The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Bok Asis, 2019-12-03 09:41:46

pposa

pposa

PART IV
IMPLEMENTATION

APPENDIX A

ESTIMATION

Types of Cost Estimates

Several types of cost estimates are used in the implementation of physical protection systems:
budgetary estimates, preliminary design estimates, and final design estimates.

Budgetary Estimates
Budgetary estimates are prepared during the initial planning phase for a new PPS. The goal is to
arrive at a cost figure that can be used for getting the new PPS into the budget cycle. Depending on
the company’s procurement policies, the budget cycle may require that systems be identified and
submitted for consideration several (as many as five) years before the planned implementation.
Since these estimates are used for budgetary purposes, they have a large contingency, such as plus
or minus 10 to 20 percent. These estimates are difficult to prepare without actually performing a
good portion of the system design.

To prepare a budgetary estimate, the project manager can discuss costs with other companies that
have recently installed systems and ask potential vendors to develop budgetary estimates. Another
resource is the data developed by RSMeans, a company that provides construction cost
information.

Preliminary Design Estimates
If the PPS project is part of a larger construction project, the process may require a preliminary
design estimate. This estimate should be developed at the 50 percent design review stage and
normally has a contingency of plus or minus 10 percent. Since the design of the system is well
under way, draft specifications, drawings, and equipment schedules can be used to develop the
costs. Potential vendors, too, can provide estimates.

Final Design Estimates
The estimate is refined as the project advances to 100 percent completion. At this point, the final
design estimate is developed using the completed documents, drawings, and schedules. This
estimate should have minimal contingency, on the order of plus or minus 5 percent.

382 Protection of Assets Ɣ Copyright © 2012 by ASIS International

IMPLEMENTATION OF THE PHYSICAL PROTECTION SYSTEM
Appendix A. Estimation

Life-Cycle Cost

The actual cost of a PPS is its life-cycle cost. Life-cycle cost estimates include the following
components:

x Engineering and design costs. These are the costs associated with the design of the PPS,
such as determining the appropriate products to accomplish the functions specified and
producing drawings showing equipment locations, subsystem connections, and details of
wiring various devices.

x Hardware. The hardware costs include the original equipment plus startup spare parts.
x Software. The software costs are for the operating system and application system software

necessary to operate the PPS.
x Installation costs. Installation costs include labor expended in installing equipment and

software, labor to perform inspection, testing and commissioning, equipment rental,
permits, bonding, supervision, and overhead.
x Operating costs. Operating costs include expenses for personnel, power consumption, and
consumables (such as paper and ink cartridges).
x Maintenance costs. Maintenance costs include labor and spare parts for preventive and
remedial maintenance.
x Other costs. Other costs include state and local taxes, profit (10 percent), performance
bonding (3-5 percent) and contingency (5-10 percent).
x Adjustments. RSMeans data are based on national averages. For specific locations, the cost
data may need to be adjusted.

Detailed Estimating Procedures

The following is a step-by-step process for preparing an estimate for a physical protection system:

x Identify PPS subsystems. Typical subsystems for a PPS include the following:
² Fences and barriers: perimeter fences; enclosures or fences around critical utilities; and
portable, fixed, and automatic barriers

² Security control center or monitoring subsystem: consoles, workstations, computers,
printers, recorders, and displays

² Access control subsystem: card readers, badges, badge preparation equipment, door
locking devices, door position sensing devices, turnstiles, drop gates, and mantraps

² CCTV subsystem: cameras, switchers, recorders, mounts, enclosures, and monitors
² Intrusion detection interior and exterior subsystem: intrusion detection sensors, alarm

sounding devices, and display devices

Protection of Assets Ɣ Copyright © 2012 by ASIS International 383

PART IV
IMPLEMENTATION

² Lighting: lighting fixtures, mounts, enclosures, poles, and ballast
² Power, control, and data distribution: backup power, surge protection, raceways,

grounding, conduit, wire, and cable
² Communications subsystem: communications network used to connect all subsystems,

intercom, radio, network, and telephone equipment
² Search equipment: metal detectors, explosives detectors, and X-ray machines
x Identify other installation activities. Before PPS components can be installed, the site must
be prepared as follows:
² Site civil or structural modifications: grading, drainage, towers, foundations, fencing

gates, and barriers
² Specialty construction: guard houses, monitoring stations, and ballistic- and blast-

resistant structures
x Develop list of components for each subsystem. This information can be obtained from

equipment vendors’ brochures and guidelines or from RSMeans publications.
x Establish component prices. Cost data can be obtained from vendors and from RSMeans.
x Estimate installation labor. System integrators and equipment manufacturers can provide

information regarding how many personnel and how much time will be required to install
each component. They can also report the normal hourly rates.
x Identify required special equipment and rates. For the specialty construction activities
required to install a PPS, one must identify, for each activity, the number of personnel and
hours required, any special equipment needed, and the rental cost of that equipment.
x Use spreadsheet program. Once all the information has been gathered, the project manager
should construct a spreadsheet to compute the estimate for the project.

In summary, it is important to use actual cost data or recent quotes from vendors whenever
possible. The RSMeans industry averages are useful, but they must be adjusted to specific
locations. Also, because estimates contain some contingency, the project manager should expect
variation when bids are received.

In addition, a quality review is essential. After gathering the data and preparing the estimate, the
project manager should subject them to a comprehensive review process to ensure that all the
components are listed and in the correct quantities. The review should also double-check the cost
of labor and the number of personnel required for installing each component, make sure there
have not been any recent price increases, and determine whether any ongoing or near-term
changes at the site may affect the project.

384 Protection of Assets Ɣ Copyright © 2012 by ASIS International

IMPLEMENTATION OF THE PHYSICAL PROTECTION SYSTEM
Appendix A. Estimation

Sample Estimate

Figure 12-11 shows a sample spreadsheet for an integrated PPS. The sample security system consists
of the following components:

x 2 perimeter revolving doors
x 10 interior single-leaf doors
x 12 fixed CCTV cameras
x 1 pan, tilt, and zoom camera on the roof of the building
x 2 CCTV monitors
x 1 digital video recorder
x 1 computer monitor for access control

Quantity Description Unit Cost Extension Labor
$30,000.00 $30,000.00 $15,000.00
1 Revolving door
$1,000.00 $2,000.00 $1,000.00
2 8 card reader control panel $1,000.00 $1,000.00 $500.00
$1,100.00
1 Access control software $100.00 $1,100.00
$20.00 $60.00
11 Proximity card reader $75.00 $750.00 $1,000.00
$87.00 $87.00 $100.00
3 12 VDC batteries $150.00 $1,500.00
$2,000.00
10 Request to Exit Motion Detectors $2,500.00 $2,500.00 $500.00
$700.00 $8,400.00
1 24 VDC power supply $2,500.00
$8,400.00
10 24 VDC electric strikes

1 Operator training

1 PTZ CCTV camera, lens, and enclosure

12 Fixed CCTV camera, varifocal lens, and

enclosure

Subtotals $47,397.00 $32,100.00

Summary of Costs $47,397.00
Components $5,687.64
Tax & Shipping (12%)
Installation Labor ($100 per hour) $32,100.00
Subtotal
Profit (10%) $85,184.64
Subtotal $8,518.46
Performance Bond (4%) $93,703.10
Total Cost Estimate $3,748.12
$97,451.23

Figure 12-11
Sample Estimate

Protection of Assets Ɣ Copyright © 2012 by ASIS International 385

PART IV
IMPLEMENTATION

APPENDIX B

SPECIFICATION

A typical specification may be broken down into the following headings. Suggestions are provided
for some specific items that may be overlooked. Most companies and local authorities produce
impressive and voluminous contract conditions to protect themselves. The specification should
adhere to three standard sections: general, products, and execution. The example that follows
includes sample, additional subsections.

Model Specification

Part 1: General
Authority and Responsibility

In this section, state who is issuing the specification, who has responsibility for making any
changes, and who should be contacted and in what manner for any questions and comments.

Summary
This section contains the following:

x overall project description: high-level description of the overall project if PPS is part of a
larger construction project

x list of all documents included in the bid package
x PPS description: a high-level, general description of the system
x system operation: a brief description of how the system will be operated
x description of all products and services to be included in the contract, including the supply,

installation, and connection of PPS components and cable

Objectives
This section lists the system objectives so all bidders can understand what the system is intended
to achieve. The objectives should be SMART (specific, measurable, attainable, relevant, and time-
bound).

Submittal Format
Here the customer describes the outline and format for the proposals and specifies all the items to
be included in the submittal. This section should also specify all system options that should be
priced separately. The evaluation process, evaluation criteria, and criteria weighting are also
explained in this section. Clear instructions in this section will greatly simplify the proposal
evaluation process.

386 Protection of Assets Ɣ Copyright © 2012 by ASIS International

IMPLEMENTATION OF THE PHYSICAL PROTECTION SYSTEM
Appendix B. Specification

Performance Specifications
When using the RFP method of procurement, the specification is given as functional performance
requirements for the system and equipment. It is the responsibility of the bidders to select the
most appropriate equipment to fulfill the objectives and requirements of the system. Certain items
may be specified by manufacturer and model number when necessary to ensure compatibility or
performance. Part of the proposal evaluation process is to assess the quality, reliability, and
suitability of the equipment proposed.

Future Expansion
This section describes any capacity, capability, or performance expansion requirements.

System Interfaces
Here the customer indicates whether other systems will or might be connected or interfaced to this
system.

Codes and Regulations
The installation should comply with all relevant regulations, such as the following:

x ADA: Americans with Disabilities Act
x ASCII: American Standard Code for Information Interchange
x ASTM: American Society for Testing and Materials
x EIA: Electronic Industries Alliance
x FCC: Federal Communications Commission
x NEC: National Electrical Code
x NEMA: National Electrical Manufacturers’ Association
x NFPA: National Fire Protection Association
x UL: Underwriters Laboratories, Inc.

Customer-Supplied Materials and Services
This section lists any items provided by the customer, such as storage facilities, power supplies, or
tools.

Scheduling
Here the customer states the likely time frame for contract placement and job completion.

Statement of Compliance
All bidders must include a statement that the system proposed and priced complies with the
specification. Variations and suggestions for changing or improving the system should be listed
and priced separately.

Protection of Assets Ɣ Copyright © 2012 by ASIS International 387

PART IV
IMPLEMENTATION

Indemnity and Insurance
The contractor should indemnify and keep indemnified the customer against injury to, or death of,
any person and loss of, or damage to, any property arising out of or in consequence of the
contractor’s obligations under the contract and against all actions, claims, demands, proceedings,
damages, costs, charges, and expenses in respect thereof. For all claims against which the
contractor is required to insure, the insurance coverage should be a minimum of $1 million or
such greater sum as the contractor may choose in respect of any one incident. The contractor
should be expected to produce evidence of sufficient insurance coverage to meet these
requirements before any work is carried out on-site.

Bonds
A surety bond is a three-party instrument between a surety (or insurance company), the contractor,
and the project owner or customer. The agreement binds the contractor to comply with the terms
and conditions of a contract. If the contractor is unable to successfully perform the contract, the
surety assumes the contractor's responsibilities and ensures that the project is completed. Below
are the four types of contract bonds that may be required:

x Bid. This type of bond guarantees that the bidder on a contract will enter into the contract
and furnish the required payment and performance bonds.

x Payment. This type of bond guarantees payment from the contractor to persons who
furnish labor, materials, equipment, or supplies for use in the performance of the contract.

x Performance. This type of bond guarantees that the contractor will perform the contract in
accordance with its terms.

x Ancillary. These are bonds that are incidental and essential to the performance of the
contract.

Modifications and Variations
No modifications or variations to the contract should be permitted without the written consent of
the customer.

Notification
The contractor should notify the customer immediately if any unforeseen circumstances are
encountered during the course of the contract that may require modifications or variation. The
contractor should then await instructions before proceeding with any part of the contract that may
be affected.

Warranty
The contractor should be required to repair, correct, or replace any defect of any nature that may
occur for a period of 12-24 months from the date of issue of the certificate of practical completion.
The common time for the contractor to report to the job site to address a warranty issue is within
four hours of the problem report. The problem should be corrected without undue delay.

388 Protection of Assets Ɣ Copyright © 2012 by ASIS International

IMPLEMENTATION OF THE PHYSICAL PROTECTION SYSTEM
Appendix B. Specification

Therefore, the contractor should hold sufficient stock of spares to allow speedy repair or
replacement of equipment. Waiting for manufacturers to replace or repair equipment is not
acceptable. The contractor should provide the employer with contact information for reporting all
problems and defects. The warranty should include full maintenance of equipment in accordance
with the manufacturer’s recommendations. The contractor should have in operation a system
whereby all service visits are recorded in a database, and a report form should be provided to the
customer. The report form should record the date and time that the fault was reported, the nature
of the reported fault, the date and time of the visit, the actual fault identified, and the remedial
work carried out.

Maintenance
The contractor should submit a full schedule of maintenance to be carried out on the system
during the warranty period and under subsequent maintenance contracts. This section should
also state that the contractor must install all hardware and software updates and upgrades that
become available during the time the system is being installed and is under warranty. This
provision is included to protect the customer from having to accept a system that is obsolete upon
installation.

Part 2: Products

This part of the specification lists equipment. One approach is to specify every item by manufacturer
and model number. The advantage of that approach is that a totally objective comparison of all bids
can be made. The disadvantage is that such specificity precludes the use of other, possibly less
expensive or perhaps better makes of security devices that have performance characteristics as good
as or better than those specified. By specifying one model, the customer provides an advantage to
the company that has the best terms with that particular manufacturer. An alternative approach is to
produce a performance-related specification with generic device descriptions. However, that
approach requires especially careful bid assessment. Generally, a performance specification leads to
the most competitive prices. Another commonly used technique is to specify a manufacturer and
model number but follow it with the words “or equal.”

The following are some of the product categories to list in this section:

x card readers x distribution x matrix switchers x enclosures
x access control panels amplifiers x telemetry receivers x intercom equipment
x ID cards x quad units x duress buttons
x workstations x monitors x video printers x motion detectors
x transmission of x camera housings x consoles x door contacts
x pan, tilt, and zoom x monitors
video and telemetry x cabling
x cameras units x power supplies
x lenses x video recorders
x multiplexers

Protection of Assets Ɣ Copyright © 2012 by ASIS International 389

PART IV
IMPLEMENTATION

Non-Proprietary Equipment
This section should state that all equipment, consoles, telemetry, switching and multiplexing
devices, and other hardware must be commercially available, off-the-shelf products. This
requirement ensures that future extensions to the system may be carried out by any installing
company. The use of specialized, in-house manufactured components should not be allowed
unless specifically requested as part of the requirements.

Part 3: Execution
Preparation of Site

Here the customer describes the condition of the site where the system will be installed and the
work to be done by the contractor to prepare the site for the new system.

Installation and Quality Control Standards
This section states how inspections and quality control procedures will be conducted and records
will be kept.

Trade Coordination
This section states whether coordination is required with other contractors regarding, for instance,
fiber-optic cable installation or local-area network (LAN) or wide-area network (WAN)
connectivity.

Subcontracting
No part of the contract should be subcontracted to any other company or individual without the
express written permission of the customer. Unless specified to the contrary, it is assumed that all
work will be carried out by the contractor. If the contractor intends to subcontract any part of the
design or installation, that intention must be made clear in the bid submission and the name of
the subcontractor should be provided. The customer should reserve the right to accept or reject
nominated subcontractors.

Special Equipment
The contractor should normally be responsible for providing all special equipment necessary for
safe installation of all high-level equipment. It should be the contractor’s responsibility to provide
all access equipment required to complete the installation in accordance with good safety practices.

Health and Safety
The contractor should be expected to comply with all health and safety requirements of the
customer and of the authority having jurisdiction (AHJ).

390 Protection of Assets Ɣ Copyright © 2012 by ASIS International

IMPLEMENTATION OF THE PHYSICAL PROTECTION SYSTEM
Appendix B. Specification

Preassembly and Testing
All equipment should be prebuilt and tested at the contractor’s premises before being delivered to
the facility. The telemetry controls, multiplexer controls, and central recorder time/date generation
should be assembled and proved to the satisfaction of the client’s representative before being
delivered to the site.

Testing and Commissioning
When the contract is considered to be complete, a certificate of completion should be issued after
successful completion of reliability testing.

Operating Instructions
The contractor should provide a minimum of four full sets of operation manuals, operating
instructions, descriptive brochures, and technical manuals for all subsystems included in the contract.

As-Built Drawings
The contract should require the contractor to provide as-built wiring and schematic diagrams.

Training
This section specifies what training will be required, over what period, and where. It also indicates
what training manuals should be supplied and in what media. This section also states what
qualifications (such as certifications from manufacturers) are required of the trainers.

Programming
Here the customer should ask the contractor to submit a list of all proposed programming
activities, including device names, descriptions, timing, and sequence of operations. This section
should also specify all programming to be done by the contractor for all subsystems.

Upgrades
The contractor should provide and install all hardware and software upgrades that become
available for the PPS during the warranty period at no additional cost.

Protection of Assets Ɣ Copyright © 2012 by ASIS International 391

PART IV
IMPLEMENTATION

REFERENCES

ASTM International. (2011). Standard practice for security engineering symbols. F967-03. West
Conshohocken, PA: ASTM International.

National Electrical Manufacturers Association. (2008). NEMA standards publication 250-2008:
Enclosures for electrical equipment (1000 volts maximum). Rosslyn, VA: National Electrical
Manufacturers Association.

National Fire Protection Association. (2011). NFPA 70: National electrical code. Quincy, MA:
National Fire Protection Association.

National Fire Protection Association. (2011). NFPA 731: Standard for the installation of electronic
premises security systems. Quincy, MA: National Fire Protection Association.

SIA/IAPSC. (1995). Architectural graphics standard—CAD symbols for security system layout. New
York, NY: American National Standards Institute.

TIA/EIA. (2001). Commercial building telecommunications cabling standard. TIA/EIA-568-B.1.
Arlington, VA: Telecommunications Industry Association.

Underwriters Laboratories. (1999). UL 681: Standard for installation and classification of burglar
and holdup alarm systems. Camas, WA: Underwriters Laboratories.

Underwriters Laboratories. (1999). UL 1037: Standard for antitheft alarms and devices. Camas, WA:
Underwriters Laboratories.

Underwriters Laboratories. (1995). UL 1076: Standard for proprietary burglar alarm units and
systems. Camas, WA: Underwriters Laboratories.

392 Protection of Assets Ɣ Copyright © 2012 by ASIS International





INDEX

A D

access control. See entry control, of personnel database, security, 13, 14, 140, 217, 254, 357,
acoustic concerns, 114, 127, 274 389
alarm communications, 91, 95, 129, 187
alarms, nuisance, 23, 34, 91, 93, 107, 159, 164, defensible space, 42, 50, 78
delay, 23, 53, 112, 259, 303, 308
303, 361, 369 design basis threat, 10, 21, 92
analysis, 7, 20, 22, 25, 57, 129, 194, 301, 323 design team, 56, 314, 333, 345
architecture, 41, 55, 61, 66, 79, 321, 326, 340, design, of physical protection system, 29, 31, 37,

345 93, 133, 141, 187, 248, 270, 297, 301, 320,
assessment, 6, 10, 20, 23, 25, 61, 67, 93, 102, 325
detection, 23, 34, 53, 90, 92, 217, 228, 260, 303,
107, 111, 135, 159, 166, 188, 302, 321, 364, 326
370 dispensable barriers, 259, 273
asset identification, 15 documentation, 54, 129, 162, 308, 321, 335,
automated teller machines (ATMs), 75 338, 378
doors, 63, 246, 267
B drawings. See documentation
dual-technology sensors, 123
balanced design. See balanced protection
balanced protection, 32, 106, 304 E
barriers, 39, 53, 68, 112, 248, 259, 297, 383
biometrics, 219, 223, 253 effectiveness, of security system, 9, 20, 23, 26,
31, 33, 161, 166, 188, 302, 306, 314, 366
C
electromagnetic energy, 127, 182, 192
cameras, 70, 75, 77, 103, 112, 124, 134, 137, entry control, of contraband, 217, 228, 252
142, 150, 154, 161, 170, 182, 215, 354, 369 entry control, of personnel, 23, 217, 218, 228,

clear zone, 108, 112, 159, 263 239, 252, 329
closed-circuit television (CCTV). See video environmental conditions, 37, 103, 107, 110,
communications, security, 190
contingency planning, 32, 93, 113, 291, 315 127, 163
contraband. See entry control, of contraband ergonomics, 211, 213
crime prevention, 44, 60 estimation, 382
crime prevention through environmental design evaluation, 21, 96, 112, 162, 166, 210, 301, 307,

(CPTED), 37 372, 381, 386

Protection of Assets Ɣ Copyright © 2012 by ASIS International 395

F loss impact, 6, 13, 15, 18, 19, 34, 301
luminaires, 70, 175, 179
federal buildings, 78, 223
fences, 21, 39, 48, 59, 82, 99, 108, 179, 263, 383 M
fire, 97, 245, 252, 276, 277, 281
floors, 32, 58, 119, 272, 284 magnetic locks, 247, 352
maintenance, 40, 71, 86, 113, 129, 163, 176,
G
253, 350, 365, 372, 373, 389
gates, 47, 180, 252, 263 microbending, 118
glass-break sensors, 117 microwave sensors, 102, 107, 112, 120, 361
goals and objectives. See problem definition microwave transmissions, 204
guards. See security officers minimum consequence of component failure, 32
motion sensors, 116, 120, 371, 380
I
O
identification badges (IDs), 47, 219, 363
identification, of subjects in videos, 135, 144, office buildings and office space, 61, 64, 161,
173, 324
166, 227, 247
implementation, 5, 79, 319 P
information protection, 63
infrared sensors. See passive infrared (PIR) sensors parking facilities, 41, 64, 67, 72, 80, 179, 181,
insider threat, 10, 114, 128, 255 183, 184, 264
installation, 95, 112, 129, 162, 251, 351, 383, 390
intrusion detection, 91, 93, 96, 97, 114 parts, spare, 105, 129, 162, 377, 379, 383
integration, 5, 23, 111, 130, 161, 251 passive infrared (PIR) sensors, 101, 106, 113,
intrusion detection, 128, 159, 216
invitation for bid (IFB), 347, 349 121, 252, 353
performance measures, for PPS, 34, 218, 294,
L
303, 306
lamps, 71, 163, 169, 173, 175, 177, 178 performance measures, for security staff, 35, 294
laser communication, 204 perimeter protection, 33, 58, 66, 71, 79, 99, 106,
lenses, 101, 123, 135, 138, 140, 145, 148, 151,
109, 159, 179, 262, 263
154, 171, 354 personnel (as asset to protect), 1, 7, 10, 61, 274
lighting, 39, 56, 60, 67, 70, 71, 75, 83, 103, 121, personnel (as part of PPS), 1, 31, 34, 112, 130,

125, 142, 163, 169, 215, 384 320, 325, 362, 365
lightning, 93, 101, 111, 128, 274 probability of detection, 22, 32, 92, 99, 103, 107,
line supervision, 130, 206, 352
locks, 38, 47, 228, 239, 268, 352, 359 123, 371
problem definition, 1, 5, 26, 302, 365
procedures, 1, 22, 31, 34, 112, 128, 188, 253,

275, 284, 293, 361, 366
procurement, 176, 327, 329, 335, 347, 349
protection-in-depth, 31, 106, 130, 260, 304, 325

396 Protection of Assets Ɣ Copyright © 2012 by ASIS International

R T

radiation, nuclear, 127, 233 tampering, 91, 94, 109, 114, 121, 129, 206, 255,
radio frequency (RF) communications, 149, 194, 359

198, 293 target selection, 46
radio frequency (RF) sensors, 126 testing, of physical protection system, 22, 105,
replacement, of PPS equipment, 105, 162, 172,
109, 113, 129, 162, 166, 227, 304, 336, 363,
177, 240, 361, 373, 379, 381 366, 370, 391
request for proposal (RFP), 348, 387 threat. See design basis threat
response, to alarms and incidents, 11, 23, 34, 53, threat definition, 10, 22, 26, 235
training, 31, 34, 53, 112, 188, 290, 327, 362,
93, 106, 112, 160, 259, 262, 289, 291, 294, 363, 391
313, 330, 361, 364, 375
risk assessment, 6, 9, 20, 25, 322, 325 U
risk management, 6, 8, 18, 321
roofs, 58, 65, 70, 272 Underwriters Laboratories (UL), 94, 276, 282,
357, 359
S
V
safes, 64, 69, 276, 277, 279
schools, 72, 181, 252 vaults, 64, 175, 281, 283
scramblers, 200, 207 vehicle barriers, 261, 264, 297
search technologies, 34, 229, 231, 235, 238, 252, vibration sensors, 116
video, 65, 70, 111, 124, 133, 169, 192, 289, 303,
256, 384
security officers, 23, 36, 47, 57, 78, 112, 160, 354, 368, 389
video motion detectors, 103, 124
259, 289, 294, 362 video recording, 75, 134, 138, 139, 142, 149,
seismic issues, 99, 107, 110, 114, 128
sensors, exterior, 92, 97, 99, 105, 358 156, 158, 164, 167, 303, 355
sensors, interior, 92, 104, 114, 116, 120, 127, video transmission, 124, 138, 140, 149, 192,

130, 358 203, 369
signage, 41, 72, 74, 85, 247, 361 volumetric sensors, 98, 105, 116, 120, 121, 123
sole source, 347, 348 vulnerability assessment, 9, 10, 20, 67, 301, 302,
specification, 55, 92, 96, 154, 162, 170, 324,
322
329, 336, 386
standards, 75, 78, 83, 94, 134, 183, 265, 281, W

282, 327, 337, 358, 360 walls, 32, 58, 66, 69, 75, 119, 248, 266, 273,
surveillance, 34, 38, 49, 57, 70, 124, 151, 167, 284, 310

182, 215 warranties, 163, 350, 372, 388
systems approach, 6 windows, 32, 38, 39, 47, 57, 63, 72, 75, 118,

270, 353
wireless sensors. See radio frequency (RF) sensors

Protection of Assets Ɣ Copyright © 2012 by ASIS International 397



1625 Prince Street
Alexandria, VA 22314-2818
USA
+1.703.519.6200
Fax: +1.703.519.6299
www.asisonline.org


Click to View FlipBook Version