BS-8473-2006.pdf

上传人:小小飞 文档编号:3736434 上传时间:2019-09-22 格式:PDF 页数:30 大小:226.55KB
返回 下载 相关 举报
BS-8473-2006.pdf_第1页
第1页 / 共30页
BS-8473-2006.pdf_第2页
第2页 / 共30页
BS-8473-2006.pdf_第3页
第3页 / 共30页
BS-8473-2006.pdf_第4页
第4页 / 共30页
BS-8473-2006.pdf_第5页
第5页 / 共30页
亲,该文档总共30页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《BS-8473-2006.pdf》由会员分享,可在线阅读,更多相关《BS-8473-2006.pdf(30页珍藏版)》请在三一文库上搜索。

1、BS 8473:2006 Intruder and hold-up alarm systems Management of false alarms Code of practice ICS 13.310 NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW BRITISH STANDARD Incorporating Corrigendum No. 1 Licensed Copy: London South Bank University, London South Bank University, Th

2、u Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI Publishing and copyright information The BSI copyright notice displayed in this document indicates when the document was last issued. BSI 2006 ISBN 0 580 48850 0 The following BSI references relate to the work on this standard: Committee r

3、eference GW/1/2 Publication history First published as DD 245, 15 January 1998 Second edition, 26 March 2002 First published as BS 8473, 29 September 2006 Amendments issued since publication Amd. no.DateText affected 16761 Corrigendum No. 1 October 2006Figure B.1 and Figure B.2 corrected BS 8473:200

4、6 Licensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 2006i BS 8473:2006 Contents Foreword ii 1Scope 1 2Normative references 1 3Terms and definitions 1 4System design 4 5Administration 4 6Documentation and trai

5、ning 5 7Statistics relating to remotely notified I or b)an “unset signal” to be sent to the ARC affirming that the remotely notified alarm condition is to be filtered out and not extended to police. NOTE 2This does not preclude the client giving general or specific standing authority, by prior writt

6、en agreement, that the alarm companys ARC may designate some alarm signals as void (i.e. cancelled). NOTE 3False alerts are not regarded as false alarms. False alarms are events that have not been successfully identified and filtered out, and have therefore been notified to the police. 3.10genuine a

7、larm policed alarm condition which has resulted from: a)a criminal attack, damage, or attempt at such, upon/to the supervised premises, the alarm equipment or the transmission path carrying the alarm signal; or b)actions by emergency services in the execution of their duties; or c)a call emanating f

8、rom a hold-up alarm system made to summon urgent assistance when an assailant enters a previously defined area with the obvious intention of harming or threatening any person within that defined area NOTEAttention is drawn to Table E.1 for guidelines to avoid false activations with hold-up alarms. L

9、icensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 20063 BS 8473:2006 3.11mis-operation signal signal that is identifiable at the ARC as indicating that the I therefore all specifiers should take into account t

10、he false alarm aspect of system design proposals. Further guidance to assist in designing systems for minimization of false alarms is given in DD 243. 5 Administration 5.1General Each alarm company should appoint a person within the company who is responsible for the performance of intruder and hold

11、-up alarm systems (I 2)system design proposals meet the requirements of the alarm companys policies; 3)system design proposals do not result in systems which are likely to generate false alarms; 4)client documentation is provided in accordance with DD CLC/TS 50131-7 and DD 243; 5)comprehensive train

12、ing for alarm company staff is maintained; 6)training for operators is provided in accordance with DD CLC/TS 50131-7. b)Maintenance of all contracted systems at intervals in accordance with PD 6662. Training for operators should be offered at each site service interval. NOTESystems installed in acco

13、rdance with BS 4737 are maintained at intervals specified in BS 4737-4.2. Licensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 20065 BS 8473:2006 c)Monitoring of demands for and effectiveness of corrective maint

14、enance in accordance with PD 6662. NOTESystems installed in accordance with BS 4737 are maintained at intervals specified in BS 4737-4.2. d)Identification of abnormalities and trends likely to lead to false alarms. e)Monitoring of the alarm companys false alarm management procedure (see Clause 8). 1

15、)Collection, reporting and analysis of false alarm statistics and their causes. 2)Identification of troublesome systems, equipment and practices. 3)Identification of transmission path problems. f)Monitoring of client complaints. g)Monitoring liaison with police security systems offices and maintaini

16、ng familiarity with their policies. h)Monitoring evaluation trials on new equipment, with particular reference to false alarms. i)Ensuring compliance with this British Standard. j)Working with operational management to obtain a reduction in the incidence of false alarms. NOTEAttention is drawn to DD

17、 243:2004, 6.4.2 and DD 243:2004, 6.4.3 which are the preferred methods of unsetting for minimizing the likelihood of false alarms. 5.3Checklist of points for preventing false alarms Alarm companies should pass the information given in Annex D and Annex E to clients to aid in the prevention of opera

18、tor-related false alarms. 6 Documentation and training 6.1 For each installation, the alarm company should provide the client representative(s) with sufficient written instructions, reinforced by adequate training, to ensure correct operation can be achieved. NOTEThe client is responsible for ensuri

19、ng that only competent operators are permitted to use the I b)in the case of remotely notified I NOTEIn the case of Saturdays, Sundays and public holidays, the report may be delayed to the following office day. c)provide a register of all remotely notified alarm conditions and of all other alarm con

20、ditions (e.g. local audible) that have been reported to the alarm company, and discriminate between genuine alarms, false alarms, unconfirmed alarms, and false alerts for monthly analysis. 6.4 In all documentation and reports, the prime cause of the false alarm should be reported, not its effect. 7

21、Statistics relating to remotely notified I a sequentially confirmed alarm condition. In the case of I an intruder alarm condition. In the case of I a tamper condition. NOTE 1Where parts of an I b)by the operator at the supervised premises, acting in conjunction with the RMC and authorized by the RMC

22、, in accordance with 10.4, 10.8 and 10.9; c)remotely by means of electronic signals transmitted from the RMC (the RMC acting in conjunction with the operator in attendance at the supervised premises) and authorized by the duty officer at the RMC, in accordance with 10.4, 10.8 and 10.9. Licensed Copy

23、: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 20069 BS 8473:2006 Codes used by the alarm company service technician for maintenance and testing purposes should not be disclosed to the operator. NOTE 1The methods of re

24、storing prohibit an alarm companys service technician from remotely enabling an operator to restore an I however this is regarded as a matter for negotiation and agreement between the alarm company concerned and its ARC(s). If a policed alarm condition has occurred, restoring in accordance with 10.3

25、b) or 10.3c) should not be authorized by the RMC unless all the following conditions are satisfied. a)Operator agreement has been obtained and authorized by an agreed security discipline (normally by suitable code words or numbers). b)The description of the cause of the remotely notified alarm condi

26、tion given by the operator to the duty officer at the RMC is consistent with there being no requirement for a service technicians visit. c)The duty officer at the RMC has referred to the record of remotely notified alarm conditions (see 10.5) maintained by the ARC and is satisfied that the I b)if de

27、sign faults are noted these are reported to the SPM (see 5.2) by the next working day. 10.8Restoring of false alerts If a false alert has occurred, restoring may be authorized in accordance with the conditions set out in 10.3b) when the following conditions are satisfied. a)The operator has requeste

28、d a restore via live voice communication (e.g. telephone conversation) with the duty officer at the RMC. b)Operator agreement has been obtained and authorized by an agreed security discipline (normally by suitable code words or numbers). c)The description of the cause of the remotely notified alarm

29、condition given by the operator to the duty officer at the RMC is consistent with there being no requirement for a corrective maintenance visit. 10.9Restoring of false alerts remotely by the RMC If a false alert has occurred, restoring in accordance with 10.3c) should not be authorized by the RMC un

30、less all the conditions set out in either a) or b) are satisfied. a) 1)The operator has requested a restore via live voice communication (e.g. telephone conversation) with the duty officer at the RMC. Licensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+

31、00:00 2007, Uncontrolled Copy, (c) BSI BSI 200611 BS 8473:2006 2)Operator agreement has been obtained and authorized by an agreed security discipline (normally by suitable code words or numbers). 3)The description of the cause of the remotely notified alarm condition given by the operator to the dut

32、y officer at the RMC is consistent with there being no requirement for a corrective maintenance visit. b) 1)The RMC is an ARC conforming to BS 5979 for the monitoring of I includes any false alarm attributable to electrical interference or transients from which the I also includes the effects of mai

33、ns power failure and activations caused by rodents, insects, birds, bats, etc. C.1.2System installation Any false alarm attributable to poor workmanship (except as covered by C.1.3). C.1.3System maintenance/repair Any false alarm attributable to lack of preventative maintenance or to poor workmanshi

34、p in carrying out repairs during breakdown calls. C.1.4Procedural failure Any false alarm attributable to failure to put an I b)company-related alarm; c)operator-related alarm; d)ARC-related alarm; e)transmission path fault-related alarm; f)cause-unknown alarm. Every attempt should be made to ascert

35、ain the cause of alarms in order to minimize the number of alarms categorized as cause-unknown alarms. NOTEFurther subdivision can be useful for the alarm companys own purposes and analysis; additional forms of categorization (e.g. by age of system) can yield useful information. G.4 A record of fals

36、e alerts and unconfirmed alarms should also be maintained and those that do not result in a service technician call-out. G.5 The statistics should be reviewed by the SPM for I if only 3 months figures are available, divide by 3). O “POLICED” FALSE ALARMS per system per annum (P), during the month pe

37、riod ended on the last day of this calendar month. P Licensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 200623 BS 8473:2006 Annex H (normative)Attendance on false alarms H.1General The actions to be taken foll

38、owing the notification of a false alarm are based on the principle of greater involvement of management, rather than relying on the technical staff alone, at an early stage in false alarm repeat occurrences. In this way, a higher level of technical skills can be directed towards problem installation

39、s to ensure prompt and accurate fault diagnosis, to be followed by the correct remedial solution. H.2Attendance following activation H.2.1 Following the notification of an alarm activation a service technician should attend the premises concerned and should: a)review the event log and ensure that a

40、copy is retained on the clients file by the alarm company; b)determine any previous alarm activations; c)determine the reason for the current alarm activation in accordance with H.2.2, and record the findings; d)carry out repair or remedial work to ensure that a reoccurrence of the alarm activation

41、is unlikely. H.2.2 After the occurrence of a false alarm, inspections and all necessary tests, as appropriate, should be carried out, by the service technician, on the following. a)The operators operational procedure, including securing of supervised premises, setting of the system and whether all p

42、ersons involved with setting and unsetting the system are fully conversant with the procedures. b)The supervised premises, for any change of use or structural changes, electrical supplies or work which could affect the alarm system. c)Any possible sources of environmental interference, e.g. heating

43、systems, automatic lighting control, radio frequency interference and build up of dust and cobwebs, etc. d)The correct operation of the system, in particular: 1)control and indicating equipment; 2)power supplies, including standby batteries and voltages at the detectors and WDs; 3)movement detectors

44、, by walk tests, ensuring that the ranges are properly set and that adverse environmental influences are not inside fields of detection; 4)beam interruption detectors, ensuring that beams are not likely to be obstructed; 5)magnetic contacts, ensuring that supervised doors and windows are physically

45、secure when closed; Licensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BS 8473:2006 24 BSI 2006 6)interconnecting wiring and connections for correct functioning; 7)warning devices; ensuring correct operation inclu

46、ding self-actuation; 8)alarm transmission systems; ensuring correct operation to the ARC; 9)all tamper circuit connections; 10) equipment related to exit/entry routes including final exit/first entry locks, readers and switches; 11) PACE for correct operation and battery life. H.2.3If the alarm acti

47、vation can be determined to have been an operator error and is likely to reoccur, it might be necessary to adopt another method of unsetting such as the method described in DD 243:2004, 6.4.2. Licensed Copy: London South Bank University, London South Bank University, Thu Mar 01 06:48:59 GMT+00:00 20

48、07, Uncontrolled Copy, (c) BSI BSI 200625 BS 8473:2006 Bibliography Standard references For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. BS 4737-1:1986, Intruder alarm systems in buildings

49、Part 1: Specification for installed systems with local audible and/ or remote signalling1) BS 4737-4.2:1986, Intruder alarm systems in buildings Part 4: Codes of Practice Section 4.2: Code of practice for maintenance and records2) Other references 1 ASSOCIATION OF CHIEF POLICE OFFICERS OF ENGLAND, WALES AND NORTHERN IRELAND. Policy on police response to security systems. London: Association of Chief Police Officers of England, Wales and Northern Ireland, 2005. 2 ASSOCIATION OF CHIEF POLICE OFFICERS IN SCOTLAND. Security systems policy. G

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1