See
           Appendix A). All work shall comply with, but shall not be limited to, the
           relevant sections of:

      a)   AS 2201 Intruder Alarm Systems
      b)   AS 3000 Electrical wiring
      c)   Conditions of Supply - Electrical Supply Authority
      d)   Building Code of Australia
      e)   Telecom Australia and Austel Standards
      f)   Master Specification (this document)
      g)   Definition of Responsibilities prepared by Sydney University (Appendix 1)
      h)   Cardax Installation Manuals Vol 1-3.
      i)   FT Installation Guide
010906 Policy & Procedures for Electronic Security Systems                             7
      j) FT User Guide

1.8        Labeling of the equipment as to:

      a)   Controller #
      b)   Unit # or Controller Door #
      c)   Date of install
      d)   ID of installer
      e)   ID code as specified by the Security Systems Section.
           (See Appendix A)

1.9        Any queries regarding the contract and/or management of the project
           contact:
           Project Manager                               TBA
           Security Systems Manager:                          (02) 9351 4303
           Security Systems, Technical Resources Manager:     (02) 9351 3055

1.10       ere fitted, fire trips must be monitored.

1.11       Making good any deficiencies identified by the representative of the
           Security Systems Section or the Sydney University Security Maintenance
           Contractor.

1.12       Ensure that the University Locksmith, Security Systems Section, is
           consulted regarding locking systems for the construction period using
           keying that facilitates the change to the final locking system.

1.13       The hours of work, normally available are from 7.00am to 3.30pm Monday
           to Friday. Other hours may be arranged with the Project Manager if
           required.

1.14       See Section III, b, 5 for additional programming/commissioning
           responsibilities and information.


2. The Security Systems Section – Responsibilities

2.1        Liaise with the installer/contractor

2.2        Liaise with the Project Manager as to the nature of the project

2.3    Advise and recommend suitable electronic and mechanical equipment for
project.

2.4        Assess and evaluate recommended infrastructure on drawings and floor
           plans in meetings with the project manager and user, or from floor plans
           sent to the Security Systems Section by the Project Manager, with
           supporting advice from the Project manager about user/occupant needs.

2.5        Sign off on floor plans, drawings and specifications.
010906 Policy & Procedures for Electronic Security Systems                            8
2.6     Obtain list of cards and/or codes and/or key holders with following details
        from Head of Department (where appropriate):
        a) Name
        b) Access to what area/location/unit
        c) Timeframes
        d) Expiry date
        e) Dayfiles, user groups etc.
        f) Number of cards/codes/keys
        g) Staff or student ID number.
        h) In case of FT installations please contact Security Systems for further
           details

2.7     Obtain commissioning sheet from the installer/contractor.

2.8     Obtain door schedule from Project Manager.

2.9     Arrange programming of Command Centre with access, alarm and
        personnel details.

2.10    Issue and supply swipe cards, codes and maintain cardholder database

2.11    Issue and supply keys and maintain key holder database.

2.12    Arrange communication details from electronic security device to CMS on
        behalf of Project Manager when requested. Please contact Brett
        Tamasauskas, Technical Resources Manager, in the Security Systems
        Section on Ext 13055.

2.13    Arrange/confirm testing and commissioning of installation with the Project
        Manager, installer/contractor, the user/occupant, a representative of the
        Security Systems Section and the Sydney University Security Maintenance
        Contractor. (See section III, b), 5)

2.14    Sign off on project with the Project Manager


3. Campus Property & Services/Project Manager - Responsibilities

3.1     Ensure that the Security Systems Section are informed and consulted with
        regarding projects with security components with sufficient notice to inform
        the planning and budget allocation process.

3.2     Ensure that draft plans and appropriate specifications are provided to the
        Security Systems Section in a timely way for “Sign-off” with adequate lead-
        time prior to undertaking the tender or quotation process.

3.2     Retrieval of removed or redundant/obsolete equipment (Alarm Panels
        and/or Cardax alarm equipment and/or Lock/Door furniture) by the Project

010906 Policy & Procedures for Electronic Security Systems                            9
        Manager in consultation with the Security Systems Section. Return of
        retrieved equipment to the Security Systems Section.

3.4     Ensure that the installer/contractor is aware that the installation must meet
        the terms as specified in this document.

3.5     Inform the contractor to contact the Security Systems Section in order to
        obtain necessary information as outlined in ‘Installers/Contractors -
        Responsibilities’ (see Section III, b), 1).

3.6     Liaise with the installer/contractor on relevant project management issues
        and financial matters.

3.7     Contact Brett Tamasauskas, Technical Resources Management, in the
        Security Systems Section on Ext 13055 to arrange communication details
        from electronic security device to CMS at a cost to the project when
        requested.

3.8     Arrange testing and commissioning of installation with the
        installer/contractor, the User/Occupants, the Security Systems Section and
        Sydney University Maintenance Contractor with sufficient lead time to allow
        for resource allocation and pre-inspection functions.

3.9     Arrange the “Sign-off” on project with the representative of the Security
        Systems Section, the Sydney University Security Maintenance Contractor
        and the installer/contractor installing the infrastructure.


4. Sydney University Security Maintenance Contractor - Responsibilities

4.1     If Sydney University Security Maintenance Contractor is installer/contractor
        see section III, b), 1.

4.2     If Sydney University Security Maintenance Contractor is not
        installer/contractor see section III, b), 5.


5. Programming / Commissioning

5.1     The installer/contractor, in consultation with the Security Systems Section, shall
        carry out all alarm panel programming. The installer/contractor shall supply
        configuration sheets for alarm dialer systems and/or Cardax Access Control
        System, to the Security Systems Section to allow for the Sydney University
        Security Maintenance Contractor to program the related systems. The
        installer/contractor will then walk through a test of all alarm points whilst
        communicating with Sydney University Security Maintenance Contractor to verify
        correct receipt of signals at the CMS. At the formal commissioning the CP&S
        Project manager, the contractor/installer, the user/occupants, a representative
        from the Security Systems Section and the University Security Maintenance
        Contractor shall be present.
010906 Policy & Procedures for Electronic Security Systems                             10
5.2     Codes for the Security Patrol Group, Attendants and Cleaners will be supplied by
        the Security Systems Section and are programmed by the contractor/installer.

5.3     All dial up system panels shall be programmed to use the Contact ID protocol.

5.4     All keys, including duress button keys, issued to the CP&S Project manager for the
        installer/contractor for the duration of the project shall be returned to the Security
        Systems Section prior to hand-over or at commissioning.

5.5     Cards/Keys/Codes for Security Patrol Group, Attendant/s and User/s will be
        supplied and programmed by the Security Systems Section.

5.6     All programming regarding the general configuration of new instillations shall be
        done by the Sydney University Security Maintenance Contractor as per the
        Maintenance Agreement.

5.7     Should the security equipment installed not meet the University standard or is not
        in accordance with this document, the Security Systems Section, Campus Property
        & Services, shall reserve the right to delay commissioning and may require
        modification/rectification until specifications are met.




010906 Policy & Procedures for Electronic Security Systems                                11
Appendix A: Hardware Specification

The University has standardised on certain items from the Cardax range for access control,
and these devices shall be used unless specified otherwise herein. The alarm infrastructure
is either Cardax or dial-up alarm panels. Unless otherwise specified by the Security
Systems Section, DAS NX16 or agreed (with Security Systems Section) equivalent panels
will be used for remote dial-up alarm monitoring. CCTV monitoring is local, but can be
monitored by the Security Central Monitoring Station (CMS).
Please note, that all Sydney University Cardax installations now require Cardax ‘FT’
infrastructure, using Cardax Proximity 125 readers, unless another token is specified by
the Security Systems Section. As magnetic card stripe technology is legacy its use will
need to be approved by the Security Systems Section on a case by case basis. The
infrastructure has to be connected to the ‘FT’ head-end in the CMS, Security Services, by
the current Sydney University Security Maintenance Contractor. The installer/contractor
must ensure connection in the ‘field’, and hand in the appropriate paper work to the
Security Systems Section.

Doors with card readers should be fitted with electric mortice locks instead of exit
buttons and break-glass devices. With an electric mortice lock the overriding of the
electronic system with a key can be monitored as well as doors forced open,
whilst allowing free egress from the inside. Door handles on the inside do not
need to be locked. For the types of approved electric mortice locks please see
Appendix A, Section A, 1.10, 1.11.

In the case of card readers on doors the function of the key will be an override
function only. In emergencies the key can override the electronic system.
Overriding keys are to be issued to the Security Service department, to avoid
defeating electronic systems.

Doors with a card reader and exit reader need to have a door closer fitted to
ensure the door closers properly so that no alarms are raised in the CMS
unnecessarily. Also these doors should use an electric mortice lock with both
handles controlled electronically. A break-glass and luminous sign should be
placed on the inside if it is a fire exit, or there is no other egress path. If the door is
a double door both leaves must be monitored for door open / door forced, and the
second leaf locked. If the door must have two leaves free due to fire regulations it
may have a two-door mag lock fitted in place of the mortice lock. Doors with large
areas of glass must have glass-break detectors fitted.

A fire trip relay can be used, if there is a dry fire system available. A local door
sounder on a time-out and modulated tone should be installed and activated by
forced door and breakage of glass. A luminous sign needs to be put in place: ‘This
Door Is Alarmed. Emergency Exit Only. Break Glass.’ Door handles, can be
locked or removed. A Reed switch for remote monitoring, electric strike and a lock
cylinder with an override function only, as described above, need to be fitted.

All monitored devices, such as door sounders, reed switches etc, have the
advantage of raising an alarm in the Security Service Central Monitoring Station. It
enables the Security Patrol Group to respond and attend the site as quickly as
010906 Policy & Procedures for Electronic Security Systems                             12
possible. Doors with door sounders installed, but not monitored, cannot be
detected unless someone is in the area at the time of the alarm.
With reed switches on doors a door forced open can be monitored. Wherever
there is a monitored reed switch fitted and/or in combination with a door sounder,
a door sign needs to be put in place: ‘This Door Is Alarmed. Emergency Exit Only!’
or ‘This Door Is Alarmed After Hours. Emergency Exit Only!’ or ‘This Door Is
Alarmed. Emergency Exit Only, Break Glass!’ or ‘This Door Is Alarmed!’, as
appropriate.

Computers in computer laboratories should be fitted with ‘tamper loops’. These
are cables connecting all computers with each other, which can be monitored
through the existing alarm infrastructure. An alarm is raised in the CMS on
removal of a computer out of the loop. The second advantage is that the lid of a
computer is wired up as well, therefore preventing the theft of memory from the
PC.
Tie-down cables and/or brackets, as a physical barrier to theft, should also be
used to support this kind of security.




010906 Policy & Procedures for Electronic Security Systems                     13
A. Cardax Hardware Specification

1. Equipment

1.1   Cardax FT3000 and FT5000GL controllers, or later Cardax technology as
      approved by the Security Systems Section for each installation, may be
      used.
1.2   Cardax FT RIO’s URI’s I/O Interfaces or later Cardax I/O technology as
      approved by the University of Sydney Security Systems Section used.
      Please NOTE: no I/O controller should be loaded past 80% capacity at
      installation. ….
1.3   Cardax FT URI’s RIO’s I/O Interfaces, strike controllers or later Cardax strike
      controller technology, as approved by the Security Systems Section, may be used.
1.4   Entry card readers shall be non-intelligent Cardax Proximity 125 Plus Readers with
      PIN Pad, connected to an FT controller or other technology, if specified.
1.5   Exit card readers shall be Cardax Proximity 125 Readers, connected to an FT
      controller or other technology, if specified.
1.6   Motion detectors shall be Dual or Tri Technology, “Vision 525” or approved
       equivalent.
1.7   Power Supplies and Batteries - Low voltage power supplies shall be self-contained
      and installed within the secure equipment cabinets. The power supplies shall be
      linear type with a minimum 2.5A continuous rating and shall have standby
      batteries capable of sustaining continuous operation for at least 8 hours in the event
      of a mains supply failure. Power supplies shall incorporate mains fail and battery
      low indication. Switch mode power supplies are not acceptable.
27.8 Equipment cabinets containing power supplies and batteries shall be of secure
      construction with concealed hinges, key lockable door, and tamper switch on the
      door.
27.9 Reed Switches - Sentrol type flush or surface mount as required.
27.10 Glass Break detectors – industry standard glass break detectors are to be
      installed on all perimeter locations where glass can be penetrated through
      to open the door from inside (pending any other advice from the Security
      Systems Section)
1.11 Electric Mortice Locks: Lockwood 3572 or 3582 series with monitored key
      override and ‘fail secure’, unless otherwise specified by the Security
      Systems Section, University Locksmith on extension 16826.
101.10        Electric Mortice lock and furniture will have to be purchased from
      Security Systems, University Locksmith. The University Locksmith will also
      supply cover plates.

2. Status / Tamper Monitoring

The various items of Cardax equipment, power supplies, door strikes, break-glasses,
cabinets etc., are fitted with status monitoring, tamper switches, and other detection
devices to warn of interference to or failure of the equipment. All such devices shall be
fully wired and programmed into the Command Centre so that if any failure or
abnormality is detected an alarm is raised at the Command Centre. This includes:


010906 Policy & Procedures for Electronic Security Systems                              14
        a)   Mains fail.
        b)   Low battery.
        c)   Cabinet tamper for all cabinets including power supplies.
        d)   Door open / door open too long
        e)   Door forced
        f)   Break-glass broken.
        g)   Fire trip activated.
        h)   Motion detector tamper.
        i)   Glass Break detector tamper
        j)   Glass break detector activation

3. Door Alarms

A separate alarm message shall be transmitted to the Command Centre for each of the
following alarm conditions relating to a door. The alarm message shall be displayed in
plain English text.
       a) Door forced open.
       b) Door open too long.
       c) Access criteria mismatch.
       d) PIN entry incorrect.
       e) Duress entry.
       f) Attempted use of non-access system card.
       g) Attempted use of card from another site with same system.
       h) Card whose data has been altered/ corrupted.
       i) Card reader being tampered with or heartbeat monitoring.
       j) Pass back attempted.
       k) Unit not responding.
       l) Key override, where applicable

Each alarm shall clearly identify the time, location and type of alarm.

4. Card Reader - Power Failure

The card reader shall continue to operate for at least 8 hours in the event of mains supply
failure.

4.1     Doors with Magnetic Locks will have sufficient battery backup to hold for at least
        8 hours.
4.2     All Mortice Locks on doors that have handles for egress should fail secure
        (Closed). Mortice Locks shall be set to fail safe (Open) on all doors which
        require exit readers or have exit break glasses.

5. Communication details

All communications from the electronic security device will need to be arranged by the
Project Manager through the Security Systems Section. This includes IT communications,
PABX communications etc. See Section III, b), 3.


010906 Policy & Procedures for Electronic Security Systems                               15
6. Programming

All operating system data entry (mapping of new units) that enable the new access control
equipment and electronic security devices to be identified by the Cardax Command Centre
located at the Security Office shall be carried out by the security contractor in consultation
with Security Systems. Client data access levels, access criteria of cardholders etc will be
programmed by the Security Systems Section.

The Security Systems Section shall supply and issue all Cardax Access Control Cards to
the building staff and other authorised users. Discussions between the Security Systems
Section and the Users/Occupants from the building are necessary as part of the card
issuance process. The departments will supply a list of cardholders/key holders/codes,
including full names and access required as well as relevant account codes, staff/student
ID and appropriate authorisation. See section III, b), 2.

7. Door Furniture

As part of the installation of any access control system, the Security Systems Section must
be consulted regarding appropriate door furniture. All building and departmental
perimeter doors must be re-keyed with Bi-Lock locks supplied by the Security Systems
Section. All doors with card readers installed should have an ‘override key function’ for
emergencies only. Door handles must be removed or locked. Secondary door handles /
knobs and tongues should be removed. Door furniture must be of a quality and type
approved by the Project Manager and the Security Systems Section.
All doors fitted with access control equipment must have door forced monitoring.
This requires the use of an electric mortice lock (see ‘Appendix A: Hardware
Specification’) or an exit reader. Where doors are fire exits with installed exit
readers, they must be controlled by a fire trip relay and have a monitored break-
glass fitted.

The Security Systems Section, University Locksmith, will put an external and
internal hierarchic keying structure in place to support the buildings recommended
departmental perimeters and devices. A ‘designer tree’ will be worked out for each
area and department in order to reduce the number of keys carried by any
individual and to avoid defeating electronic systems. All departments’ own keying
master systems are called ‘their’ keyway.

In the case of card readers on doors the function of the key will be an override
function only. In emergencies the key can override the electronic system.
Overriding keys are to be issued to the Security Service department, to avoid
defeating electronic systems.

8. Commissioning

Should the security equipment installed not meet the University standard or is not in
accordance with this document, the Security Systems Section, Campus Property &
Services, shall reserve the right to delay commissioning and may require
modification/rectification until specifications are met.


010906 Policy & Procedures for Electronic Security Systems                                16
B. Locksmith Hardware Specification

9. General

9.1    The Security Systems Section, University Locksmith, is charged with installation,
maintenance and control of all locks and keying systems within the University or which
are under University control.

9.2    The University has purchased a system in Bilock profile, which will be installed in
all new installations, and will systematically replace existing systems throughout the
University according to program or as required.

10. New installations/Quick Change Core (QCC)

10.1 Installations of, or changes to, any locks within the University or University
controlled properties require consultation with the University Locksmith.

10.2 All new installations of locks to new or existing structures within or controlled by
the University, shall be fitted by contractor/builder with cylinders provided by the
University Locksmith. The building door schedule will have to be provided to the
University Locksmith 14 days before commencement of works.

The University maintains a construction keying system for installations to building sites.
QCC allows efficient installation of the final keying systems upon completion of
construction.

The QCC can easily be removed from the hardware without disassembling the lock. This
enables the locksmith to withdraw a cylinder – replacing it with another in seconds after
construction of site is completed. This process guarantees a smoother, quicker handover
and is far more cost effective and less labour intensive.

11. Specifications

All new installations and replacements of lock/s are required to conform to the following
specifications, unless otherwise specified in accordance with the lock policy.

11.1        Lockset Furniture is to be a lever on plate style equal to Lockwood 1800, 2000,
            2800 or 4800 series.
11.2        Locksets shall be Lockwood 3570/3580 series mortice locks. Any exceptions
            require the approval of the University Locksmith.
11.3        Cylinders shall be construction keyed where appropriate / required, and
            compatible with Sydney University’s specified keying system: Bilock QCC
            New Generation, profile 209. See Appendix A, Section B, 10.




010906 Policy & Procedures for Electronic Security Systems                              17
12. Other Bilock Profiles

The University shall maintain existing Bilock profiles installed through the University
buildings. Specific infrastructure will be replaced or upgraded according to the Lock
Policy, systematically, or as required.

13. Perimeters

13.1        All building perimeters are to be keyed under the University Perimeter Bilock
            Profile. New construction perimeters are to be automatically keyed accordingly.
            Existing perimeters are to be upgraded systematically or as required.
13.2        All new construction perimeters are to be fitted with automatic door closers of
            the following type: Dorma TS73, or Dorma TS83. In cases where door closers
            can not be fitted or are inappropriate, alternative automatic closing mechanism
            is to be arranged with approval of the Security Systems Section, University
            Locksmith.
13.3        The Manager of the Security Systems Section shall review perimeter security on
            existing University structures, and shall prioritise and program upgrade of
            perimeter locks to the Perimeter Bilock profile according to circumstances,
            having regard to safety and security, time and budgetary constraints.

14. Override cylinders

All electronically controlled access doors (typically those controlled by Cardax Card
Readers) are to be keyed to the University’s Key Override Bilock profile in case of failure
of the electronic infrastructure. New construction perimeters are to be automatically keyed
accordingly. Existing perimeters are to be upgraded systematically or as required. Keys
with an override function are made available only to the Security Patrol Group for
emergency access.

15. Electric Mortice Locks

Electronically controlled ingress/egress doors are required by safety regulation to be fitted
with electronic mortice locks. See Appendix A, Section A, 1.11. All such Mortice locks
are to be fitted with the University’s Key Override Bilock profile.

16. Compromised lock systems

Where Grand Master, Master, or Sub-master keys for any system are lost or stolen, the
security of a building is compromised. Upon notification of the loss or theft of the key, the
Locksmith shall evaluate the need for rekeying of the area concerned. The relevant
department or faculty will be consulted and advised of the Locksmith’s assessment, and
upon agreement the area concerned will be rekeyed. Such changes are to be approved by
the Manager of Security Systems Section and advised to the Assistant Director Campus
Services.




010906 Policy & Procedures for Electronic Security Systems                                18
17. Emergency temporary installations

In situation where emergency rekeying is required, the Locksmith will rekey using
‘standard broach’ profile. Such emergency rekeying is to be temporary, and replaced using
the University Bilock profile as soon as possible. Such changes are to be approved by the
Manager of Security Systems Section.

19. Internal Security – Locks

18.1       Restricted keying systems and existing system alterations can be obtained via a
           Service Requisition nominating the account code and title in order that recovery
           for cost may be made.
18.2    The Head of Department may authorise staff as ‘authorised signatories’ for any
        work relating to keys/ locks and access control systems requests. The ‘authorised
        signatories’ form is available on the Web or from Security Systems Section.
        (Website Link: http://www.facilities.usyd.edu.au/security/systems.shtml#systems)
18.3    Changes of internal departmental areas to Bilock will occur at the pace determined
        by departments, as they are responsible for the costs and internal security
        conditions.

19. Rekeying

19.1        Where existing locks are to be rekeyed, for any reason, the University Bilock
            profile is to be installed in conformance with the lock policy. Particulars for
            any rekeying are to be arranged by agreement with the Security Systems
            Section, University Locksmith; having regard to the needs of the faculty or
            department involved, and the requirements for safety and security of the
            premises. Such changes are to be approved by the Manager of Security Services
            Systems Section.
19.2    Perimeter rekeying is to be performed using Bilock profile in conformance to this
        policy (See Appendix A, Section B, 13).
19.3    Departments and Faculties retain control of the internal organisation of their space.
         In consultation with the Manager of the Security Systems Section and the Security
        Systems Section, University Locksmith, departments and faculties may arrange for
        alternative locking systems to be installed.

20. Digital Locks

20.1         The University Security Service, Security Systems Section, shall not install, nor
             maintain any digital locks (mechanical combination door locks). Digital locks
             have been determined to be inappropriate as:
         •    It is impossible for patrol to know the combinations for all such doors though
              the University.
         •    They hamper access for security and safety services.
         •    They allow numerous combinations to open the door, and use-wear makes the
              combination apparent.
         •    They require regular combination changes for adequate security, changes are
              never regularly made.
010906 Policy & Procedures for Electronic Security Systems                                19
         •  Combination information is easily transferred, quickly devaluing the apparent
            security of the lock.
        • Insurance Companies may not regard them as adequate security is assessing
            claims.
20.2    This policy shall also be effective for existing locks

21. Existing systems – Maintenance and Repair

There are a number of lock systems installed throughout the University. These range from
unrestricted, to restricted and semi-restricted systems. The University Locksmith may not
maintain restricted systems where maintenance is not feasible. This may be due, but not
limited to, the lack of consultation with the Security Systems Section at time of planning
and installation of such systems and legacy systems. Replacement of broken or unusable
locks shall conform to the policy except where otherwise approved by the Manager of the
Security Systems Section.

22. After hours callouts

Where after-hours or weekend work is required of the Locksmith, work will be charged at
an overtime rate, and for a minimum of four hours work.

23. Work prioritisation

Work requests for the Locksmith will be prioritized according to the following guidelines:
       • Emergency issues will be given highest priority.
       • Issues involving safety will be given next highest possible priority.
       • Perimeter security issues will be completed by the close of business, or before
          cessation of work for the day on which the request was received.
       • Other requests shall be prioritized according to the Locksmith’s assessment,
          having regard to; the University hierarchy, time constraints, urgency of need
          and security concerns

24. Work Requests

Requests for Locksmith work should be made by completing a Service Requisition or a
memo or an E-Service desk submission, providing the following details:
       • Department / Faculty name.
       • Building Number.
       • Room / Door Number
       • Description of problem
       • Account Code
       • Authorised Signature
       • Name and contact details

Such requests should be faxed or delivered to Security Systems Section, and if the request
is for urgent work, a call should be made to the Systems Section regarding the work.
(Website Link: http://www.facilities.usyd.edu.au/security/systems.shtml )
Emergency issues will be given highest priority.

010906 Policy & Procedures for Electronic Security Systems                             20
25. Commissioning

Should the security equipment installed not meet the University standard or is not in
accordance with this document, the Security Systems Section, Campus Property &
Services, shall reserve the right to delay commissioning and may require
modification/rectification until specifications are met.




010906 Policy & Procedures for Electronic Security Systems                              21
C. Dial-up Alarm Hardware Specification

27. Alarm Panels, Security Central Monitoring System:

Unless otherwise specified by the Security Systems Section, DAS NX16 or equivalent
panels approved by University of Sydney Security Service will be used for remote alarm
monitoring.

27.11 All keypads are to be of the LCD display type.
27.12 Motion detectors shall be Dual or Tri Technology, “Vision 525”, or equivalent
         approved by Security Systems Section.
27.13 Reed Switches - Sentrol type flush or surface mount as required.
27.14 Duress buttons – Recessed locking buttons or equivalent approved by
        Security Systems Section. A minimum of two duress keys need to be
        provided and forwarded to the Security Systems Section.
27.15 Glass Break detectors – industry standard glass break detectors are to be
        installed on all perimeter locations where glass can be penetrated
        through (pending advice from the Security Systems Section)
27.16 Power Supplies and Batteries - Low voltage power supplies shall be self-contained
        and installed within the secure equipment cabinets. The power supplies shall be
        linear type with a minimum 2.5A continuous rating and shall have standby
        batteries capable of sustaining continuous operation for at least 8 hours in the
        event of a mains supply failure. Power supplies shall incorporate mains fail and
        battery low indication. Switch mode power supplies are not acceptable.
27.17 Equipment cabinets containing power supplies and batteries shall be of secure
        construction with concealed hinges, key lockable door, and tamper switch on the
        door.

28. Status / Tamper Monitoring

DAS NX16 panels or equivalent approved by Security Systems Section are fitted with
status monitoring; tamper switches, and other detection devices to warn of interference to,
or failure of the equipment. All such devices shall be fully wired and programmed into the
Alarm Monitoring System in the University CMS so that any failure or abnormality is
detected and an alarm raised at the CMS. This includes

        a)   Mains fail.
        b)   Low battery.
        c)   Cabinet tamper.
        d)   24 hours not tested.
        e)   Motion detector tamper.




010906 Policy & Procedures for Electronic Security Systems                              22
29. Alarms / Testing

The University employs DASLOAD software to interrogate remote panels. The
contractor/installer shall be responsible for programming the panel for the following
features.

        a)   Report of openings and closings.
        b)   Testing every 24hrs.
        c)   Reporting of alarms.
        d)   Answering machine defeat.
        e)   Account code for site as supplied by Security Systems Section.
        f)   Codes for Security Patrol staff, Attendants and Cleaning Section, where
             required.

30. Communication details

All communications from the electronic security device will need to be arranged by the
Project Manager through the Security Systems Section. This includes IT communications,
PABX communications etc. See Section III, b), 3.

31. Commissioning

Should the security equipment installed not meet the University standard or is not in
accordance with this document, the Security Systems Section, Campus Property &
Services, shall reserve the right to delay commissioning and may require
modification/rectification until specifications are met.




010906 Policy & Procedures for Electronic Security Systems                              23
D. CCTV Hardware Specification

The campus wide CCTV system will use the University’s computer network to move
video, audio and control information from each site back to the Central Monitoring Station
(CMS). The CMS will monitor up to 4 incoming channels simultaneously, and will record
those channels on recorders in the field. Operators will be able to ‘tour’ all cameras in the
field. This will allow the monitors in the CMS to automatically display any camera
associated with an alarm. This offers the Security staff the ability to evaluate and respond
to alarms and emergencies with greater speed and understanding of the situation. Staff
will also be able to monitor cameras and use them to direct patrol more efficiently, or
monitor randomly to augment other security systems.

31. Equipment

31.1    All cameras should be industry standard colour cameras with PAL output
        and suitable enclosures

31.2    Digital Video Recorders should be Dedicated Micros (all current model
        DVRs), ComVision VGuard (XP and RT models) or Loronix (Australian
        released models). Systems must be configured to provide a minimum of 5
        frames per second for each camera in alarm. This frame rate needs to be
        calculated to the users needs and number of cameras deployed so the
        specified DVR can be chosen correctly and with adequate capacity to retain
        images for reasonable periods of time, generally no less then 7 days of
        recording. Recorders should be connected to the University network and
        TCP/IP addresses forwarded to Security Systems Section.

31.3    Minimum frame rate should be 5 frames per second per camera during
        active times.

31.4    DVR’s, and If required, monitors should be purchased and positioned with
        consideration to privacy issues. The monitors should be positioned for the
        use of security personnel only, and be isolated from general public view.

31.5    Installations must comply with Workplace Video Surveillance Act 1998.
        Liaise with the Security Systems if compliance is in doubt.

31.6    All issues relating to the equipment need to be discussed with the Security
        systems Section before installation.

32. Communication details

All communications from the electronic security device will need to be arranged by the
Project Manager through the Security Systems Section. This includes IT communications,
PABX communications etc. See Section III, b), 3.




010906 Policy & Procedures for Electronic Security Systems                               24
33. Commissioning

Should the security equipment installed not meet the University standard or is not in
accordance with this document, the Security Systems Section, Campus Property &
Services, shall reserve the right to delay commissioning and may require
modification/rectification until specifications are met.




010906 Policy & Procedures for Electronic Security Systems                              25
E. Tamper Loops Specification

34. Securing Computer Equipment

Computers in computer laboratories should be fitted with ‘tamper loops’. These
are cables connecting all computers with each other, which can be monitored
through the existing alarm infrastructure. An alarm is raised in the CMS on
removal of a computer out of the loop. The second advantage is that the lid of a
computer is wired up as well, therefore preventing the theft of memory from the
PC. (See Appendix A, Section E)

35. Purchase and Supply

All issues relating to the equipment need to be discussed with the Security
systems Section before installation.

36. Communication details

All communications from the electronic security device will need to be arranged by the
Project Manager through the Security Systems Section. This includes IT communications,
PABX communications etc. See Section III, b), 3.

37. Commissioning

Should the security equipment installed not meet the University standard or is not in
accordance with this document, the Security Systems Section, Campus Property &
Services, shall reserve the right to delay commissioning and may require
modification/rectification until specifications are met.




010906 Policy & Procedures for Electronic Security Systems                              26
F. General Hardware Specification

38. Requirements

38.1    Location of Equipment


All equipment cabinets and electronic security panels shall be installed at the
locations shown on the tender drawings.

38.2    Wiring and Cable


All wiring shall be totally concealed but shall be installed so that it can be readily
removed, repaired or replaced.
Wiring shall be installed using the loop in draw in method. Jointing of cables will
not be accepted other than those within the tamper monitored termination
cabinets.
Where mechanical damage may occur cables shall be protected by conduit or
cable duct.
All cables are to have stranded conductors.
Attention shall be paid to voltage drop calculations when determining cable sizes.
All multi-core cables shall have a minimum of two (2) spare pairs unless otherwise
specified.
Cabling to all detection and monitoring devices shall be sized and installed in
accordance with the Cardax installation manuals and the manufacturers
recommendations for equipment other than Cardax devices.
All passive devices shall have a spare pair. Each input will be wired with individual
return wires.
Attention should be paid to line requirements for attenuation. The contractor is to
allow for any line amplification required.
Alarm point cabling shall be run individually to equipment boxes and grouped
therein for connection to alarm point.
All cabling shall be tied to ceiling hangers by cabling ties, which are light green in
colour.

38.3    Conduits


Exposed conduits shall not be used unless authorised by the Project Manager. If
authorised, the following conditions apply:
Shall be rigid UPVC.
All fittings, draw boxes, bends and couplings shall be purpose made.
Shall be joined using an approved solvent cement.
010906 Policy & Procedures for Electronic Security Systems                           27
Shall be secured using single-sided metal saddles spaced at 600 mm (maximum)
centres and within 150 mm of all fittings.


Shall be installed so that cables can be drawn in at draw boxes only.
Shall be minimum 20-mm diameter.
Shall be filled with cables to not more than 60% of capacity.

38.4    Cable Duct


Exposed cable ducts shall not be used unless authorised by the Project Manager.
If authorized the following conditions apply.
Shall be fitted with removable covers.
Shall be fitted with the manufacturer’s standard bends, elbows, couplings and
reducers.
Shall be manufactured from extruded PVC.
Shall be filled with cables to not more than 60% of capacity.

38.5    Fixings

Shall comprise metal thread screws or bolts into expanding type masonry anchors
for fixing to concrete or masonry.
Shall comprise tapered woodscrews for fixing to timber.
Shall comprise metal expanding anchors for fixing to plasterboard.

38.6    Testing, Commissioning and Training

The installer/contractor shall supply all labour, materials and equipment required to
fully test and commission the complete installation to the satisfaction of the
Security Systems Section.
The tests shall be carried out in the presence of a representative of the University
of Sydney Security Service and the Sydney University Maintenance Contractor. A
written notice of Intention to test shall be provided to them not less than 10 days
prior to the test date.
The installer/contractor shall repair or replace any equipment, which fails to
operate correctly or does not comply with this Specification.
Provide training for the various user groups in the building up to a maximum of 1
hour per unit installed.




010906 Policy & Procedures for Electronic Security Systems                       28
38.7    Manuals

Operation and Maintenance Manuals shall be provided in A4 size, and each page
of the manual shall be of heavy quality paper.
Provide to the project manager three (3) sets of operating manuals. Manuals shall
be comprehensive in detail, written in plain English, and shall explain the function
of all features of the access control system and how to operate them.
Operating manuals shall contain A3 size As-Built drawings produced using
AutoCAD format detailing the scope of works installed, and labelling of equipment
and circuits.
Provide to the Project Manager electronic file of As-Built drawings in AutoCAD
format.

38.8    Warranty

All equipment that is installed to complete the access control system to this
specification shall be covered by a 12-month parts and labour warranty.
All faulty equipment within the warranty period shall be replaced within 24 hours.
The 12-month warranty period shall not commence until all areas, in which
equipment is installed, are tested and signed off as satisfactory by the nominated
officer of The University of Sydney and until the As-Built drawings and manuals
are received by the project manager.

38.9    Labels


Weather resistant labels with 5mm black lettering on white background shall be
provided for every item of electronic security equipment installed on the site. The
label description shall correspond to the identification code provided on the tender
drawing.

        a) All equipment must be labeled in accordance with the labeling
           conventions provided by the Security Systems Department. Labels must
           be durable and well affixed in adjacent to the equipment.
        b) GPO outlet: In accordance with the requirements of AS3000, and the
           University of Sydney Electrical Standards. Fix traffolyte label to wall
           surface immediately adjacent to GPO, using double-sided adhesive
           tape.
        c) Key switches, Piezzo screamers and other miscellaneous devices: Fix
           traffolyte label to wall surface immediately adjacent to the device using
           double-sided adhesive tape.
           Provide to the project manager samples of proposed label material,
           label sizes, lettering sizes and lettering text for approval prior to
           manufacture.


010906 Policy & Procedures for Electronic Security Systems                       29
    When the installer/contractor installs any electronic security device, they must be
    labeled using the following 12 digit code:

 BBBBRRRRDDNN                Basic layout
 BBBB                        Four digit building code, a dash if it is only 3 digits. Eg A19-- or
      RRRR                   A27B
           DD                Four digit room number, dash if it is less. Eg 220- - or N201
                             Two digit device code – see list below – Eg Md or CX
 NN                          Two digit unique number for floor. Eg 01 or 02

    Sample codes
    A27-220-MD01
    A27B-101-BG01

NOTE: A dash is required after each section i.e. BBBB-, RRRR-

    The device codes are as follows

    MD        Motion Detector                             SS     Smart Swipe Plus
    BG        Break Glass                                 SP     Smart Proximity Plus
    GB        Glass Break                                 IO     I/O Expansion Board
    RS        Reed Switch                                 IB     Input only Expansion Board
    ES        Electric Strike                             EL     Electric Mortice Lock
    ML        Magnetic Lock                               C3     Controller 3000
    PS        Power Supply                                C5     Controller 5000
    RI        Reader I/O Interface                        DV     DVR
    II        I/O Interface                               CC     Camera
    RA        RAT                                         CP     Code pad
    SC        Screamer                                    AP     Alarm Panel



    39. Commissioning

    Should the security equipment installed not meet the University standard or are not in
    accordance with this document, the Security Systems Section, Campus Property &
    Services, shall reserve the right to delay commissioning until specifications are met.




    010906 Policy & Procedures for Electronic Security Systems                                30

				
DOCUMENT INFO
Shared By:
Categories:
Tags: Master, Spec
Stats:
views:237
posted:4/20/2010
language:English
pages:32
Description: Master Spec