Shopping Cart

No products in the cart.

BSI DD 263:2007

$142.49

Intruder and hold-up alarm systems. Commissioning, maintenance and remote support. Code of practice

Published By Publication Date Number of Pages
BSI 2007 24
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
3 Contents
Introduction 1
1 Scope 1
2 Normative references 1
3 Terms, definitions and abbreviations 2
4 Inspection, functional testing and commissioning 4
5 Maintenance 4
6 Remote system checks 6
7 Remote support 7
8 Security measures 9
9 Responsibilities of the user/client 10
Annexes
Annex A (normative) Commissioning of an I&HAS 11
Annex B (normative) Preventative maintenance 14
Annex C (informative) Verification of health of alternative power source 16
Annex D (normative) Remote initiation of commands 17
Bibliography 18
List of tables
Table 1 – Minimum frequency of preventative maintenance 5
Table 2 – Data security measures 8
Table A.1 – Commissioning recommendations 11
Table B.1 – Preventative maintenance recommendations 14
Table C.1 – Minimum load times for common storage devices 16
Table D.1 – Remote initiation of commands 17
4 Foreword
5 Introduction
1 Scope
2 Normative references
6 3 Terms, definitions and abbreviations
3.1 Terms and definitions
8 3.2 Abbreviations
4 Inspection, functional testing and commissioning
5 Maintenance
5.1 Preventative maintenance
5.1.1 General
9 5.1.2 Frequency
Table 1 Minimum frequency of preventative maintenance
10 5.2 Corrective maintenance
6 Remote system checks
6.1 General
6.2 Review of the event record
11 6.3 Prime power source (PPS)/alternative power source (APS)
6.4 Detectors
6.5 Alarm transmission system (ATS)
6.6 Records of remote system checks
7 Remote support
7.1 General
a) lead to precise definitions for the levels of authorization, including client authorization, that are associated with each remote command as itemized in Table 2;
b) ensure that in all cases, written agreements exist with clients concerning levels of authorization;
c) ensure the proper use of dialogues by authorized persons in accordance with the agreements with clients.
12 7.2 Initialization of remote communications
7.3 Security of data
7.3.1 General
Table 2 Data security measures
13 7.3.2 Authentication
7.3.3 Audit trail
a) date and time of the dialogue;
b) identification of the remote service personnel carrying out the dialogue;
c) full details of any changes to site specific parameters;
d) the identity of the user/client authorizing such changes even though it might be impractical to obtain a written signature from the user.
8 Security measures
14 9 Responsibilities of the user/client
15 Annex A (normative) Commissioning of an I&HAS
Table A.1 Commissioning recommendations
16 Table A.1 Commissioning recommendations (continued)
18 Annex B (normative) Preventative maintenance
Table B.1 Preventative maintenance recommendations
19 Table B.1 Preventative maintenance recommendations (concluded)
20 Annex C (informative) Verification of health of alternative power source
a) With the APS disconnected from the I&HAS (which is therefore operating from the Prime Power Source only), a load is applied t…
b) The voltage of a programmable power supply may be reduced in a controlled manner to a level such that the APS is switched int…
Table C.1 Minimum load times for common storage devices
21 Annex D (normative) Remote initiation of commands
Table D.1 Remote initiation of commands
22 Bibliography
BSI DD 263:2007
$142.49