Showing posts with label RFID. Show all posts
Showing posts with label RFID. Show all posts

Wednesday, May 15, 2024

6 Communication Protocols Used by IoT

6 Communication Protocols Used by IoT 

The Internet of Things (IoT), is based on the networking of things. In a nutshell, Internet of Things is defined as a “proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”

The most important thing here is connectivity among objects.

Research companies like Gartner have predicted that Internet of Things will grow to 26 billion units in 2020. How will the devices be connected and what would communication be like? How will wireless communication protocols evolve?

We can boil down the wireless communication protocols into the following 6 standards:

1.   Satellite

2.   Wi-Fi

3.   Radio Frequency (RF)

4.   RFID

5.   Bluetooth

6.   NFC

In the following paragraphs, we will provide a brief overview and illustration of each of the Internet of Things communication techniques, their pros and cons, and their smartphone compatibilities.

1. Satellite

Satellite communications enable cell phone communication from a phone to the next antenna of about 10 to 15 miles. They are called GSM, GPRS, CDMA, GPRS, 2G / GSM, 3G, 4G / LTE, EDGE, and others based on connectivity speed.

In the Internet of Things language, this form of communication is mostly referred to as “M2M” (Machine-to-Machine) because it allows devices such as a phone to send and receive data through the cell network.

Pros and Cons of Satellite Communication

Pros:

·        Stable connection

·        Universal compatibility

Cons:

·        No direct communication from smartphone to the device (It has to go through satellite)

·        High monthly cost

·        High power consumption

Examples of satellite connectivity would include utility meters that send data to a remote server, commercials updated on digital billboards, or cars via Internet connectivity.

Satellite is useful for communication that utilizes low data volumes, mainly for industrial purposes but in the changing near future where the cost of satellite communication is gradually falling, the use of satellite technology might become much more viable and interesting for consumers.

2. WiFi

WiFi is a wireless local area network (WLAN) that utilizes the IEEE 802.11 standard through 2.4GhZ UHF and 5GhZ ISM frequencies. WiFi provides Internet access to devices that are within the range (about 66 feet from the access point).

Pros and Cons of WiFi

Pros:

·        Universal smartphone compatibility

·        Affordable

·        Well protected and controlled

Cons:

·        Relatively high power usage

·        Instability and inconsistency of WiFi

An example of WiFi connectivity would be Dropcam streaming live video via the local WiFi instead of streaming through a connected Ethernet LAN cable. WiFi is useful for many Internet of Things connections but such connections typically connect to an external cloud-server and are not directly connected to the smartphone. It is also not recommended for battery-powered devices due to its relatively high power consumption.

3. Radio Frequency (RF)

Radio frequency communications are probably the easiest form of communication between devices. Protocols like ZigBee or ZWave use a low-power RF radio embedded or retrofitted into electronic devices and systems.

Z-Wave’s range is approximately 100 ft (30 m). The radio frequency band used is specific to its country. For example, Europe has an 868.42 MHz SRD Band, a 900 MHz ISM or 908.42 MHz band (United States), a 916 MHz in Israel, 919.82 MHz in Hong Kong, 921.42 MHz in the regions of Australia/New Zealand) and 865.2 Mhz in India.

ZigBee is based on the IEEE 802.15.4 standard. However, its low power consumption limits transmission distances to a range of 10 to 100 meters.

Pros and Cons of Radio Frequency

Pros:

Low energy and simplicity for its technology is not dependent on the new functionality of phones

Cons:

Radio frequency technology is not used by smartphones and without a central hub to connect the RF devices to the internet, the devices cannot be connected

An example of radio frequency connectivity would be your typical television remote for it uses radio frequency, which enables you to switch channels remotely. Other examples include wireless light switches, electrical meters with in-home displays, traffic management systems, and other consumer and industrial equipment that requires short-range low-rate wireless data transfer.

Radio frequency communication protocol is useful for large deployments such as hotels where a high quantity of devices are required to be centrally and locally managed. However, in the near future, the technology might become increasingly outdated and be replaced by Bluetooth mesh networks.

4. RFID

Radio frequency identification (RFID) is the wireless use of electromagnetic fields to identify objects. Usually, you would install an active reader, or reading tags that contain a stored information mostly authentication replies. Experts call that an Active Reader Passive Tag (ARPT) system. Short-range RFID is about 10cm, but long-range can go up to 200m. What many do not know is that Léon Theremin invented the RFID as an espionage tool for the Soviet Union in 1945.

An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. Bands RFID runs on: 120–150 kHz (10cm), 3.56 MHz (10cm-1m), 433 MHz (1-100m), 865-868 MHz (Europe), 902-928 MHz (North America) (1-12m).

Pros and Cons of RFID

Pros:

Does not require power

Established and widely used technology

Cons:

Highly insecure

Ongoing cost per card

Tags need to be present as identifier and be handed over before

Not compatible with smartphones

Examples include animal identification, factory data collection, road tolls, and building access. An RFID tag is also attached to an inventory such that its production and manufacturing progress can be tracked through the assembly line. As an illustration, pharmaceuticals can be tracked through warehouses. We believe RFID technology will very soon be replaced by near-field communication (NFC) technology in smartphones.

5. Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz). If you look at the frequencies it is actually the same as WiFi such that these two technologies seem very similar. However, they have different uses. The 3 different styles of Bluetooth technology that are commonly talked about are:

Bluetooth: Remember the days where you associate Bluetooth as a battery drainer and black hole? Such Bluetooth is a heyday relic of a mobile past marked by a bulky cell phone. Such Bluetooth technology is battery draining, insecure, and are often complicated to pair.

BLE (Bluetooth 4.0, Bluetooth Low Energy): Originally introduced by Nokia and presently used by all major operating systems such as iOS, Android, Windows Phone, Blackberry, OS X, Linux, and Windows 8, BLE uses fast, low energy usage while maintaining the communication range.

iBeacon: It is the trademark for a simplified communication technique based on Bluetooth technology that Apple uses. What it actually is: a Bluetooth 4.0 sender that transmits an ID called UUID, which is recognized by your iPhone. This simplifies the implementation effort many vendors would previously face. Moreover, even non-technically trained consumers can easily use iBeacons like Estimote.com or other alternatives. Although different on a technical level, iBeacon technology can be compared to NFC on an abstract level.

Bluetooth exists in many products, such as telephones, tablets, media players, robotics systems. The technology is extremely useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with telephones (i.e., with a Bluetooth headset) or byte data with hand-held computers (transferring files). Bluetooth protocols simplify the discovery and setup of services between devices. Bluetooth devices can advertise all of the services they provide. This makes using services easier because relative to other communication protocols, it enables greater automation such as security, the network address, and permission configuration.

Comparison of Wifi & Bluetooth

Wi-Fi and Bluetooth are to some extent complementary in their applications and usage.

Wi-Fi

·        Access point centered, with an asymmetrical client-server connection where it provides all traffic routed through the access point.

·        ‍Serves well in applications where some degree of client configuration is possible and high speeds are required e.g. network access through an access node

·        ‍Ad-hoc connections are possible with WiFi but not as easily with Bluetooth for Wi-Fi Direct was recently developed to add a more Bluetooth-like ad-hoc functionality

Bluetooth

·        ‍Symmetrical between two Bluetooth devices

·        ‍Serves well in simple applications where two devices are needed to connect with minimal configuratione.g. headsets and remote controls

·        ‍Bluetooth access points do exist although they are not common

Any Bluetooth device in discoverable mode transmits the following information on-demand:

·        Device name

·        Device class

·        List of services

·        Technical information (for example device features, manufacturer, Bluetooth specification used, clock offset)

Pros & Cons of Bluetooth

Pros:

·        Every smartphone has Bluetooth where the technology is continuously being upgraded and improved through new hardware

·        Established and widely used technology

Cons:

·        Hardware capabilities change very fast and will need to be replaced

·        Running on battery the lifetime of an iBeacon is between 1month to 2 years

·        If people switch off Bluetooth, there are issues in usage.

Bluetooth technology mainly finds applications in the healthcare, fitness, beacons, security, and home entertainment industries.

Bluetooth technology is definitely the hottest technology right now but it is many times overrated or misunderstood in functionality. If the application goes beyond fun you will have to dig deep in configuration and different settings as different phones react differently to Bluetooth.

6. Near Field Communication (NFC)

Near-field communication uses electromagnetic induction between two loop antennas located within each other’s near field, effectively forming an air-core transformer. It operates within the globally available and unlicensed radio frequency ISM band of 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s. NFC involves an initiator and a target; the initiator actively generates an RF field that can power a passive target (an unpowered chip called a “tag”). This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or battery-less cards. NFC peer-to-peer communication is possible provided both devices are powered.

There are two modes:

Passive communication mode: The initiator device provides a carrier field and the target device answers by modulating the existing field. In this mode, the target device may draw its operating power from the initiator-provided electromagnetic field, thus making the target device a transponder.

Active communication mode: Both initiator and target device communicate by alternately generating their own fields. A device deactivates its RF field while it is waiting for data. In this mode, both devices typically have power supplies.

Pros & Cons of NFC

Pros:

·        Offers a low-speed connection with an extremely simple setup

·        Can be used to bootstrap more capable wireless connections

·        NFC has a short-range and supports encryption where it may be more suitable than earlier, less private RFID systems

Cons:

·        Short-range might not be feasible in many situations for it is currently only available on new Android Phones and at Apple Pay on new iPhones

Comparison of BLE to NFC

BLE and NFC are both short-range communication technologies that are integrated into mobile phones.

Speed: BLE is faster

Transfer: BLE has a higher transfer rate

Power: NFC consumes less power

Pairing: NFC does not require pairing

Time: NFC takes less time to set up

Connection: Automatically established for NFC

Data transfer rate: Max rate for BLE is 2.1 Mbits/s, max rate for NFC is 424 kbits/s.

(NFC has a shortage range, a distance of 20cm, which reduces the likelihood of unwanted interception hence it is particularly suitable for crowded areas where correlating a signal with its transmitting physical device becomes difficult.)

Compatibility: NFC is compatible with existing passive RFID (13.56 MHz ISO/IEC 18000-3) infrastructures

Energy protocol: NFC requires comparatively low power

Powered device: NFC works with an unpowered device.

NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and it allows mobile payment to replace or supplement these systems.

We believe that NFC will definitely replace the more insecure and outdated RFID cars where its use on smartphones will be limited to contact-only applications like payment, access, or identification.

Conclusion: And the IoT Winner Is?

It is very likely that the winner of these standards will be one that is available in many of the new devices and phones – otherwise, people would not use it. Today every smartphone has Bluetooth and WiFi. However, NFC is increasingly being implemented in new phones.

From our experience, a clear Internet of Things winner emerges when you have a very defined use-case. For example, if you’d like to transfer large amounts of files, WiFi is ideal. If you’d like to react on transient passengers, nothing tops Bluetooth. If you want quick, short-range interaction, NFC might be for you. Henceforth, the winning communication protocol really depends on your goals and your clearly defined use-case.

There will be many more providers of different standards – especially mesh-networked technologies such as GoTenna or mesh networked iBeacons.

Monday, September 18, 2023

Sliding Gates vs Swinging Gates

Sliding Gates vs Swinging Gates 

Gates add value and security to your property. They’re also your main control for access to who goes in and out and serve as a point of entry to your home, business, and land.

The first electric gates were invented in 1881, and the benefits of the automated gates have also evolved, catering the needs of each generation of homeowners and business owners to increase the security and the convenience of opening and closing an entry point structure. Automatic gate systems use electric motors to open and close gates through the use of a transmitter.

When it comes to perimeter defences, the first thing that will likely jump to mind is the image of a security gate, and rightly so. Security gates are often the first line of defence for many businesses when it comes to keeping intruders away, establishing a strong perimeter, and sending out a message to criminals.

However, when planning defences for a site, or considering upgrading your existing measures, it’s important to think carefully about your needs and your site capabilities. Let’s take a look at two of the most popular options of gates and how they compare.

Swinging Gates

Swinging Gates are an excellent option for many businesses. As the name suggests they swing open and shut in a wide arc. Often priced cheaper than sliding gates, they typically don’t include motors or electronics. Swinging gates don’t require concrete work or steel beams, they are low maintenance and make little noise during operation. This means that they are well-suited to isolated or rural sites, or large expansive sites where access to the grid is more limited.

If considering swinging gates as a solution for your site, you should think carefully about the available space on your premises. Swinging gates need enough space to open internally and externally in a wide arc and so might not be suitable for some sites where space is at a premium. They might also be less suited if you have particular needs for high-tech upgrades such as access control equipment or other electronic support.

Sliding Gates

If you are looking for gates at a site where space is less readily available then sliding gates may be a more sensible solution. Rather than opening and closing in an arc, sliding gates slide in and out along a track or trackless cantilever system, which both employ less of a footprint.

Sliding gates are often seen in more commercially-led settings, entrances, and residential driveways. They can be employed on rough ground and even on sloping ground if required. They are a good choice if you operate in a setting that has high-wind speeds and other unpredictable weather factors.

Unlike swing gates, sliding gates can be upgraded with access control equipment such as electronic keys, cards, fingerprint biometric readers and intercoms. These additions will always make a site more secure, however, they do come with added costs.

Confuse as to what type of gate to choose? You might wanna consider these insights.

The main advantages of sliding gates are:
• They aren’t affected by wind
• They don’t take up space on your driveway when opening and closing
• The gate can slide from the left or the right, depending on where you have space
• If you don’t have the space required, there are other types of sliding gates, such as telescopic sliding gates or bi-parting sliding gates, that take up less space.

The advantages of double swing gates:
• A double swing gate takes up less area when in operation
• They are less affected by wind
• As the weight is distributed between two gates, there is less stress on the swing gate motor, posts, and hinges.

The advantages of single swing gates:
• There are only one gate and one set of hardware to automate it, so you’re up for less installation and maintenance (assuming you purchase quality parts, as the load on all parts will be greater).

General swing gate fitting information:

• With swing gates, there are two options as to where to install the hinge. You can install the swing gate opener on the sides of your posts parallel to each other facing inwards, or on the side that faces into your property. If you do the latter, the fixings are hidden by the posts and the swing gates take up less space. 
• If your driveway slopes up from the road and there’s no room for a sliding gate, you can install a swing gate that opens outward. Just make sure it doesn’t interfere with public spaces.

Get in touch

Arranging effective perimeter security is not something that you should go at alone. No matter the size or nature of your business, we can provide you with a free, no-obligation quotation and feasibility survey to assess the security requirements of your organisation. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us here or Email us on ssaintegrate@gmail.com

Monday, November 1, 2021

2021 is a big year for Mobile Credentials

2021 is a big year for Mobile Credentials 

Modern electronic access control systems, whether on-premise or cloud-hosted, offer a variety of ways to authenticate users and grant them access to a space. Credentials are typically classified into a few categories, something you have, something you know, something you are, or any combination of these categories (multi-factor).

Keep reading to learn about four of the most common types of access control credentials and how they can help you manage your space more effectively.

In access control and identity management, authentication is done via three factors, namely what you have (keyfobs and access control cards), what you know (passwords) and what you are (biometrics).

Needless to say, more and more people are now using their smartphones to open doors. And 2020-21 is likely to be a big year for mobile credentials, whose market size and deployment are expected to reach a new height.

In terms of the “what you have” factor, regular and smart cards have been in use for a long time, whereby the user either taps the card on the reader or bring the card close to it. Yet more and more, mobile credentials, or user credentials stored in the user’s mobile phone which can then interact with the reader, have become a more popular concept and are increasingly deployed in certain end user entities such as offices, college dorms and hotels.

1. RFID

Historically, the most common credential is RFID technology using some sort of card or fob (something you have). These RFID options can range from basic proximity cards and fobs to more advanced and secure smart cards that use integrated circuit chips embedded into the card itself to provide encrypted communication with the access control readers. Not all access control cards are secure as some can be easily sniffed and cloned. Access control cards can also easily be lost or stolen, which can create a vulnerability.

2. PIN Codes

PIN codes are also a popular method where a PIN code (something you know) is assigned to a user and then used as their credential to access a space. With PIN codes, a user walks up to the keypad on a door and types in a numerical code assigned to them to authenticate and gain access to a space. PIN codes do have some drawbacks as well. PIN codes are often shared, creating a security risk. In addition, PIN codes can be cumbersome to administer and maintain.

3. Biometric

Biometric credentials have grown in popularity over the past several years and can include multiple biometric features (something you are). There are biometric devices that can scan fingerprints, retinas, or the palms of your hand to authenticate you and grant or deny access. Another biometric option is facial scanning where a device can scan a face to determine facial features that can be turned into a hash that can then be used as a credential. Biometric readers have come a long way and can offer a high level of security, but in order for biometric readers to work effectively and efficiently, they need to be installed in the right location and in the right environmental conditions.

4. Mobile Credentials

Perhaps one of the fastest-growing credentials lately is mobile credentials. Mobile credentials allow users to have a credential stored on their mobile devices, usually in the form of a mobile app, that they can use to gain access to spaces providing those spaces have compatible hardware. As a user approaches a reader, they can make an unlock request using a button on their phone or even a gesture, to gain access. Mobile credentials also have the advantage of providing multi-factor authentication easily by leveraging the built-in PIN code functionality or biometric readers of the mobile device for additional security. A system administrator can require that in addition to the mobile credential a user needs to provide either a PIN code and/or a fingerprint/facial recognition, whichever method the mobile device supports. Mobile credentials have grown in popularity so much because just about everyone has a mobile device with them at all times, and they are easy to administer compared to managing RFID cards or PIN codes.

In fact, 2020 is set to be a big year for mobile credentials as suggested by various stats and figures. Gartner, for example, has predicted that in 2020, 20 percent of organizations will use smartphones in place of traditional physical access cards, compared to just 5 percent back in 2016.


Growth drivers

That the mobile credential trend is picking up is quite understandable due to their various benefits, among them the convenience factor. Whereas the user may forget to bring their keycard, they are less likely to forget to bring their smart device. Further, compared to keycards, smartphones are less likely to be lost as users attach greater importance to them. On a related note, since chances are the user already has a mobile device, the end user entity does not have to spend extra cost to make cards for their staff.

Besides those benefits, wider technology availability will drive growth as well. “When they first appeared about 10 years ago, mobile credentials used near-field communication (NFC). Since Apple never provided API access to its NFC capabilities, adoption was limited, because the technology was only available to Android users. Today’s mobile credentials use Bluetooth, which is supported by all smartphone manufacturers and many wearables, such as smartwatches, and is therefore available to virtually everyone with a smart device. Bluetooth also ups the convenience factor since Bluetooth readers allow users to open doors without even taking their phones out of their pockets. If your customer uses a cloud-based access control system, mobile devices can communicate directly with the cloud via Wi-Fi or cellular.
 
Meanwhile, compared to cards, which can be duplicated or cloned, the mobile device has more security features. The biometric function that unlocks the phone in and of itself is a security feature that prevents misuse by others in the even the phone is lost. Meanwhile, the latest technologies also enable communications to be safer between the phone and the reader.
 
Finally, mobile credentials have the “wow” factor. “Everyone loves new gadgets, especially ones that make their lives easier. Mobile credentials are no exception. Our salespeople tell stories of closing deals as soon as they show prospective customers that they can unlock their doors with their smartphone. Property managers have begun listing mobile credentials as one of their high-tech amenities to attract new residents. Users of mobile credential apps write glowing reviews about convenience.

Still not sure which access control credential solution is right for you? We’re here to help.

The goal is no longer just limiting access to a particular space but rather managing that space effectively.

Modern electronic access control systems offer a wide variety of features to allow you to better manage business spaces and to protect your business and your brand.

Working with a qualified security sales consultant will ensure you are not installing old technology into a new installation. There is an access control solution available that is convenient, secure, and works for your user’s technology level. You can touch with SSA Integrate to get proper way, what actual is required for your premises. They are solution service provider for SUPREMA, Magnetic FAAC & certified for Honeywell Winpak Access Control.


Sunday, March 5, 2017

Access control in education sector

Access Control in Education Sector

Controlling access to school campuses and buildings is an important issue for school administrators. They need to maintain a user-friendly, welcoming school climate while ensuring that the facility is safe and secure, both when school is in session and when the buildings are unoccupied.

What is access control?
Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building or site.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating HR and other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV, which can cut costs and streamline administration costs.
What risks does the average office face and how can these be countered by access control?
Electronic access control systems are increasingly being used to enhance safety and security in educational establishments.

The average educational establishment has a transient population with many high value goods such as computers and IT equipment, not to mention the personal possessions of staff and students, which are extremely attractive for thieves.
Access control systems are all designed to allow access only to people with the necessary authority to ensure that goods and people are protected.

Educational establishments have a duty of care to provide a safe environment for pupils and staff and the application of access control can therefore help manage known or anticipated threats.

Generally systems comprise three component parts:
1. The physical barrier – to physically restrict access to a building or location via such methods as:
• Doors: secured by either a electromagnetic or strike Lock or can be revolving or sliding.
• Turnstiles and speedgates: designed to limit access to one person for one card presented.

2. The identification device – There are a number of different technologies used to identify users of an access control system, such as:
• A proximity card and reader using RFID – cards can either work at a short read range or a long read range.
• A smart card and reader.
• A swipe card and reader.
• PIN pads.
• Biometric (fingerprint, iris scanning).

3. The door controller and software – The door controller and software are at the heart of the system and are used to decide who can gain access through which access point at what time of the day. These can vary dependent on the size of the system and how many readers or sites you are trying to control from one point.
Some of the options include:
• A standalone door controller linked to a single door with no software.
• A number of door controllers all linked together to a single PC to control one site.
• A number of sites all interlinked together over a wide network area.

What added benefits can access control systems bring to educational establishments?
Protection during school hours is paramount, and the following added benefits come from access control:

Visitor monitoring
In an environment where visitors can blend in with the staff and pupils, the use of PC and computer networks should be considered. These systems can print photographic ID and allow access to be restricted to certain areas within the office. Moving to a software solution for visitor management is an easy and inexpensive solution and can provide a number of added benefits.

The system was designed to ensure the smooth operation of a 100,000 square metre complex, spread over five buildings with both students, staff and visitors accessing the different facilities sometimes at high volumes. A Smart Card system was developed which provides not only access to designated areas, but also allows all sites to be linked via a modem, allowing administration from a central point.

Automatic Number Plate Recognition
For college and university sites where students may be driving in and parking onsite, Automatic Number Plate Recognition may be a viable option. To monitor the entrance of vehicles on site, CCTV-style cameras and computer software can be used to identify number plates of vehicles. Some systems can also store photographs of the driver and vehicle for subsequent analysis. This sophisticated software allows critical information to be passed to the police to assist in the pursuit, identification and capture of offenders.

What key considerations should be taken into account when considering access control?
The outcome of the risk assessment for your office will determine the level of security you require and in turn influence your choice of access control system to be used. BSIA access control members and professional security consultancies can assist with this.

BSIA members go through rigorous checks before they are admitted into membership, meaning you are selecting quality companies to achieve peace of mind. Below are just some of the reasons why you could benefit from using the services of a BSIA member:

·        Independently inspected to the quality standard ISO 9001 with a UKAS accredited inspectorate.
·        Compliant with relevant British and European Standards and codes of practice.
·        Financially sound.
·        Professional.
·        Staff vetting conducted (where appropriate).
·        Technically proficient.
·        Committed to quality training and development.
·        Up-to-date with the latest developments in British and European policy and legislation.

Is there any legislation I should be aware of?
The Disability Discrimination Act was amended in 2005 and has significant impact not only in terms of the design of new systems, but also means that many systems may need to be upgraded to ensure compliance. This is of particular importance also for educational establishments as employees, pupils and visitors will all need to have adequate and user-friendly access to the building.
The BSIA has created a guide to help design access control systems following the introduction of the revisions which can be downloaded from www.bsia.co.uk/publications

Other legislation to be considered in relation to educational establishments is:

National minimum care standards
Health and Safety at Work Act
Occupiers Liability Act
Management of Health and Safety at Work Regulations