status of a zone of an l&HAS in which an intruder or hold-up alarm condition can be notified but part of the l&HAS is unset
3.1.52
pending indication
means of indicating that further information is available for display when all information cannot be displayed simultaneously
3.1.53
periodic communication
any valid signal or message
3.1.54
power supply
part of an alarm system which provides power for an l&HAS
3.1.55
prime power source
power source used to support an l&HAS under normal operating conditions
3.1.56
restore
procedure of cancelling an alarm, tamper, fault or other condition and returning an l&HAS to a previous condition
3.1.57
self powered device
device incorporating its own power sources
3.1.58
sensor
part of a detector which senses a change in condition
3.1.59 set
status of an l&HAS or part thereof in which an intruder or hold-up alarm condition can be notified
3.1.60
signal
variable parameters by which information is conveyed
3.1.61
significant reduction of range
reduction of the detection range of a movement detector, measured on the central axis of the detector, exceeding 50 % of specified range, as specified in the System Design Proposal (see CLC/TS 50131-7, F.5)
3.1.62
site specific data
information relating to the configuration of an l&HAS e.g. processing parameters
3.1.63
specific wired interconnection
interconnection conveying information pertaining to one application
3.1.64
standby period
period during which the alternative power source is capable of supporting an l&HAS
3.1.65
subsystem
part of an l&HAS located in a clearly defined part of the supervised premises capable of independent operation
3.1.66
supervised premises
part of a building and/or area in which an intrusion, attempted intrusion, or the triggering of a hold-up device may be detected by an l&HAS
3.1.67
supplementary prime power source
energy source (independent of the prime power source) capable of supporting an l&HAS for extended periods, without affecting the standby period of the alternate power source
3.1.68
system attributes
characteristics of an l&HAS arising out of its design and configuration
3.1.69
system components
individual items of equipment which make an l&HAS when configured together
3.1.70
tamper
deliberate interference with an l&HAS or part thereof
3.1.71
tamper alarm
alarm generated by tamper detection
3.1.72
tamper condition
condition of an l&HAS in which tampering has been detected
3.1.73
tamper detection
detection of deliberate interference with an l&HAS or part thereof
3.1.74
tamper protection
methods or means used to protect an l&HAS or part thereof against deliberate interference
3.1.75
tamper security
methods or means used to protect an l&HAS or part thereof against deliberate interference and the detection of deliberate interference with an l&HAS or part thereof
3.1.76
tamper signal or message
information generated by a tamper detector
3.1.77
transmission path
a transmission path between an individual alarm system and its associated alarm receiving centre(s)
3.1.78
triggering
deliberate operation of a hold-up device
3.1.79
unset
status of an l&HAS or part thereof in which an intruder or hold-up alarm condition cannot be notified
3.1.80
user
person authorised to operate an l&HAS
3.1.81
user interface
means by which a user operates an l&HAS
3.1.82
warning device
a device that gives an audible alarm in response to a notification
NOTE A warning device may also provide alert indications providing such indications are easily distinguishable from an alarm.
3.1.83
wire-free interconnection
interconnection conveying information between l&HAS components without physical media
3.1.84
zone
assessed area where abnormal conditions may be detected
Abbreviations
For the purposes of this document, the following abbreviations are used:
ARC - alarm receiving centre
ACE - ancillary control equipment
ATS - alarm transmission system
CIE - control and indicating equipment
HAS - hold-up alarm system(s)
IAS - intruder alarm system(s)
l&HAS - intrusion and hold-up alarm system(s)
WD - warning device
PS - power supply
System functions
l&HAS shall include, as appropriate to the configuration of the l&HAS, the functions specified in this standard for the detection of intruders and/or triggering, processing of information, notification of alarms and the means to operate an l&HAS.
Functions additional to the mandatory functions specified in this standard may be included in l&HAS providing they do not influence the correct operation of the mandatory functions.
System components
l&HAS components shall be classified according to their environmental capability and graded according to their performance.
l&HAS components shall be compatible within an l&HAS and selected according to the system grade and appropriate environmental classification.
Components of other applications may be combined or integrated with an l&HAS, providing the performance of the l&HAS components is not adversely influenced.
Security grading
l&HAS shall be given a security grading which will determine its performance. The grading shall be one of four grades with grade 1 being the lowest grade and grade 4 the highest. The grade of an l&HAS shall be that of the lowest graded component.
When an l&HAS is divided into clearly defined sub-systems an l&HAS may include components of differing grades within each sub-system. The grade of a subsystem shall be that of the lowest graded component within it.
Components shared by more than one sub-system shall have a grade equal to that of the highest sub-system grade (e.g. control and indicating equipment/alarm transmission systems/warning devices/power supplies).
NOTE 1 For the guidance of specifiers and those responsible for the security of premises the following grades are given:
Grade 1: Low risk
An intruder or robber is expected to have little knowledge of l&HAS and be restricted to a limited range of easily available tools.
Grade 2: Low to medium risk
An intruder or robber is expected to have a limited knowledge of l&HAS and the use of a general range of tools and portable instruments (e.g. a multi-meter).
Grade 3: Medium to high risk
An intruder or robber is expected to be conversant with l&HAS and have a comprehensive range of tools and portable electronic equipment.
Grade 4: High risk
To be used when security takes precedence over all other factors. An intruder or robber is expected to have the ability or resource to plan an intrusion or robbery in detail and have a full range of equipment including means of substitution of components in an l&HAS.
NOTE 2 In the all grades the term “Intruder” is intended to embrace other types of threat (e.g. robbery or the threat of physical violence, which might influence the design of an l&HAS).
Environmental classification
Components shall be suitable for use in one of the following environmental classes. Environmental test requirements for l&HAS components are given in the individual component standards. EN 50130-5 describes environmental test methods to be applied to l&HAS components.
NOTE 1 Classes I, II. Ill and IV are progressively more severe and therefore Class IV components may, for example, be used in Class III l&HAS.
l&HAS components shall operate correctly when exposed to environmental influences specified in 7.1, 7.2, 7.3 and 7.4. For each class, typical information is given below.
NOTE 2 Annex A includes special national conditions for specified countries.
NOTE 3 The environmental conditions described in Clause 7 are those in which an l&HAS is expected to perform correctly, they are not necessarily the conditions to be used during the testing of l&HAS components.
Environmental Class I - Indoor
Environmental influences normally experienced indoors when the temperature is well maintained (e.g. in a residential or commercial property).
NOTE Temperatures may be expected to vary between +5 °С and +40 °С with average relative humidity of approximately 75 % noncondensing.
Environmental Class II - Indoor - General
Environmental influences normally experienced indoors when the temperature is not well maintained (e.g. in corridors, halls or staircases and where condensation can occur on windows and in unheated storage areas or warehouses where heating is intermittent).
NOTE Temperatures may be expected to vary between -10 °С and +40 °С with average relative humidity of approximately 75 % non-condensing.
Environmental Class III - Outdoor - Sheltered or indoor extreme conditions
Environmental influences normally experienced out of doors when l&HAS components are not fully exposed to the weather or indoors where environmental conditions are extreme.
NOTE Temperatures may be expected to vary between -25 °С and +50 °С with average relative humidity of approximately 75 % non-condensing. For 30 d per year relative humidity can be expected to vary between 85 % and 95 % non-condensing.
Environmental Class IV - Outdoor - General
Environmental influences normally experienced out of doors when l&HAS components are fully exposed to the weather.
NOTE Temperatures may be expected to vary between -25 °С and +60 °С with average relative humidity of approximately 75 % non-condensing. For 30 d per year relative humidity can be expected to vary between 85 % and 95 % non-condensing.
Functional requirements
Detection of intruders, triggering, tampering and the recognition of faults
l&HAS shall include, as appropriate to its configuration, means for the detection of intruders, triggering, tampering and the recognition of faults necessary to meet the requirements of this standard.
NOTE When an l&HAS is configured as an IAS, i.e. only including intrusion detectors, it is not necessary for the system to provide the functionality required of a HAS. Similarly when an l&HAS is configured as an HAS it is not necessary for the system to provide functionality required of an IAS.
Other events may be detected providing this does not adversely influence the mandatory requirements for the detection of intruders, triggering, tampering and the recognition of faults.
Intruder detection
Detectors shall be suitable for the environment and application and may incorporate more than one technology.
Detectors shall be designed and installed so as to maximise the detection of genuine intrusion and minimise the risk of false alarms
An intruder signal or message shall be generated for the required duration when an intrusion detector has been activated. This duration shall be as necessary to ensure communication is achieved.
Hold-up device - triggering
l&HAS shall, as appropriate, include hold-up devices which are suitable for the environment and application.
Hold-up devices shall include means to minimise the possibility of accidental triggering.
A hold-up signal or message shall be generated when a hold-up device has been in an active condition for the required duration. This duration shall be as necessary to ensure communication is achieved.
Tamper detection
Tamper detection shall be incorporated in all l&HAS components as specified in Table 12.
A tamper signal or message shall be generated for the required duration when a tamper detector has been activated. This duration shall be as necessary to ensure communication is achieved.
Recognition of faults
Dependent upon the grade of an l&HAS means shall be provided to recognise the fault conditions specified in Table 1.
A fault signal or message shall be generated for the required duration when a fault has been present for the required period. This duration shall be as necessary to ensure communication is achieved.
Table 1 - Faults
Faults |
Grade 1 |
Grade 2 |
Grade 3 |
Grade 4 |
Detector(s) |
M |
M |
M |
M |
Hold-up device(s) |
M |
M |
M |
M |
Prime power source |
M |
M |
M |
M |
Alternative power source |
M |
M |
M |
M |
Interconnections |
M |
M |
M |
M |
Alarm transmission system(s) a |
M |
M |
M |
M |
Warning device(s) |
M |
M |
M |
M |
Other faults |
Op |
Op |
Op |
Op |
Key: M = Mandatory Op = Optional. NOTE The requirement for l&HAS to recognise detector, hold-up device, ATS and WD faults does not imply such equipment is required to provide a dedicated faults output, for example a WD fault may be derived from a failure of periodic communication. |
||||
a Where an l&HAS is required by its grade and notification option to have more than one alarm transmission system a fault on any ATS shall be recognised. |
Other functions
Masking
In grade 3 and 4 l&HAS movement detectors shall include means to detect masking.
Movement detector range reduction
In grade 4 l&HAS movement detectors shall include the means to detect significant reduction of specified range.
Operation
l&HAS shall be designed to minimise the possibility of an operator generating a false alarm.
Controls, e.g. keypad buttons, used during the operation of an l&HAS shall be clearly and unambiguously marked and logically arranged in such a manner as to minimise the possibility of incorrect operation.
Access levels
This standard specifies four levels of user access that categorise the ability of users to access the system components and controls
The four access levels are as follows.
Level 1 Access by any person
Functions required to be accessible at level 1 shall have no restriction on access.
Level 2 User access e.g. by an operator
Functions affecting the operational status (without changing an l&HAS configuration, e.g. site specific data).
Access to functions required to be accessible at level 2 shall be restricted by means of a key or code operated switch or lock or other equivalent means. Level 2 key or codes shall not provide access at level 3 or level 4.
Level 3 User access e.g. by alarm company personnel
All functions affecting an l&HAS configuration (without changing equipment design).
Access to functions required to be accessible at level 3 shall be restricted by means of a key or code operated switch or lock or other equivalent means. Level 3 key or codes shall not provide access at level 4.
Level 4 User access e.g. by the manufacturer of the equipment
Access to components to change equipment design.
Access to functions required to be accessible at level 4 shall be restricted by means of a key or code operated switch or lock or other equivalent means.
NOTE Access level 4 applies when changing the operating programme software without having activated a tamper device on the CIE or ACE.
Access at levels 3 and 4 shall be prevented until access has been permitted by a user with level 2 access. Access at level 4 shall also require authorisation by a level 3 user.
Access at levels 2, 3 & 4 may be achieved remotely providing authorisation, equivalent to that specified in Table 3, is achieved.
The functions accessible at each level are described in Table 2.
Table 2 - Levels of access
Functions |
Access levels |
|||
1 |
2 |
3а |
4b |
|
Setting |
NP |
P |
P |
NP |
Unsetting |
NP |
P |
P |
NP |
Restore l&HAS |
NP |
P |
P |
NP |
Verify l&HAS functions |
NP |
P |
P |
NP |
Interrogate event log |
NP |
P |
P |
NP |
Inhibit/isolate/override c |
NP |
P |
P |
NP |
Add/change individual authorisation codes |
NP |
P d |
P d |
Pd |
Add/delete level 2 users & codes |
NP |
NP |
P |
NP |
Add/change site specific data |
NP |
NP |
P |
NP |
Change/replace basic programme |
NP |
NP |
NP |
P |
Key: P - Permitted NP = Not permitted NOTE 1 The inclusion of the functions shown in this table does not imply that provision of such functions in l&HAS is mandatory. NOTE 2 This table specifies access levels for each function; further conditions, applicable to each function, are specified elsewhere in this standard. NOTE 3 Requirements relating to user access are not intended to restrict methods of initialisation of user access at the time that the CIE is first powered-up (e.g. the existence of default or single use access codes) |
||||
a Only when authorised at level 2. b Only when authorised at level 2 and level 3. c Depending on the grade. d An individual is only permitted to change his/her own user code. |
Authorisation
Permission to gain access to functions of an l&HAS shall be restricted by the use of authorisation codes or equivalent means as specified in Table 3.
Table 3 - Authorisation code requirements
Access levels 2, 3, & 4 |
Grade 1 differs |
Grade 2 differs |
Grade 3 differs |
Grade 4 differs |
Logical key |
1 000 |
10 000 |
100 000 |
1 000 000 |
Physical key |
300 |
3 000 |
15 000 |
50 000 |
NOTE Reference to physical and logical keys in the above table does not exclude the use of other means of authorisation, e.g. biometrics. |
Setting and Unsetting
There shall be facilities to restrict access to the means of setting and unsetting to user(s) with the appropriate level of access.