You are on page 1of 2

<SpecificationName>

1. Intruder Alarm System

1.1. The ISMS will incorporate a fully functional intruder alarm system.

1.2. All inputs globally within the system must be able to be utilised as intrusion alarm
inputs to allow intruder detection sensors to be connected to the system.

1.3. All outputs anywhere within the system shall be available for intruder alarm purposes
such as sounding remote sirens etc.

1.4. Arming and disarming the intrusion detection system shall be either by using card
readers, alarm management terminals, key-switches or schedules.

1.5. It shall be possible for the system to cause readers to beep during entry and exit
delays.

1.6. It shall be possible for the system to active outputs during entry and exit delays.

1.7. It shall be possible to configure the system to isolate faulty external devices so as not
to trigger false alarms.

1.8. It shall be possible to configure the system to fail to arm if an input point is active.

1.9. It shall be possible to configure the system to fail to arm if an input point has
unacknowledged alarms.

1.10. It shall be possible for the system to cause readers to beep when alarms are present in
the system.

1.11. It shall be possible to set the system to a test mode to allow for testing and
maintenance.

1.12. The intruder alarm zone and the access zone for an area shall be treated as separate
logical items.

1.13. The intruder alarm system shall provide a dependency feature where by an alarm zone
does not go into the set state until all dependent alarm zones are in the set state.

1.13.1. If the alarm zone is set (armed) and the access door is secure:

1.13.1.1. A cardholder shall require authorisation to both unset (disarm)


the intruder alarm zone, and to access the access zone to be
allowed access.

1.13.1.2. If the cardholder is not authorised to unset the alarm zone or


not allowed to access the access zone, then access shall be
denied.

1.13.2. If the alarm zone is unset (disarmed) and the access door is secure:

<SpecDate> Page 1
<SpecificationName>

1.13.2.1. A cardholder shall require access to the access zone only for
access to be allowed.

1.13.2.2. If the cardholder is not authorised to access the access zone,


then access shall be denied.

1.13.3. For normal operation, after an authorised token is presented, and access is
granted, then the alarm zone shall remain unset after the door relocks.

1.13.4. As an optional function, the alarm zone may auto-set after a predetermined
time period.

1.14. When specified, alarm monitoring may use a connection with central alarm monitoring
stations via digital communicators using Contact ID format, connected directly to the
IFC panels.

1.15. Connection with central alarm monitoring stations may be via dial-up modem, TCP/IP
or cellular networks.

1.15.1. It shall be possible for alarms from one IFC to be transmitted via a second
IFC where the digital communicator is installed. (Peer-to-peer
communications).

1.15.2. Digital communicators are to be able to communicate alarms from all


system IFCs, independent of system server.

1.15.3. The system shall report and log all digital communicator activity and the
reason for any failure to communicate.

1.15.4. The system shall provide for up to two back up communicators on different
IFCs to provide automatic backup capability should the designated digital
communicator fail to operate on the appropriate alarm condition.

1.16. Cardholders shall be assigned to groups, to which any combination of the following
intruder alarm privileges relating to the operation of the system may be assigned:

1.16.1. unset intruder alarm zones,

1.16.2. set intruder alarms zones,

1.16.3. status of alarms and inputs on AMT,

1.16.4. acknowledge alarms,

1.16.5. shunt inputs,

1.16.6. force-arm alarm zones,

1.16.7. auto-isolate alarm zones.

<SpecDate> Page 2

You might also like