• No results found

Doc 10. UTM Standards: Card Access Security System

N/A
N/A
Protected

Academic year: 2021

Share "Doc 10. UTM Standards: Card Access Security System"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

UTM Standards: Card Access Security System

1. GENERAL ... 2

1.1. GENERAL REQUIREMENTS. ... 2

1.2. SUMMARY OF WORK INCLUDED ... 2

1.3. OVERVIEW ... 2

1.4. MANDATORY REQUIREMENTS ... 3

1.5. ACCESS CONTROL SYSTEM SPECIFICATIONS: ... 4

2. PRODUCTS ... 5

2.1. ACCESS CONTROL SYSTEM... 5

2.2. CARD READERS ... 6

2.3. DOOR CONTACTS (PERSON DOORS) ... 7

2.4. DOOR CONTACTS (OVERHEAD DOORS) ... 7

2.5. MOTION DETECTION (INTERIOR AREA PROTECTION) ... 7

2.6. GLASS BREAK DETECTORS ... 8

(2)

1. GENERAL

1.1. General Requirements.

The following information is provided for the use of teams working on new or additions to existing access control systems at the University of Toronto Mississauga (UTM). Variations might be required and it is the responsibility of the Project Manager and the Consultant to ensure that the recommended changes are approved in writing by UTM campus Police & Information &

Instructional Technology Services (I&ITS) designates prior to supply, installation and/or construction.

1.2. Summary of Work Included

1.2.1. Provide and test the installation of the cabling for the card access.

1.2.2. The system shall include connection to architectural hardware devices and field devices as shown on the Drawings.

1.2.3. All wiring and connection to interfacing systems, including but not limited to, door hardware and door operators shall be provided and coordinated with the appropriate contractors.

1.2.4. The quantities of components shall be determined and installed based on the requirement to provide a complete and fully operational wiring infrastructure for card access Security System, as per the intent of the specification, and as shown on the drawings and recommended by the manufacturer.

1.3. Overview

1.3.1. For all new buildings construction and major renovations:

1.3.1.a. All Fault Tolerant door access system hardware and software must be 100% compatible and fully integrated with the access control system software that governs that building.

1.3.1.b. The University has already purchased and installed the access control server software, database and completed installation of door access hardware components at existing campus locations.

1.3.1.c. Installation of additional door access system components must fully meet the specifications of the existing access control system installation and integrate seamlessly with that system.

1.3.2. For renovations and retrofit works of existing spaces:

1.3.2.a. All door access system hardware and software must be 100% compatible and fully integrated with the access control system implemented in the building (i.e. WinPak 4.0 or LincNet).

(3)

1.3.2.b. Installation of additional door access system components must fully meet the specifications of the existing access control system and integrate seamlessly with it.

1.4. Mandatory Requirements

Mandatory Features unless otherwise specified: 1.4.1. Systems to be used:

1.4.1.a. For new buildings construction, the university has standardized on several access control systems, managed by UTM Campus Police Services and UTM I&ITS. All products specified for the system must be recognized by and work in the software environment recommended by these departments.

1.4.1.b. For renovations and retrofit works of existing spaces, the access control system implemented in that building shall be used unless otherwise specified.

1.4.2. All hardware must have a University supplied key override for any security door electrically locked.

1.4.3. All doors with the exception of overhead doors, shall report both forced open and door held unless otherwise requested by the University.

1.4.4. Overhead doors requiring access control with an electronic system (i.e. EBI, WinPak, etc.) shall be equipped with a door contact and key switch bypass.

1.4.5. All elevators equipped with a card reader to allow/restrict access to all floors so that they can be remotely locked down. Floor access will only be granted to a valid card holder. Floor tracking is not required.

1.4.6. All decisions shall be controller based.

1.4.7. Doors with automatic openers shall be interfaced so that the locking device is disengaged (unlocked) prior to the auto door operator attempting to open the door. (Avoid motor burnout and false alarms).

1.4.8. Provide glass break detector where there is a glass window integral in the door or surrounding glazing at Ground level. This may be removed by the client but the client must be advised in writing that failure to provide glass break protection may provide an undetected point of unlawful entry.

1.4.9. All servers and computers will be provided by the University of Toronto Mississauga. The University provides a virtual server to which all new and added points are attached. 1.4.10. Network specifications will be provided UTM I&ITS and documented in UTM’s Cabling

Standards document.

1.4.11. The contractor shall only submit products for which they are factory authorized to sell, install and service. The contractor shall furnish all equipment, accessories and material. This shall be done in strict accordance with specifications and applicable drawings as required for a complete and working system. All material and/or equipment necessary for

(4)

proper operation of the system not specified or described herein shall be deemed part of the specifications.

1.4.12. The University will provide the computers to be used for workstations and the access control server. All computer systems are Dell based.

1.4.13. Access control server programming, testing graphics, final commissioning, and user training to the Front End to be provided by the contractor.

1.4.14. Provide As-built drawing in AutoCAD format indicating all cables and equipment

1.5. Access Control System Specifications:

1.5.1. The access control system must be capable of performing the following tasks:

1.5.1.a. Allow or deny the unlocking of a locked entrance based on criteria established in the software for individual cardholders.

1.5.1.b. Record a log file of all system activity, including door access granted and denied, alarms, system messages, and data maintenance.

1.5.1.c. Allow monitoring of the overall system for functionality and alarms from multiple points. System will require and record alarm acknowledgments by operator. 1.5.1.d. Utilize the campus TCP/IP network for communications between controllers and

the central database.

1.5.1.e. Provide security of the door, even in the event communication is lost to the main database, allowing the door to continue to recognize which cards to grant access to, and continuing to record access transactions.

1.5.1.f. Allow proper egress in emergency situations such that no special knowledge or card is required to exit a space.

1.5.1.g. Must comply with OBC and other standards of the campus.

1.5.1.h. Provide for a Guard Tour feature to record the rounds of security personnel, including alarming if a guard check-in is overdue or missed.

1.5.1.i. Allow for central administration of the access control database for purposes of populating and maintaining the overall database, while allowing numerous secured users to grant or deny access for individuals from multiple workstations around the campus.

1.5.1.j. Allow for unattended scheduled unlocking of individual doors for a sustained period of public access.

1.5.1.k. All panels and power supplies shall have battery backup to keep the systems fully functional for a minimum of 4 hours.

(5)

2. PRODUCTS

2.1. Access Control System

2.1.1. The access control system will be a Fault Tolerant system consisting of SDM (single door reader) and DDM (double reader doors) controllers and a Main Controller or approved equivalent by UTM I&ITS and Campus Police Services.

2.1.2. FT Main Controller  Automatic hot cutover  fail safe operations  open system platform  open architecture protocol  Ethernet/PoE communication  peer to peer communications

 auto alternate communication routing  access action for disabled persons  onboard rechargeable battery circuit  user selectable input monitoring modes

 The SDM FT Controller (located at the door) has the following features:  32 Bit CPU

 onboard PoE communication  1 Weigand Reader port

 1 door lock form C relay output  1 Rex Input

 1 door position input  1 powered lock output

 The DDM FT Controller (located in a locked room) has the following features:  32 Bit ARM Processor and Architecture

 on board Ethernet communication  PoE connection

 Flash memory

 3 communication ports

 Seven segment status display  Host online notification

 tamper

(6)

 electronically Protected power input  5 state alarm monitoring

 2 Weigand reader ports

 2 door lock form C relay outputs  2 Rex Inputs

 2 door position inputs  2 alarm shunt outputs  4 voltage outputs  4 sense inputs  powered lock output

2.1.3. The controllers shall be fitted with memory expansion to handle a minimum of 25,000 cardholders.

2.1.4. Upgrade modules shall provide supervised inputs. Non-supervised input modules shall not be used.

2.1.5. Elevator access controls DGP’s shall be PCSC IQ ELV series controllers or approved equivalent by UTM I&ITS and Campus Police Services..

2.1.6. The access control system will be a Fault Tolerant system consisting of SDM (single door reader) and DDM (double reader doors) controllers and a Main Controller or approved equivalent by UTM I&ITS and Campus Police Services.

2.2. Card Readers

2.2.1. Card Readers, where wall mounted, shall HID HID-3110-6445 Dorado WP644 Magnetic Stripe card readers or approved equivalent by UTM I&ITS and Campus Police Services. 2.2.2. The access control system will be a Fault Tolerant system consisting of SDM (single

door reader) and DDM (double reader doors) controllers and a Main Controller or approved equivalent by UTM I&ITS and Campus Police Services.

2.2.2.a. Data drop to be provided nearby by UTM.

2.2.3. Doors surrounded by glazing shall have mullion mounted card readers.

2.2.4. Audible alert integral to the card reader shall be connected and shall annunciate when the door is in both “Door Held Open” and “Door Forced Open” alarm conditions, at discretion of UTM Campus Police Services.

2.2.5. Request to Exit (REX) will be in the handle or push bar of the lock.

2.2.6. In exceptional circumstances and only with the written approval of the manager, security systems, a REX may be installed above the door on the secure side as below.

2.2.6.a. REX motion detectors shall be passive infrared technology and equipped with an adjustable relay timer, a cover tamper switch and an adjustable vertical and horizontal area of detection.

(7)

2.2.6.b. REX motion detectors shall be Kantech T-Rex model #T.REX-LT or approved equivalent by UTM I&ITS and Campus Police Services.

2.2.6.c. REX motion detectors shall be monitored as a separate input and shall not be interconnected to the door contacts to be bypassed so that the request to exit is a controller-based decision.

2.2.6.d. Detectors shall have a tampered cover that is monitored as a separate input unless using the PCSC FT SDM or other controller that is not equipped with an extra input.

2.3. Door Contacts (Person Doors)

2.3.1. Door contacts shall be Sentrol 1078T 1” door contact or approved equivalent by UTM I&ITS and Campus Police Services.

2.3.2. All door contacts shall be concealed unless otherwise approved by the consultant. 2.3.3. Door contacts shall be of a colour to match the colour of the doorframe where possible.

This information must be provided at the design stage or the standard white contacts will be provided

2.4. Door Contacts (Overhead Doors)

2.4.1. Door contacts shall be Sentrol 2200 Series door contact or approved equivalent by UTM I&ITS and Campus Police Services..

2.4.2. Key Switch Bypass (Overhead Doors)

2.4.3. Key switch bypass shall consist of a tubular key and a lock switch that is maintained ON/OFF (DISARMED/ARMED) with the key removable only in the OFF (ARMED) position.

2.4.4. Key switch shall be monitored as a separate input and shall not be interconnected to the door contacts to be bypassed so that the bypass is a controller-based decision.

2.5. Motion Detection (Interior Area Protection)

2.5.1. Motion detectors shall be dual technology consisting of both passive infrared and microwave technologies and shall be Honeywell Dual Tec Series detectors or approved equivalent by UTM I&ITS and Campus Police Services.

2.5.2. Detectors shall have a tampered cover that is monitored as a separate input.

2.5.3. Detector model maximum coverage area shall be suitable to cover intended area unless otherwise specified.

(8)

2.6. Glass Break Detectors

2.6.1. Glass break detectors shall be acoustic technology with a maximum range of 15 feet and shall be Honeywell FG-1625 Glass break or approved equivalent by UTM I&ITS and Campus Police Services.

2.6.2. Glass break detectors shall be tested and approved for installation with 3M security window film.

2.6.3. Glass break detectors shall be mounted between 10ft to 12 feet from the windows they are intended to protect.

2.6.4. Detectors shall have a tampered cover that is monitored as a separate input.

2.7. Electrified Locking Devices (Door Hardware)

2.7.1. All electrified locking devices shall be fail secure devices and shall be wired in a fail secure manner during a panel and/or power failure.

2.7.2. When using the FT SDM, lock status is not monitored. With the approval of UTM I&ITS and Campus Police Services, in high security applications, electrified locking devices shall be fitted with lock status monitors and monitored as a separate input.

2.7.3. Doors equipped with a mechanical or electrical crash bar/panic set shall have a request to exit switch integral to the door hardware.

References

Related documents

Calls to numbers that match the dial patterns for this class of ser- vice (defaults to N+) are restricted, unless the number also matches a dial pattern in an “allowed” class

- Provide technical radio production and broadcasting support for the radio station - Provide radio training programmes and skills transfer/on the job training..  Ubuntu Radio

This rule states that to obtain correct exposure on a bright sunny day with a subject of average illumination you (1) Set the shutter speed to the number closest to the ISO of

Authority; Ely Shoshone Tribe Housing Dept; Fort Bidwell Indian Community Council; Karuk Tribe Housing; Northern Circle Indian Housing; Susanville Indian Rancheria; Walker River

For these regions, agricultural production and postharvest handling and storage are stages in the FSC with relatively high food losses, as opposed to the distribution and

• Card-entry access control with electronic door locks at main facility entrance and data hall entrances • Access management system to control access of employees, partners,

In the second section I review the basic ideas presented in Veblen’s main contributions on this area regarding business enterprises (industrial process, main principles,