DD-263-2007.pdf

上传人:yyf 文档编号:3752643 上传时间:2019-09-22 格式:PDF 页数:24 大小:243.80KB
返回 下载 相关 举报
DD-263-2007.pdf_第1页
第1页 / 共24页
DD-263-2007.pdf_第2页
第2页 / 共24页
DD-263-2007.pdf_第3页
第3页 / 共24页
DD-263-2007.pdf_第4页
第4页 / 共24页
DD-263-2007.pdf_第5页
第5页 / 共24页
亲,该文档总共24页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《DD-263-2007.pdf》由会员分享,可在线阅读,更多相关《DD-263-2007.pdf(24页珍藏版)》请在三一文库上搜索。

1、DD 263:2007 Intruder and hold-up alarm systems Commissioning, maintenance and remote support Code of practice ICS 13.310 NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW DRAFT FOR DEVELOPMENT This publication is not to be regarded as a British Standard. It is being issued in th

2、e Draft for Development series of publications and is of a provisional nature. It should be applied on this provisional basis, so that information and experience of its practical application can be obtained. A review of this Draft for Development will be carried out not later than 2 years after its

3、publication. Notification of the start of the review period, with a request for the submission of comments from users of this Draft for Development, will be made in an announcement in the appropriate issue of Update Standards. According to the replies received, the responsible BSI Committee will jud

4、ge whether the Draft for Development can be converted into a British Standard or what other action should be taken. Observations which it is felt should receive attention before the official call for comments will be welcomed. These should be sent to the Secretary of BSI Technical Committee GW/1 at

5、British Standards House, 389 Chiswick High Road, London W4 4AL. Licensed Copy: London South Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI Publishing and copyright information The BSI copyright notice displayed in this document indicates

6、 when the document was last issued. BSI 2007 ISBN 978 0 580 55787 3 The following BSI references relate to the work on this publication: Committee reference GW/1 Publication history First published July 2007 Amendments issued since publication Amd. no.DateText affected DD 263:2007 Licensed Copy: Lon

7、don South Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 2007i DD 263:2007 Contents Foreword ii Introduction 1 1Scope 1 2Normative references 1 3Terms, definitions and abbreviations 2 4Inspection, functional testing and commissioning

8、 4 5Maintenance 4 6Remote system checks 6 7Remote support 7 8Security measures 9 9Responsibilities of the user/client 10 Annexes Annex A (normative) Commissioning of an I the lengthened period should be agreed in writing by the client and subject to the approval of any insurer involved. The period m

9、ay also be lengthened at the clients request which should be in writing or, in the case of a temporary request, subsequently confirmed in writing. 6 Remote system checks 6.1General Remote system checks should not generate any false alarms. If the remote system check is carried out whilst the I this

10、may be detailed in the as fitted document. NOTEIt may be necessary for the user to “walk test” certain detectors prior to the setting of the system (this is optional and depends on the agreed procedure). 6.5Alarm transmission system (ATS) A check for the correct operation of any alarm transmission s

11、ystem should be made. Where multiple transmission paths are provided, all should be tested. This should be done in conjunction with the ARC, e.g. by using ARC logs to verify correct receipt of these test signals, and should not create a false alarm. 6.6Records of remote system checks Detailed record

12、s of the checks undertaken should be recorded and the results logged. The date, time, results of the remote system checks, faults found, and the identity of any personnel and/or automated system carrying out the checks are the minimum that should be recorded. 7 Remote support 7.1General An organizat

13、ion that applies remote support for I b)ensure that in all cases, written agreements exist with clients concerning levels of authorization; c)ensure the proper use of dialogues by authorized persons in accordance with the agreements with clients. Licensed Copy: London South Bank University, London S

14、outh Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI DD 263:2007 8 BSI 2007 Annex D recommends restriction on the use of the commands that might be available remotely, typical examples of which include: client identification; I I NOTE 1The event record may be accessed

15、 only, no changes may be made to the record. on-line restore; NOTE 2Use of on-line restore is subject to the conditions described in BS 8473. site specific system configuration details; setting and unsetting the system; remote system checks; remote system diagnostics; remote omission of faulty alarm

16、 circuits or points. 7.2Initialization of remote communications Initialization of remote communications should be carried out using one of the following methods: Automatic: The CIE initiates a dialogue in response to a system event. Manual: A user or alarm company service technician initiates a dial

17、ogue at the supervised premises. Remote: Dialogue is initiated at a secure computer. This can be by direct or ringback methods, used after success of authentication process. 7.3Security of data 7.3.1General The security measures given in Table 2 are the minimum which should be implemented. Table 2Da

18、ta security measures MeasureRecommendations AuthenticationNecessary Encryption of data sentNecessary at Grade 4 only Full audit trail of remote activityNecessary Levels of access for remote service personnel A)Necessary A) Access to the remote support facility used at the secure computer requires pe

19、rmission equivalent to the requirements of BS EN 50131-1:2006, 8.3.2. Licensed Copy: London South Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 20079 DD 263:2007 7.3.2Authentication Codes used in authentication should have at least

20、one million differs, be unique for each I b)identification of the remote service personnel carrying out the dialogue; c)full details of any changes to site specific parameters; d)the identity of the user/client authorizing such changes even though it might be impractical to obtain a written signatur

21、e from the user. This audit trail should be retained for a minimum period of 15 months. If the dialogue is initiated from the CIE, or remotely by ringback, it should be possible to identify the secure computer from the audit trail. NOTEAttention is drawn to the I otherwise a tick ? should be inserte

22、d to indicate that the check is complete. A) An alternative power supply is deemed to be healthy if it is capable of supporting the required load at the correct voltage. See Annex C. B) Testing should be done in conjunction with ARC, placing the system on test before commencing. Licensed Copy: Londo

23、n South Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI DD 263:2007 14 BSI 2007 Annex B (normative)Preventative maintenance As a minimum, preventative maintenance should be in accordance with Table B.1. Table B.1Preventative maintenance r

24、ecommendations Preventative maintenance recommendationsNoteSite visitRemote system check GeneralaClient/user documentation (i.e. the as-fitted document and log book) is up to date and on site Y bCheck that installed system meets the as-fitted documentY Control and indicating equipment aCheck that al

25、l ACE is operationalYO bCheck that all PACE available are operational A)Y cInterrogate event record and take appropriate corrective action (this might require a site visit) YY dMake a record of the event recordGOO eCheck the system sets and unsets (may be taken from event record) YY fCheck set and u

26、nset indications are correctYO gActivate or simulate intruder alarm in conjunction with ARC where appropriate YO hActivate duress facility in conjunction with ARCGYO iActivate any hold-up alarm facility in conjunction with ARC where appropriate YO jCheck all indicating equipment is functioningYO kCh

27、eck no adverse tamper or fault conditions exist on the systemYY lCheck any alarm circuits/points that are on soak testYY mCheck any alarm circuits/points that are inhibited/isolatedYY nEnsure time and date of clock are correctYY oCheck outputs are operatingYO Power supplies aCheck prime power source

28、 is available YY bCheck charging voltage to APSYO cCheck “the installation date” recorded on the alternative power source. Replace if necessary YO dCheck health of alternative power source B)YY DetectorsaCheck physical condition (clean, fitted correctly, no damage, etc.) YO bCheck environmental cond

29、itions for adverse effectsYO cCheck operation of all detectors against the as-fitted documentYO dCheck that “frequently used” detectors are operating (e.g. during the last 7 unset periods or since last maintenance) Y eCheck reduction of range status of required detectorsGYY Licensed Copy: London Sou

30、th Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 200715 DD 263:2007 Table B.1Preventative maintenance recommendations (concluded) Preventative maintenance recommendationsNoteSite visitRemote system check Hold-up devices aCheck physi

31、cal conditionYO bOperate hold-up devices under test conditions and return to normal operation YO cCheck operation of all available portable hold-up devices and replace batteries/cells as appropriate Y Warning devices aCheck physical condition is satisfactoryYO bCheck correct functioning of device YO

32、 Alarm transmission system(s) aTest correct operation of all pathsYY bFor parallel connected ATE test all relevant signals through to the ARC, including “restore” YO cFor serial connected ATE test a typical signal through to the ARC, including “restore” YO dTest transmission path fault signal (all p

33、aths) to the ARC and the CIE response YO eCheck sequential confirmation signals in conjunction with the ARC YO fCheck audio confirmation in conjunction with the ARCYO gCheck visual confirmation in conjunction with the ARCYO Inter- connections aCheck physical condition and secure fixing and report da

34、mage for rectification YO bCheck interconnections for potential problemsYO TrainingaConfirm users demonstrate understanding of the alarm system operation YO bTrain any untrained users during site visit or arrange for trainingYO cRecord names of users trained on siteYO Where: Y means Yes; O means Opt

35、ional; G means some aspect(s) of the recommendation is (are) grade-dependent. NOTENot all checks will be applicable to every installed I see Table C.1. During application of this load it is essential the voltage at the output of the APS does not fall below the minimum acceptable level declared by th

36、e equipment manufacturer and that there is no impact upon the normal operation of the I see Table C.1. During the test period, the system load will be equivalent to the peak expected system load. It is essential that the voltage at the output of the APS does not fall below the minimum acceptable lev

37、el declared by the equipment manufacturer during the test period and that there is no impact upon the normal operation of the I verify that the terminal voltage exceeds the minimum acceptable level declared by the equipment manufacturer. Loading is not required. Table C.1Minimum load times for commo

38、n storage devices Type of storage deviceMinimum load time s Notes Lead acid battery10 Other re-chargeable battery1e.g. NiCad, NiMH, etc. Licensed Copy: London South Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI 200717 DD 263:2007 An

39、nex D (normative)Remote initiation of commands NOTEPermission to carry out remote initiation commands does not imply that it is mandatory for equipment to include them. Where the command is provided, it should be used as given in Table D.1. Commands not included in this table may be used with the ag

40、reement of the client/insurer. Table D.1Remote initiation of commands CommandsCommand initiated by IAS unset IAS set (alarm transmission system to have priority) ARCAlarm company User/ client ARCAlarm company User/ client aRequest for information (system status), e.g. battery checks, time check R A)

41、PPR A)PP bRemote signal test (initiate call to ARC)R A)PNR A)PN cSet system (or any part)R B)R C)R C) dUnset systemR B)R B)R C) eOn-line restore D)PPNNNN fRemote isolation of part of system (remains until manually cancelled) R E)R E)NR E)R E)N gRemote removal of isolation R E)R E)NR E)R E)N hRemote

42、inhibit of part of system (remains until I N means Not permitted; R means Restricted (see footnotes). A) Only under contract to alarm company. B) Only with agreement of client in accordance with DD 243, the client ought to inform their insurer. C) Only with agreement with the client and not permitte

43、d for DD 243 systems. D) Subject to the provisions of BS 8473. E) Only with agreement of client on a case by case basis, the client ought to inform their insurer. F) With approval of equipment manufacturer in addition to client/insurer. G) In conjunction with confirmation procedures or as part of re

44、mote system checks (under contract to alarm company and with agreement of client/insurer). H) Only as part of remote system checks (with agreement of client/insurer). I) Where receipt of signal at ARC can be confirmed during a WD delay period. Licensed Copy: London South Bank University, London Sout

45、h Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI DD 263:2007 18 BSI 2007 Bibliography Standards publications For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies

46、. BS 6799, Code of practice for wire-free intruder alarm systems BS 7042, Specification for high security intruder alarm systems in buildings BS 8473, Intruder and hold-up alarm systems Management of false alarms Code of practice DD 243, Installation and configuration of intruder alarm systems desig

47、ned to generate confirmed alarm conditions Code of practice DD CLC/TS 50131-3, Alarm systems Intrusion systems Part 3: Control and indicating equipment PD 6662, Scheme for the application of European Standards for intruder and hold-up alarm systems Licensed Copy: London South Bank University, London

48、 South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI This page deliberately left blank DD 263:2007 Licensed Copy: London South Bank University, London South Bank University, Mon Jul 16 04:08:58 GMT+00:00 2007, Uncontrolled Copy, (c) BSI BSI British Standards Institu

49、tion BSI is the independent national body responsible for preparing British Standards. It presents the UK view on standards in Europe and at the international level. It is incorporated by Royal Charter. Revisions British Standards are updated by amendment or revision. Users of British Standards should make sure that they possess the latest amendments or editions. It is the constant aim of BSI to improve the quality of our products and services. We would be grateful if anyone finding an inaccuracy or ambiguity while using

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1