BSI DD 263:2007
$142.49
Intruder and hold-up alarm systems. Commissioning, maintenance and remote support. Code of practice
Published By | Publication Date | Number of Pages |
BSI | 2007 | 24 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
3 | Contents Introduction 1 1 Scope 1 2 Normative references 1 3 Terms, definitions and abbreviations 2 4 Inspection, functional testing and commissioning 4 5 Maintenance 4 6 Remote system checks 6 7 Remote support 7 8 Security measures 9 9 Responsibilities of the user/client 10 Annexes Annex A (normative) Commissioning of an I&HAS 11 Annex B (normative) Preventative maintenance 14 Annex C (informative) Verification of health of alternative power source 16 Annex D (normative) Remote initiation of commands 17 Bibliography 18 List of tables Table 1 – Minimum frequency of preventative maintenance 5 Table 2 – Data security measures 8 Table A.1 – Commissioning recommendations 11 Table B.1 – Preventative maintenance recommendations 14 Table C.1 – Minimum load times for common storage devices 16 Table D.1 – Remote initiation of commands 17 |
4 | Foreword |
5 | Introduction 1 Scope 2 Normative references |
6 | 3 Terms, definitions and abbreviations 3.1 Terms and definitions |
8 | 3.2 Abbreviations 4 Inspection, functional testing and commissioning 5 Maintenance 5.1 Preventative maintenance 5.1.1 General |
9 | 5.1.2 Frequency Table 1 Minimum frequency of preventative maintenance |
10 | 5.2 Corrective maintenance 6 Remote system checks 6.1 General 6.2 Review of the event record |
11 | 6.3 Prime power source (PPS)/alternative power source (APS) 6.4 Detectors 6.5 Alarm transmission system (ATS) 6.6 Records of remote system checks 7 Remote support 7.1 General a) lead to precise definitions for the levels of authorization, including client authorization, that are associated with each remote command as itemized in Table 2; b) ensure that in all cases, written agreements exist with clients concerning levels of authorization; c) ensure the proper use of dialogues by authorized persons in accordance with the agreements with clients. |
12 | 7.2 Initialization of remote communications 7.3 Security of data 7.3.1 General Table 2 Data security measures |
13 | 7.3.2 Authentication 7.3.3 Audit trail a) date and time of the dialogue; b) identification of the remote service personnel carrying out the dialogue; c) full details of any changes to site specific parameters; d) the identity of the user/client authorizing such changes even though it might be impractical to obtain a written signature from the user. 8 Security measures |
14 | 9 Responsibilities of the user/client |
15 | Annex A (normative) Commissioning of an I&HAS Table A.1 Commissioning recommendations |
16 | Table A.1 Commissioning recommendations (continued) |
18 | Annex B (normative) Preventative maintenance Table B.1 Preventative maintenance recommendations |
19 | Table B.1 Preventative maintenance recommendations (concluded) |
20 | Annex C (informative) Verification of health of alternative power source a) With the APS disconnected from the I&HAS (which is therefore operating from the Prime Power Source only), a load is applied t… b) The voltage of a programmable power supply may be reduced in a controlled manner to a level such that the APS is switched int… Table C.1 Minimum load times for common storage devices |
21 | Annex D (normative) Remote initiation of commands Table D.1 Remote initiation of commands |
22 | Bibliography |