Friday, September 1, 2023

Security Integration management systems

Security Integration Management Systems 

Security systems are changing at an ever-increasing pace and are becoming standard Information Technology (IT) products running over a Local Area Network (LAN) or Wide Area Network (WAN). As a result of using standard protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), the manufacturers to develop new generations of integrated systems. These systems are called System Integration as they bring together the management of all aspects of an organisation’s security. In recent years, the market for security equipment has realized the immense merits of integrating different components in a security system. However, true integration may be offered by all the manufacturers in the field today. A truly integrated security system combines the various components and yet they are all part of a more sophisticated and bigger system.

Some people use the term 'integrated' to describe a multiplexer combining full screen and multi screen images. Or a control desk containing an integrated intruder alarm PC, an integrated fence alarm PC and an integrated CCTV PC sitting next to one another. This is not true integration.

It is possible to integrate components like a public address system, CCTV, fence alarms, intruder alarms, fire alarms (life safety) and access control system within a single system. The system can be multi-station networks or even a single PC. All these components should interact with one another as a single entity. For example, whenever the fire alarm gets activated, the screen of the Visual Display Unit should pop up a new text window where detailed instruction should be given on what to do next. Simultaneously, the integrated system may release the doors meant for fire exit and display those CCTV cameras, through which the operator can view the affected area so that the operator in question can engage in a communication with the other staff and do not have to take the help of any public address system.

It is not always necessary to purchase all of the components of a system from one supplier. Manufacturers of Security Management Systems realise that the customer wants choice and will often link to components from other specialist manufacturers. Many manufacturers provide integration modules and protocols such as BACnet and OPC, and data integration methodologies such as eXtensible Markup Language (XML), ActiveX and others, which can in theory link to almost any business system. You will need to talk to individual suppliers to discover what development tools such as Software Development Kits (SDK) and Application Programming Interfaces (API) are available for integrating systems. Yes, the system should be able to function with the help of a battery backup though the duration of this backup time may vary according to the type of panels used within it. In my experience this has not been an issue, but some manufacturers are very cautious to whom they release this information. If you are a competitor it is almost impossible.

Even when protocol has been received 90% of the time it is either incorrect, incomplete or even misleading! It is essential to test product before installation, I know it is an old fashioned idea but it is really nice to see the system actually working.

Opportunities of System integration

There are a number of advantages to be gained in both the security and commercial aspects of designing and adopting an integrated system. This section lists some of the advantages that may be considered when combining separate systems into an integrated solution.

Access Control Systems (ACS)

Access Control is typically specified to provide protection to both property and employees. Generally it is thought of in terms of managing doors. However, it often extends to public areas when coupled with turnstiles, gates and barriers, or highly sensitive areas when coupled with biometrics.  If the access control and intruder alarm systems are linked together, the access control system can be programmed to automatically change, based on the type of alarm that sounds. By integrating Access Control with other systems many advantages may be realized. For example:

Fire Alarm mustering – know where your employees are at a given time.

Know which doors / areas employees are entering, or trying to enter.

Link CCTV images with access control events.

Link Time & Attendance monitoring using the same badge / token software.

Link Visitor Monitoring with Access Control & CCTV using badge / token software.

Increase security through systems such as dual card access or access using a biometric technology.

Intruder & Hold up alarm system control functions can be managed by the Access Control system.

Logical Security

Logical access control is the brother of physical access control but is often limited to secure PC logon. Integrating these two elements can significantly increase your security. For instance, you can restrict PC access to only those who have a smart card and use this to logon to your IT network. Alternatively, you can inhibit network logon if the person is not in the building, further enhancing your security.

One example is to use the CCTV system and access system to monitor and lock doors during a denial of service (DOS) attack at the same time as sending a message to the security guards. Quite often physical and logical attacks go hand in hand.

Time & Attendance (TA) monitoring

The same badge/token used to identify a person in Access Control can register them on and off work with Time & Attendance monitoring. Also as more integrated software systems become available, use of the same software to handle Access Control, Time & Attendance and Visitor Monitoring can be achieved. Remember however, that just because a person went through an Access Control door does not mean they are registered for work, especially under Working Time Directive (WTD) rules. You will need separate T&A clocking stations, albeit on the same network, to monitor working hours and software to calculate employee hours, monitor absences and WTD hours and infringements.

Human Resources (HR) / Payroll

Why enter data twice? When a new employee joins a company his personnel details are often entered into both the appropriate HR system and then again into the security system. By integrating these two systems, a subset of the employee data can automatically be transferred into the Access Control System when an employee joins. Alternatively, when an employee leaves, his rights can be automatically deleted from the Access Control System, again reducing effort and increasing security.

CCTV Systems

By integrating CCTV and other systems such as Access Control, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. IP camera can be integrated with Motion Sensor not only that If IP camera has I/O port you can integrate with other systems like, Hooter, Auto dialer etc. Through Video management intelligent Software you can get face reorganization, license plate reorganization etc.  For example:

Live camera views can be integrated with the Access Control Software, equally Access Control or other data can be integrated with the CCTV system.

Access Control and other security detection systems can initiate pre and post-event video recording, linking the video recording with the event information. This makes searching for events on the DVR/NVR more effective as only the event needs to be searched, for example ‘Door forced – Stores Door’ or ‘Zone 1 – Perimeter breached.’

Track individuals and record their access details against the recording to track suspect users or stolen card users.

Initiate camera presets when specific pre-determined events occur, e.g. when entering a room in a bank, switch the camera to zoom into the door to identify the individual.

Use CCTV with Time & Attendance system to detect / eradicate ‘buddy-clocking’, a practice where employees clock each other on and off work.

Intruder Alarms Systems (IAS)

By integrating intruder with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

Set / unset the intruder system using an access reader. No need to use the intruder keypad.

No entry delay time if main door forced. The entry timer is bypassed thus providing an instant alarm.

Disabling of access readers when the intruder system is in the armed state, to prevent false alarms due to unauthorised entry into an armed area.

Using an occupancy count from another system, the Intruder & Hold Up Alarm system can be notified that there may be persons present in the building when the system is being set.

External Perimeter Detection

One of the fundamental objectives of a security system is to provide protection at the outermost perimeter of a property. A perimeter intruder detection system can be used, linked with CCTV to provide early warnings and increased security through verification in the event of a breach. For example, external doors could be automatically locked if the perimeter system detects an abnormal event.

Fire Detection & Alarm Systems

Fire protection / Detection systems have traditionally been isolated from other building management and security systems. By integrating fire with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

In the event of a fire all emergency exit doors on the fire escape route need to be automatically released from an electrical point of view, but physical quick release locks may be in place to maintain security and still allow people to escape. It is common practice to install a relay in series with the electric locking mechanism controlled by the fire panel. An alternative is to feed a fire input into the Access Control System, which then automatically releases the appropriate electric locking mechanisms. The proposed link between the Access Control System and the fire system should be evaluated as part of the fire risk assessment.

In addition to providing hardware control during a fire situation, it may be necessary to provide a ‘roll call’ or ‘muster’ report to list all people in the building at the time of the fire alarm.

PA system (PAS)

In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. Paging can be integrated with IP camera systems. Small amplifiers are used to power speakers that can be used with the cameras.

It is also important that the video management software (VMS) supports the audio. Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera.

The Digital Acoustic intercom system is independent of the VMS and uses its own Windows paging software. In this case, the security person can receive an alert from an intercom and be notified on their Windows computer. The software also allows the security person to view a nearby IP camera. This is not quite as integrated as the first method, but can provide additional security.

PA Controller should be integrate with Fire Detection system, in case of fire PA system automatic start announcement to evac said area.

Visitor Management Systems (VMS)

For many companies and organizations, a manual paper-based VMS will suffice, providing visual identity of visitors. However, computerized systems linked to Access Control and Time & Attendance systems are the natural bedfellows for integrated security systems. These not only print ID passes, but can also incorporate biometric identification and the scanning of visitor/contractor documentation, licenses, certificates and insurance certificates.

Lift Control

By integrating lift control with the access control system, access to certain floors in a building may be

Restricted, particularly outside normal working hours or in multi-tenanted buildings. To monitor of lift you can fix CCTV Camera which is integrate with Access Control.

Car Park Management (CPM)

Where access to a car park is restricted, the ISMS can automatically monitor the number of spaces left for each tenant or department and regulate access accordingly. For example:

Visually through CCTV.

Audibly through an intercom system.

Automatic number plate recognition.

Access Control tokens.

Guard Tour System (GTS)

By using a guard tour package that integrates with the access door readers can be used to define and monitor a tour by a specific guard, providing a real time indication if the guard does not reach a set point in time (or even if he arrives too early) – equally integration with the CCTV system can provide visual verification of the guard’s location and wellbeing. Many Time & Attendance systems incorporate Guard tour functions as part of their software package.

Building Management Systems (BMS)

Building management systems are responsible for monitoring and controlling the environment of a building, for example lighting control, heating and ventilation (HVAC). In the current climate of energy saving, why leave lights on when an area is unoccupied? By integrating Access Control Systems with BMS systems, the lighting can be automatically controlled by recording when people access an area. The system can also be configured to control the heating by reducing the room temperature when no one is present rather than leaving it on all day and off at night.

Electronic Point of Sale (EPOS)

The logic of integrating security systems together is evident, however if information from systems such as EPOS can be interfaced then a powerful security solution for applications in the retail market and casinos can be deployed.

Data sent from an EPOS system can be overlaid on a live video display, allowing operators to view the camera feed and till transaction simultaneously. The transaction information and alarms enerated by the EPOS system can be bookmarked and recorded alongside the video. This facilitates visual identification of an incident in both real time and through post-event analysis. Powerful transaction analysis can be undertaken on the stored data, for example, finding out when a particular credit card was used by searching every till in a store or across all stores from the head office.

Conversely, recorded video can be searched using a thumbnail feature, which displays a video still image for every transaction, allowing the operator to quickly identify the relevant footage. Evidential quality video clips and associated transaction data can be exported for investigation or use in court.

Alarms generated by the EPOS system, such as ‘register drawer left open’, ‘refund’, or ‘large dollar amount’ can automatically trigger a number of events, including displaying the nearest camera to the specific till and pinpointing the alarm on an interactive map.



Wednesday, August 16, 2023

Difference Between CCTV and Surveillance Cameras?

Difference Between CCTV and Surveillance Cameras?

When it comes to matters of security, there is a great deal of misunderstanding regarding the distinction between closed-circuit television and surveillance cameras. In spite of the fact that many people use these phrases synonymously, there is a significant difference between the two.

In this article, we will go over the key distinctions between closed-circuit television (CCTV) systems and surveillance cameras, and then we will assist you in selecting the system that is most suited to meet your requirements and how to Select The Right CCTV System.

What Is CCTV?

A CCTV system consists of a number of cameras to record activity, a digital video recorder (DVR) to store footage, and a monitor to view the recordings. You can also add security features like motion detectors and alarms.

Most people install CCTV systems for security purposes. They deter burglars and can help identify criminals after the fact. But they have other uses too. For example, you can use them to keep an eye on employees or children.

CCTV systems come in all shapes and sizes. They can be as simple as a single camera connected to a DVR, or they can be more complex with multiple cameras, different types of storage, and remote viewing capabilities. The type of system you need depends on your specific needs.

Installing a CCTV system can be a great way to improve security at your home or business. But it’s important to make sure you understand all the ins and outs before making any decisions.

What Is A Security Camera?

The word “security camera” is often used, although many people have no idea what they are. Monitoring and recording activity in a certain area is the primary function of security cameras.

They’re commonly found in public locations like shops, banks, and other establishments of a commercial nature. The usage of security cameras to discourage criminals and safeguard families is becoming more common.

There are a wide variety of security cameras to choose from. Small enough to fit in your hand, yet with a wide range of size options.

The region you want to keep an eye on will dictate the kind of camera you require. In order to watch your front entrance, you’ll need a different kind of camera than you’ll need to monitor your backyard, for instance.

Wireless and wired security cameras are available. A cable connects a wired camera to a recorder, such as a DVR. Wi-Fi is a common method of transmitting footage from wireless cameras.

Wireless cameras are preferred by many people since they are easy to set up and can be put anywhere in your house or company.

Analog and digital security cameras are two of the most common varieties. Analog cameras record footage using an analogue signal. Unlike digital cameras, this sort of camera is older and less prevalent.

What is The Main Differences Between CCTV and Security Camera

CCTV cameras, or closed-circuit television cameras, are a type of security camera that is typically used in public places in order to deter crime.

Security cameras, on the other hand, can be used in both public and private settings and are often used in homes in order to provide extra security. Here are five main differences between CCTV cameras and security cameras:

-CCTV cameras typically have a wider field of view than security cameras.

-CCTV cameras are usually mounted on ceilings or high up on walls, while security cameras can be placed anywhere that provides an adequate view.

-CCTV footage is usually monitored by security personnel in a separate location, while many home security systems allow users to monitor their own footage remotely.

-CCTV cameras typically record footage continuously, while security cameras can be set to record only when motion is detected.

-CCTV cameras are usually larger and more noticeable than security cameras.

Both CCTV cameras and security cameras serve an important purpose in terms of security. It’s important to choose the right type of camera for your needs in order to ensure that you’re getting the most out of your investment.

Comparison Table Between CCTV and Security Camera

CCTV

Security Camera

CCTV stands for ‘closed-circuit television’ 

Security cameras are also known as IP cameras; Internet Protocol Cameras.

As wired network cords, CCTV cameras utilize

Power over Ethernet (POE) is used by security cameras to reduce the requirement for electrical cables.

CCTV systems have a lesser video quality and image quality than security cameras.

Security cameras provide greater video quality and pixel density than CCTV cameras.

A television is used to transmit feeds from CCTV cameras.

Wi-Fi, LAN, or cellular networks are used to link security cameras.

CCTV is not wirelessly accessible and can be disarmed easily.

Security or IP cams are much more efficient and can be controlled wirelessly regardless of distance.

How To Select The Right CCTV System

When it comes to choosing a CCTV system, there are many things to consider in order to find the right one for your needs. Here are a few tips on how to select the right CCTV system:

-First, you need to determine what type of coverage you need. Are you looking for indoor or outdoor coverage?

-Second, you need to decide on the features that are important to you. Do you need night vision or motion detection?

-Third, you should consider the size and placement of the cameras. You will need to make sure that they are placed in strategic locations in order to get the best coverage possible.

-Fourth, you will need to choose a system that is compatible with your existing security system. If you don’t have a security system, you will need to choose one that is easy to install and use.

-Finally, you will need to decide on a budget. There are many different CCTV systems on the market, so you will need to find one that fits your needs and budget.

When it comes to choosing a CCTV system, there are many things to consider. With these tips in mind, you should be able to find the perfect system for your needs!

How To Select The Right Security Camera

It’s important to do your research when selecting a security camera. You want to make sure you’re getting a high-quality product that will be effective in protecting your home or business. Here are a few things to keep in mind when making your selection:

– The type of camera you need will depend on the area you’re trying to monitor. Indoor cameras are typically small and unobtrusive, while outdoor cameras need to be weatherproof and durable.

– Resolution is an important factor to consider. Higher resolutions mean better image quality, but they also require more storage space and processing power.

– Night vision is another key feature to look for. Many cameras now come with infrared LEDs that allow them to see in low-light conditions.

– Some cameras come with additional features like motion detection and two-way audio. These can be useful in certain situations, but they’re not essential for everyone.

Take your time to compare different security cameras and find the one that’s right for you. With so many options on the market, there’s sure to be a perfect match for your needs.

Conclusion

Make sure you’re getting exactly what you want with SSA INTEGRATE’s services.
We ensure that the solutions we are implementing will meet your demands now and in the future by going through our clients’ requirements.

No matter how many cameras you need, our team can manage all the design, estimating, specifications, equipment use and new equipment installation along with the necessary training and maintenance. We are not recommended to install HikVision, Dahua & Huawei.

It is our goal to give the best possible customer service prior to and following the installation. Regardless of the situation, customers can always rely on our knowledge and team.

Tuesday, August 1, 2023

IoT - How it Works in Access Control

Internet of Things - How it Works in Access Control 

The "Internet of Things" precisely known as IoT is an integrated network of intelligent computing devices connected through the internet to communicate with each other without any human interference.

What is IoT?

The Internet of Things (IoT) is a technological concept of connecting multiple devices that have the possibility of switching on and off the web in order to use software and automation processes for smart living. IoT is an innovation that changes the way we organize our lives at home and at work, as well as the way we move and use transportation means and manage industrial machinery. Any object, even people, in terms of smartphones and wearables, can be a part of the IoT grid.

The IoT is not limited to computers or other most common devices used for web connections. It’s typical to expect a desktop, a tablet, and a mobile to find their place in the IoT, but the concept encompasses way more. For example, smart vehicles, whose navigation systems depend on a computer dashboard connected to the web can be part of the Internet of Things. Any equipment that can support the smart sensor technology is viable for the IoT environment.

It’s not too difficult to imagine how the IoT grid is and how it will be transforming our workplaces. The Internet of Things at work enables smart buildings that automate business processes and improve security. In a way, IoT office solutions are a bridge from the physical to the virtual workplace.

Taking the physical information and transforming it into virtual data via IoT sensors results in the ability to manage many processes from anything that has a computer processor. Although we haven’t exhausted all IoT ideas for offices, many organizations have benefited from accepting the basics of the concept, creating smart lighting and aircon systems, as well as smart access control systems.

The access control mechanisms restrict unauthorized users from accessing the system by introducing appropriate mechanisms. Data sharing is the process of exchanging information among IIoT users. The access control and data sharing strict the legitimate users can only exchange their data. The access control defines which type of users can access the information of the particular IIoT system and is permitted to perform the control activities.

Internet of Things Ecosystem

IoT is a new concept of integrated network of different kinds of computing devices in the field of information technology. It is based on the IP network in which every individual machine used in manufacturing, security, transportation, and other fields of our day-to-day life is assigned a unique IP to communicate with each other.

Every machine/device is connected with the related sensors, which trigger the control system to issue instructions to a particular machine for some action to perform automatically. This network can communicate through both wireless and wired internet connectivity.

How is IoT used in access control system?

Internet of things is a backbone of modern IoT access control system commonly known as intelligent door locking systems. In this system, every lock, lock access controller, card reader and other associated devices are assigned a separate IP address, which is used for communication among the devices.

In a single building, all those intelligent machines are normally connected through wireless networks to their consolidated management software or mobile application. These applications can be configured for automatic as well as manual operation of different locks and controllers. The security alerts and notifications can also be configured to receive on mobile apps in real time.

Each device/machine is configured for its operating conditions, criteria, sensitivity and authority in core management control software, which is used as controller of the entire system. A duplicate control of this system is used as a mobile app on your mobile devices too; you can receive the status of your access system and you can also issue instructions from your app. Any malicious activity in your access system generates an alert and detailed notification on your mobile app or main management software controller.

What products use it?

Internet of things is used by thousands of types of products in general and almost all parts of the IoT security system commonly used in modern buildings. In access control, intelligent lockscard readerskeypads and other related devices use the technology behind the concept of the internet of things.

Every authorized mobile device also uses its unique IP address in the network to get an access into the main controller for using the intelligent locking system. The main server also has a unique IP address to establish iot communication among the components of entire IoT access control ecosystem.

Advantages of IoT in Access Control

The main benefits of using IoT security system based on IoT include:

- Fully integrated and highly intelligent system

- Accessible from anywhere around the world

- Capabilities to configure for different level authorities

- Can be used for both automatic and manual operations

- Easy to track the records of events

- A comprehensive approach towards secure life

Disadvantages of IoT in Access Control

The main disadvantages of using IoT access control system include:

- Certain hacking and security related issues still persist

- Not so mature technology

- Complex and costly

The nodes maintain an access control list that includes information about IoT devices, users, and associated access levels. Generally, the IIoT is formed using a group of embedded devices like sensors, cameras, and actuators to achieve a specific task. Designing access control and data sharing in such environments are very challenging owing to limited resources and heterogeneity. Context awareness, inter-domain operation, privacy assurance, resource efficiency, manageability, and accountability are some of the requirements of IIoT access control. The access control strategies are categorized into rule-based, capability-based, user control, and attribute-based.

The phrase “knowledge is power” has been taken to a whole new level by IoT technology that has been adapted in diverse areas. Governments have implemented the use of IoT devices in their activity processes such as the use of military drones while IoT devices are used by healthcare facilities and hospitals to provide high-quality healthcare services.

While smartphone and computers have been around for a long time, IoT is a relatively new phenomenon. Therefore, manufacturers and software developers have had sufficient time to address the susceptibilities pertaining to their data breach. IoT devices, alternatively, are extremely useful and come with various capabilities. Manufacturers still encounter problems such as dearth of passable hardware that is strong enough to examine and encode data yet trivial enough to fit inside the restricted space. Cybercriminals can access your home Wi-Fi network through such indiscreet devices and use the opportunity to watch your home surveillance camera to carry out a crime.

The fundamental purpose of implementing IoT devices across numerous segments is to create a completely cohesive smart city. With this integration, any device used in a manufacturing industry can link to another being used by government organizations, healthcare providers, trades or even one’s home network. Nevertheless, the law is yet to formulate privacy protection laws that cover all weaknesses across the different sectors. Cybercriminals continue to take advantage of this shortcoming, which results in the loss of revenue already invested into the project.

How to secure IoT networks

Here are some of the steps that can boost the security of your IoT network.

Know your IoT network

The first measure to take to enhanced security is to recognize and learn what you have and what needs to be protected. While it may appear one of the initial and basic steps, many companies tend to ignore this. Having an appropriate list of what’s on your IoT network and updating it frequently is key to security in any IoT network.

An IoT network usually comprises numerous devices and any of these devices can be used as a source to upset an entire IoT network. Organizations should focus on fixing the fundamentals to face the mounting cyber-risks in IoT.

IoT network security architecture

Most of the normally used surveillance devices barely support the wireless network security standards such as WPA2 or WPA3, which makes them highly vulnerable, capable of easily falling into the hands of hackers. Companies find upgradation of all these devices extremely expensive, so they should think about redesigning their network security architecture.

Divide the responsibility

One of the main problems with IoT security is that businesses often end up with security flaws since they have too much to achieve. Organizations that have their own IoT network characteristically purchase or hire paraphernalia and services from numerous services or device providers. Because IoT has to do with all these devices working together in a network, this medley of equipment can open up numerous holes that can be used to disrupt the system.

Setting up one-way connections

Setting up one-way connections is very important in an IoT network. If the endpoints in an IoT network have more privileges, cybercriminals can exploit them for cyberattacks. With the rise in the number of devices being a part of the IoT, the surface area for the invaders to attack is also increasing. Hence, businesses should restrict the skills of these IoT devices for security motives. Frequently, IoT devices are arranged in a way that they can start network connections by themselves. Although this provides much flexibility and other benefits, it can also lead to numerous security problems. By applying the exercise that all IoT devices are able to stay linked or start connections only using network firewalls and access lists will guarantee better safety.


Sunday, July 16, 2023

METHOD STATEMENT FOR ACCESS CONTROL SYSTEM INSTALLATION

METHOD STATEMENT FOR Access control System INSTALLATION


Ø TABLE OF CONTENTS

1. SCOPE

2. definitions

3. HEALTH  AND  SAFETY

4. OPERATION

5. installation and fixation

6. RESPONSIBILITIES

7. MANPOWER  REQUIRED

8. MATERIALS  REQUIREMENTs

9. EQUIPMENTs  REQUIREMENTs

10. WASTE MANAGEMENT

11. SPECIAL CONTROL MEASURES

12. SUPPORTING  DOCUMENTATION

13. DISTRIBUTION

 


1. SCOPE

Ø  This procedure to clear the method of the supply, installations of Access Control System for the project.

Ø  This document details the Access Control System Installation:

1.  Preparation of work.

2.  Delivery and inspection upon arrival of material at site.

3.  Installation of the system.

2. definitions

           PQP             : Project Quality Plan

PSP              : Project Safety Plan

QCP             : Quality Control Procedure

HSE             : Health, Safety and Environment

MS               : Method Statement

ITP               : Inspection Test Plan

QA/QC         : Quality Assurance / Quality Control Engineer.

WIR              : Inspection and Test Request

MIR              : Material Verification Record.

3. HEALTH  AND  SAFETY

Ø  Strictly followed as per the manufacturer's Health and Safety recommendations for handling and use of the materials.

Ø  Ensure all involved personnel shall be aware of the same.

Ø  Specific safety measures have to follow as applicable, and all the safety measures are covered separately in the project safety plan.

4. OPERATION

Ø  Material: 

1.     Material used will be as approved by the Engineer.

2.     The sizes and routes routing will be as per the approved Shop Drawings.

Ø  Storage and Protection: 

1.     Deliver components parts to site, completely identified in accordance with shop and certified CAD Drawings prepared for this work.

2.     Store in accordance with the manufacturer’s instructions, above ground, properly protected from the weather and construction activities.

5. INSTALLATION and Fixation

Ø  Pre-Installation:

§  Make sure that civil clearance done prior to start the installation.

§  Installation will be carried out as per manufacturer recommendations, Approved shop drawings and project specifications.

 

Ø  Installation:

§  The correct installation of Host controller and Door Controller which is essential to the success of the system.

§  All Door Controllers should be networked.

§  The maximum length of one data line (Door equipment’s to door controller) must not exceed 90 meters.

§  Readers are to be wired in to appropriate colored terminals on the controller’s reader port.

§  Ensure that the Readers, EM locks , push button, door contacts are installed and terminated properly 

§  All consoles, terminals, and controllers shall be factory wired before shipment to the job site. 

§  Controller cabinet doors shall open a minimum of 170 degrees to avoid blocking personnel movement.  Each door shall be equipped with a cylinder lock, a tamper switch and a piano-type hinge with welded tamperproof pins.

§  Provisions shall be made for field wiring to enter the cabinet via standard knock-outs at the top, bottom and sides of controller cabinets.

 

Ø  Installation of Wires:

§  Each wire shall be identified at both ends with the wire designation corresponding to the wire numbers shown on the wiring diagrams that will attached in manufacturer recommendations.

§  All exposed wiring within the cabinets, consoles, and terminals shall be formed neatly with wires grouped in bundles using non-metallic, flame-resistant wiring cleats or wire ties.

§  All ferrous metal work shall be painted, in accordance with the manufacturer’s standards. 

§  All cables are to be numbered while laying the cable and wiring the system. Masking tape or proprietary numbering system can be used.

 


Ø  Wiring within Enclosures:

§  Bundle, lace, and train cables within enclosures.

§  Connect to terminal points with no excess and without exceeding manufacturer's limitations on bending radius.

 

Ø  Grounding:

§  Comply with requirements in Section "Grounding and Bonding for Electrical Systems." for grounding conductors and connectors.

§  Comply with Electricity Wiring Regulations, Sections.

§  Bond metallic equipment to the system grounding bus bar, using not smaller than the specified equipment grounding conductor by Electricity Wiring Regulations, Sections.

 

Ø  Identification

§  Identify system components, wiring, and cabling complying with ADDC Electricity Wiring Regulations. Comply with requirements for identification specified in Division 26 Section "Identification for Electrical Systems."

 

Ø  Programming

§  After making sure all the system installed in correct way from Subcontractor and supplier, programming of the system must take place before final testing and commissioning accourding to Consultant requirement and senario of the system.

§  Testing and commissioning of the system submitted separetly for this system mentioned all the procedure of Testing of the system and commissioning it.

 


Ø  Technical Assistance:

§  The installation supervising technician for the system trade shall instruct the CONSULTANT Engineer, and Construction Site Manager on the programming and correct operation of the system after the installation is completed.

§  This instruction shall be scheduled at the convenience of the staff.

§  All such instruction shall be properly recorded.

§  WIR will be issued for Consultant approval upon making sure that the installation of the system equipment’s done as per approved shop drawings, approved specs and manufacturer recommendations.

6. RESPONSIBILITIES

Ø  PROJECT MANAGER

1.     To ensure that all the preparation and application works are carried out according to the Contract Specification and with the approved drawings.

2.     To ensure that the progressing of works is carried out according to the planned program and as per the approved method of statement.

3.     To ensure that all the equipment and material required executing the work are available according to the planned construction program.

4.     To co-ordinate with the Main contractor, MEP coordinator, Safety Officer for a safe and proper execution of the works.

Ø  SITE ENGINEER

1.     To ensure that the works are carried out according to the Contract Specification, approved method statement and the shop drawings.

2.     To provide all necessary information and distribute responsibilities to his construction.

3.     To monitor the progress of work in relation with the work program and to report to the Project Manager.

4.     To co-ordinate with the safety officer and to ensure that the works are carried out in safe practicing method.

Ø  FOREMAN

1.     The foreman will carry out his duties by maintaining continuous coordination with the site engineer on daily basis, and ensure proper distribution of the work force on the required and planned locations.

2.     To ensure that his assistant foreman/ charge hand are aware of the job requirements and they have enough information to carry out their duties properly.

3.     To ensure that the daily work is progressing as planned and advice the site engineer of any requirement for additional resources.

4.     To ensure in consultation with the site engineer that the manpower involved in the works are moving as agreed and planned for the work.

5.     To control disposal of waste materials according to the instructions received from the site engineer.

6.     To ensure full coordination with the safety officer to maintain safe working and proper house keeping of the site, following the proved safety measures and further ensure that all his working team are aware of the same to prevent accident and losses.

7.     To inform the site engineer regarding areas ready for inspection.

8.     Foreman and the storekeeper are responsible for the distribution and control of materials.

Ø  SAFETY ENGINEER

1.     Ensure the implementation of all the safety measures in accordance with the HSE plan and everybody aware of it for it’s proper implementation.

2.     Ensure all the implemented safety measures are adequate to maintain safe working on the site.

3.     Inspect all the site activities and train the person to prevent accidents and it’s proper implementation.

4.     Ensure that the site is maintained clean and tidy.

Ø  TECHNICIAN FROM SUPPILER

1.     The carrying-out of work and the proper distribution of all the available resources in coordination with the sub-contractor Site Engineer on a daily basis.

2.     Daily reports of the works are achieved and coordinated for the future planning with the Site Engineer.

3.     Complying with the sub-contractor basic design practices, particularly those related to safety and engineering

4.     Meeting with any type of unforeseen incident or requirement and reporting the same to the Site Engineer immediately.

Ø  STORE KEEPER

1.     Responsible for overall Store operations in making sure to store the material delivery to the site and keep it in suitable area that will keep the material in safe from rusty and damage.

2.     One who will acknowledge the receiving of materials at site in coordination with QA/QC and concerned Engineer.

7. MANPOWER  REQUIRED

Ø  Charge hand and Experienced Technicians.

8. MATERIALS  REQUIREMENTS

Ø  ACS Components and Accessories.

9. EQUIPMENTs  REQUIREMENTs

Ø  The Equipment that will be engaged for ACS Installation will be as follows:

1.     Tools for fixing the control panel on a vertical surface.

2.     Tools for fitting the Remote Units (either Surface or Flush mount).

3.     A small flat-bladed (terminal) screwdriver.

4.     A large Posi-drive screwdriver for internal screws

5.     A pair of wire cutters/strippers appropriate for the type of cable used,

6.     Ferules and ferruling tool for dressing the ends of cables (if stranded conductors are used),

7.     Digital Multimeter for voltage and continuity tests.

8.     Pulling Spring

9.     Hammer

10. Measuring Wheel.

11. Drilling tools.

12. Ladders.

13. Scaffolding (to be provided by the contractor for the High level Area).

14. Commissioning Laptop

15. Safety requirements tools such as safety shoes, safety helmet, safety glasses, fluorescent vest, and safety gloves to insure maximum ability of safe work and dust mask when required.

 

10. WASTE MANAGEMENT

Ø  The Rubbish which would be created from our scope of works will be disposed to the designated dumping ground.

11. SPECIAL CONTROL MEASURES

Ø  The following general control measures against Safety, Environment and Quality shall be required for our scope of work and special control measures are not applicable for us :

·         Proper PPE must be worn at all time

·         Permit to work at height > 2m where applicable

·         Lifting operation permit (using crane) where applicable.

·         Confined space permit where applicable.

·         Approved work method statement and risk assessment will be made available to site.

·         All workers doing the work shall be briefed on this method statement and risk assessment.

12. SUPPORTING  DOCUMENTATION

Ø  This method Statement should be read in conjunction with the below referenced documentations :

  • ITP for Anti – termite Treatment.
  • Insulation Resistance and continuity Test Report.

13. DISTRIBUTION

Ø  Copy of this method statement shall be issued to the following for information/ action/ comments:

  1. Project Manager
  2. Site Engineer
  3. Foremen
  4. Safety Engineer
  5. Technician From Supplier
  6. Store Keeper