Security Systems – Card Access Dufferin-Peel Catholic District School Board

advertisement
Dufferin-Peel Catholic District School Board
STANDARD TEXT GUIDELINE FOR
Security Systems – Card Access
for
SECONDARY AND ELEMENTARY SCHOOLS
Prepared by the Plant Department
With assistance from Vision Dynamics
Formatted by the Design Department
THE INFORMATION CONTAINED IN THIS DOCUMENT IS PROPRIETARY AND REMAINS THE PROPERTY OF
THE DUFFERIN-PEEL CATHOLIC DISTRICT SCHOOL BOARD. THIS DOCUMENT MAY NOT BE USED IN ANY
WAY, OTHER THAN AS AUTHORIZED BY THE DESIGN DEPARTMENT OF THE DUFFERIN-PEEL CATHOLIC
DISTRICT SCHOOL BOARD.
BY RECEIPT OF THIS DOCUMENT, THE RECIPIENT ACKNOWLEDGES AND
AGREES TO THIS CONDITION.
TABLE OF CONTENTS
SECURITY
SYSTEMS
Card Access
II.)
SECURITY
SYSTEMS
GUIDELINE
Card Access
1
CARD ACCESS SYSTEM............................................................................................................................... 1
1.1
2
3
4
PREAMBLE................................................................................................................................................ 1
GENERAL REQUIREMENTS ......................................................................................................................... 1
2.1
STANDARDS ............................................................................................................................................. 1
2.2
EXPERIENCE ............................................................................................................................................ 2
2.3
INSTALLATION.......................................................................................................................................... 2
2.4
SUPPORT SERVICES............................................................................................................................... 2
GENERAL DESCRIPTION.............................................................................................................................. 2
3.1
SYSTEM FUNCTIONS............................................................................................................................... 2
3.2
USER INTERFACE .................................................................................................................................... 3
3.3
SYSTEM ARCHITECTURE ....................................................................................................................... 4
FUNCTIONAL REQUIREMENTS ................................................................................................................... 5
4.1
PERSONNEL ACCESS CONTROL FUNCTIONS..................................................................................... 5
4.2
ALARM MONITORING FUNCTIONS......................................................................................................... 6
4.3
CONTROL OF READERS ......................................................................................................................... 7
4.4
EVENT MIDED CONTROL OF OUTPUT DEVICES.................................................................................. 8
4.5
SCHEDULED CONTROL OF READER CONTROLLED DOORS............................................................. 8
4.6
INHIBITING ALARMS ................................................................................................................................ 8
4.7
DATABASE STORAGE AND VERIFICATION........................................................................................... 8
4.8
COMMUNICATION FAILURES.................................................................................................................. 9
4.9
ALARM DISPLAY AND PROCESSING ..................................................................................................... 9
4.10 SYSTEM STATUS ..................................................................................................................................... 9
4.11 PRINTOUT OF SYSTEM ACTIVITY ........................................................................................................ 10
4.12 RECORDING AND RETRIEVING SYSTEM ACTIVITY FOR AUDIT....................................................... 10
4.13 INHIBIT PRINTING OR DISPLAYING OF CARD TRANSACTIONS ....................................................... 10
I.)
GUIDELINE
SECURITY
SYSTEMS
Card Access
4.14 PASSKEY PROTECTION OF COMMANDS ............................................................................................10
4.15 HELP SCREENS AND ONLINE OPERATOR AIDS.................................................................................11
4.16 TIME SCHEDULE AND HOLIDAYS .........................................................................................................11
4.17 DATABASE MAINTENANCE AND PRINTOUT........................................................................................11
4.18 AUTOMATIC SYSTEM STARTUP ...........................................................................................................11
5
6
7
8
EQUIPMENT ..................................................................................................................................................11
5.1
DOOR CONTROL UNITS.........................................................................................................................11
5.2
ELEVATOR CONTROL UNITS.................................................................................................................12
5.3
READERS.................................................................................................................................................13
5.4
CARDS......................................................................................................................................................13
5.5
COMPUTERS AND PERIPERALS...........................................................................................................14
GENERAL CONTRACT TERMS AND CONDITIONS...................................................................................14
6.1
MAINTENANCE AND REPAIR AGREEMENTS.......................................................................................14
6.2
GUARANTEE............................................................................................................................................15
6.3
APPROVALS ............................................................................................................................................15
6.4
DOCUMENTATION AND TRAINING........................................................................................................15
6.5
DRAWINGS ..............................................................................................................................................15
6.6
MISCELLANEOUS HARDWARE..............................................................................................................16
6.7
SUPERVISION..........................................................................................................................................16
6.8
COMMISSIONING OF THE SYSTEM ......................................................................................................16
INSTRUCTIONS TO BIDDERS .....................................................................................................................16
7.1
VENDOR QUALIFICATIONS....................................................................................................................16
7.2
RESPONSE TO SPECIFICATION............................................................................................................17
7.3
DESCRIPTION OF PROPOSED EQUIPMENT........................................................................................17
PHOTO BADGING & VERIFICATION...........................................................................................................17
8.1
II.)
SYSTEM FUNCTIONS AND FEATURES.................................................................................................17
SECURITY
SYSTEMS
GUIDELINE
Card Access
9
TYPICAL TENDER FORMAT FOR ACCESS CONTROL SYSTEM ............................................................ 18
10
TENDER REQUIREMENTS .......................................................................................................................... 18
10.2 WARRANTY/GUARANTEE INFORMATION ........................................................................................... 19
10.3 INSTALLATION........................................................................................................................................ 19
11
SYSTEM REQUIREMENTS .......................................................................................................................... 19
12
PROPOSAL EVALUATION CRITERIA ........................................................................................................ 20
13
APPLICABLE TAXES................................................................................................................................... 20
14
WORKER’S COMPENSATION..................................................................................................................... 20
15
BOARD’S RIGHT TO TERMINATE THE CONTRACT................................................................................. 20
16
CONSTRUCTION SAFETY ACT .................................................................................................................. 21
17
ASSIGNMENT OF CONTRACT.................................................................................................................... 21
18
LIENS AND DAMAGES ................................................................................................................................ 21
19
CONTRACTOR ON SITE.............................................................................................................................. 22
20
PROTECTION AND MAKING GOOD........................................................................................................... 22
III.)
SECURITY
SYSTEMS
GUIDELINE
Card Access
1
CARD ACCESS SYSTEM
1.1
PREAMBLE
1.1.1
The intent of this document is to provide a typical Guideline that will be used
for all JK-OAC educational and administrative facilities requiring a Card
Access System. This guideline provides the minimum performance criteria
for the components and sub-systems comprising a complete Card Access
System that shall accommodate The Dufferin-Peel Catholic District School
Board (the Board) current security system requirements.
1.1.2
It is edited for information and for the purposes of co-ordination between the
Electrical Sub-contractor under the General Contract Documents and the
Card Access Systems sub-contractor(s).
1.1.3
The Card Access System will be designed by a Board appointed Security
Systems Consultant. This Consultant shall fill in the appropriate blanks as
identified in shaded areas thus: XXX.
1.1.4
The card System shall be installed by a separate contractor, separately
tendered by the Board but paid directly by the Board from the General
Contract Allowance for Security Systems.
1.1.5
The Architect’s Consultants, in concert with the Board’s security personnel,
will indicate on the drawings which access points are to receive card
accesses and the Electrical Consultant shall indicate locations of required
power outlets.
1.1.6
The General Contractor shall provide 120 V power to the point of installation
of each system component required AC power.
2
GENERAL REQUIREMENTS
2.1
STANDARDS
2.1.1
Product specifications, general design considerations, and installation
guidelines are provided in this written document. Quantities of outlets, typical
installation details, and outlet types for the specific educational facility, or
facilities, are to be provided by the Card Access Consultant. If the bid
documents are in conflict, the written specification, based on this Guideline,
shall take precedence. The successful Vendor shall meet or exceed all
requirements of the system described in this Guideline.
2.1.2
All system components shall conform to the following standards where
appropriate:
2.1.2.1
UL STD 294:
Access Control
PAGE 1 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
2.2
2.1.2.2
CSA STD C22.2:
Bonding & Grounding of Electrical Equipment
2.1.2.3
CSA STD C22.2:
Signal Equipment
2.1.2.4
EMI emissions:
FCC Part 15
EXPERIENCE
2.2.1
All system components shall be manufactured by reliable firms with a least 15
years experience in the development and manufacture of access control and
point monitoring products.
2.2.2
The system shall be non-proprietary and or non exclusive to any installing
dealer. All components must be available through a minimum of 4 full service
security dealers located within the designated area.
2.3
INSTALLATION
2.3.1
The supplier shall supply and install all system components covered by this
specification, including all wiring for communications, monitoring and alarm
output, (if applicable).
2.3.2
The supplier shall provide one complete set of documentation covering
installation, operation and maintenance of all system components.
2.3.3
On-site training for a maximum of XX operators for XX days shall be provided
as a precondition to acceptance, if applicable.
2.3.4
The General Contractor shall provide 120 V power to the point of installation
of each system component required AC power.
2.4
SUPPORT SERVICES
2.4.1
3
The supplier shall be capable of providing on-going training and services for
all system components.
GENERAL DESCRIPTION
3.1
3.1.1
SYSTEM FUNCTIONS
The system shall integrate the following functions into a simple to use
package as described below;
3.1.1.1
Control of personnel access
3.1.1.2
Monitoring of detectors
3.1.1.3
Manual/automatic control and monitoring of doors
3.1.1.4
Reporting/auditing
3.1.1.5
Elevator control and access to floors
PAGE 2 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
3.1.2
3.2
The system software shall automatically identify all field devices and permit
the Board operator to customize each device’s configuration.
USER INTERFACE
3.2.1
Keyscan System VII software. It shall support a minimum of two primary
screens: one for event processing and direct programming of each ACU and
a second for administrative functions such as report generation and database
management. The main menu will have six (6) quick access hot buttons to
access ADD/DEL Cardholders, Time zones, Door Group Access,
Unlock/Lock Doors, Transaction Reports & Elevator Groups.
3.2.2
The operator shall be able to access either screen in an easy to manage
format.
3.2.3
The user interface shall be a windowed environment, capable of operating on
all platforms listed:
Windows™ Operating Systems 2000 Professional
XP Professional
Vista Business (32 bit)
complete with pull down menus suitable for operation on a personal computer
system with the following specifications:
3.2.4
3.2.3.1
Windows™ Operating Systems 2000 Professional (32 bit) Server
2003, XP Professional, Vista Business (32 bit)
3.2.3.2
Pentium D (or greater) processor 2.0 GHZ or higher
3.2.3.3
Minimum1 GB of Ram
3.2.3.4
Minimum 20 Gig hard drive
3.2.3.5
PS2 mouse
3.2.3.6
Colour SVGA monitor, capable of 1024 x 768 resolution
3.2.3.7
Dedicated Com Port 1 or 2 (Local site)
3.2.3.8
Local and remote site com port 1 and 2
3.2.3.9
Certain optional software features may require higher operating
specifications for optimum performance (Photo Badging and time
attendance modules)
USB Port
3.2.4.1
Internet Explorer 6 or higher installed, available service packs and
operating system patches installed.
3.2.4.2
Video card capable of 1024 x 768 resolution
PAGE 3 OF 22
GUIDELINE
SECURITY
SYSTEMS
Card Access
3.3
SYSTEM ARCHITECTURE
3.3.1
The system shall be based on independent intelligent devices which are
interconnected and communicating on a multi-drop communications network
(Both Star and Bus configurations must be supported) to an IBM PC or 100%
hardware and software compatible personal computer.
3.3.2
Event processing, system data entry, system management functions and
auditing of system activity shall be performed at the personal computer
connected to the network.
3.3.3
The system database information shall be distributed among the field devices
as well as stored in the personal computer.
3.3.4
The system shall be structured to provide a growth path from stand-alone
field devices to a completely integrated network that supports the capacities
and features specified within this document without necessitating exchanging
installed field devices.
3.3.5
A minimum 256 reader controlled portals shall be supported by the system.
3.3.6
The system shall be modular in design so that the failure of one device shall
have minimum effect on the functionality of another.
3.3.7
The system shall provide for user friendly on-line context sensitive help
instructions.
3.3.8
The system shall provide a user-definable database scrolling text window for
facility management purposes. This window shall provide the user with the
ability to enter, and modify at any time, site-specific information to be used in
managing the facility.
3.3.9
Support for a second user-definable window to be used for entering and
retrieving instructions pertaining to an emergency situation shall also be
provided. This information shall be accessible via function key.
3.3.10 The system shall have the capacity for a minimum of eight thousand (8,000)
cardholders complete with names stored in the access control units: or
16,000 cardholder numbers with the names, in this case names stored in
database.
3.3.11 The system shall record all field activity including event name/type, card ID,
cardholder name, location, time and date. This shall be in addition to all other
monitoring previously described.
3.3.12 To aid in simplifying the installation, it shall be possible to connect the
computer at any ACU on the communications network.
3.3.13 The system shall support dial-up modems, LAN/WAN connectivity and allow
for programming and monitoring of remote field systems.
PAGE 4 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
4
FUNCTIONAL REQUIREMENTS
4.1
PERSONNEL ACCESS CONTROL FUNCTIONS
4.1.1
Access into a controlled area shall be through reader controlled portals
(doors) using a token (card) in a sensing device (reader).
4.1.2
An access control unit (ACU) shall be used to control the reader(s) installed
at the door(s).
4.1.3
At least one token shall be supplied for each individual requiring access
through the controlled doors. Any person supplied with a token shall be
called a cardholder.
4.1.4
The system shall be capable of supporting all of the following token
technologies:
4.1.4.1
Proximity
4.1.4.2
Wiegand effect
4.1.4.3
Magnetic stripe
4.1.4.4
Personal Identification Number only (PIN)
4.1.4.5
Dallas Touch memory Disk
4.1.5
Each token shall be internally encoded with a Keyscan 36 Bit Wiegand
unique number. The system shall provide a central programming station to
enter these numbers into a database for transmission to each field device.
4.1.6
The sensing device (reader) shall be capable of reading the internal number
encoded in each token presented and passing this information to the ACU.
4.1.7
The ACU shall process this information and unlock the appropriate controlled
door only if the token is determined to be valid for access through that door.
4.1.8
For higher security, an additional facility shall be available for entry of a
Personal Identification Number (PIN) code on a number pad associated with
the reader. No additional Reader Port is required.
4.1.9
PIN code must be calculated from the encoded card number. All PIN codes
shall be changeable with a 5 digit key number controlling algorithm process.
4.1.10 Systems utilizing PIN codes which are derived by manipulating the encoded
numbers shall not be accepted.
4.1.11 Systems which require manual definition, entry and storage of the PIN codes
associated with the card number shall not be accepted
4.1.12 An access request at a reader shall be determined based on the following
conditions:
4.1.12.1 Is the card valid on this day of the week?
4.1.12.2 Is the card valid at this time of the day?
PAGE 5 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
4.1.12.3 Is today a holiday? If yes, is this card valid on this holiday?
4.1.12.4 Does the Personal Identification Number match with the card
sensed?
4.1.12.5 Is the card valid for this site?
4.1.12.6 Is the card valid for this door?
4.1.13 Should any of the above conditions not be met, access will not be granted.
This shall result in an “Invalid Access” event being audited and recorded.
4.1.14 Doors shall be unlocked for authorized personnel in less than one second
from entry requested regardless of all other system activity.
4.1.15 The time duration for which the door shall be unlocked shall be user definable
in one (1) second increments over the full range of 1-99 seconds.
4.1.16 Each ACU shall provide a dedicated request to exit input for each door (i.e.
an exit button) in order to prevent forced entry alarms for personnel wishing
to exit through the door. This facility shall be used to request egress from the
secure side of the door. Should a request to exit be made, the ACU shall
respond in the same manner as for access granted for a token.
4.1.17 If required, the ACU shall automatically re-lock the controlled portal whenever
the door is sensed as opened and closed regardless of the duration of the
momentary unlock period, or upon expiration of the unlock period, whichever
shall occur first. (Door contacts are not currently installed at card access
locations.
Installation of door contacts is requires for the specified
functionality.)
4.1.18 Each field device ACU shall have a capacity for at least eight thousand
(8,000) cards, c/w 16 character names or sixteen thousand (16,000) cards,
number only, depending upon the option selected for the location. This
capacity shall not be diminished by displacement from other memory storage,
e.g. event logging.
4.2
ALARM MONITORING FUNCTIONS
4.2.1
If required, each ACU shall be able to monitor the position of any properly
installed doors at all times. (I.e. door open or closed). The amount of time
that a door may remain open shall be a user definable variable. In order to
accommodate a high volume of traffic through controlled doors, the system
shall allow successive tokens to be read without requiring door closure
between reads.
4.2.2
If required, the system shall provide forced entry detection at user specified
door locations.
4.2.3
If required, a forced entry event shall be generated immediately whenever the
door is opened without authorization. Authorization shall be determined by
card or request to exit transaction at the door or by command from the host
system as described.
PAGE 6 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
4.2.4
It shall be possible to select specific events and locations that shall be printed
on hard copy without affecting card capacity.
4.2.5
Regardless of the event selections made, the computer shall record the
transaction in an audit trail on hard disk storage media such that it can be
later retrieved for audit reporting.
4.2.6
An “anti-pass-back” feature shall be available to prevent multiple use of a
card at the same door.
4.2.7
The system shall feature, in addition to the door position monitor for each
door, the provision to monitor a minimum of one thousand twenty four (1024)
supervised input points or detection zones. The system shall be capable of
detecting state changes between four distinct conditions for each of these
points:
4.2.7.1
Alarm
4.2.7.2
Secure
4.2.7.3
Trouble due to open circuit wiring
4.2.7.4
Trouble due to short circuit wiring
4.2.8
When an event is detected at any of these, the computer shall be notified and
shall generate a message stating the nature of the alarm, the location and the
time. The computer shall record the alarm such that it can be later retrieved
for an audit report.
4.2.9
It shall be possible to determine for the following specific conditions whether
the event shall be printed, displayed, both or neither.
4.2.10 The system shall support alarm maps with each input being identified on a
map alarm conditions/locations will be highlighted by a flashing icon.
4.3
CONTROL OF READERS
4.3.1
The system shall be able to manually control doors and readers from the
computer keyboard as detailed below. Doors and readers shall have plain
language descriptors of up to fifteen (15) characters.
4.3.2
The following door control commands shall be supported, at a minimum:
4.3.2.1
Unlock the door and leave it unlocked
4.3.2.2
Unlock the door momentarily such that it automatically locks after
the normal unlock interval
4.3.2.3
Lock the door
4.3.2.4
Unlock or lock all doors
4.3.3
The system shall be capable of allowing door selection for manual control by
means of drop-down lists for doors, or ACU’s.
4.3.4
The system shall also be able to control card and PIN processing as follows:
PAGE 7 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
4.4
4.3.4.1
Change the operation of number pads equipped reader such that it
requires entry of a PIN code in addition to a token.
4.3.4.2
Restore the number pad equipped reader to card only operation.
4.3.4.3
Time zone controlled number pad and reader modes.
EVENT MIDED CONTROL OF OUTPUT DEVICES
4.4.1
The ACU shall feature a means of actuating an alarm output for each door.
4.4.2
The conditions for each alarm output shall be user definable to include any
one or more of the following:
4.4.3
4.5
4.5.1
4.6
4.4.2.1
Access denied at a door for any reason.
4.4.2.2
Door position monitor detects illegal use of the door (such as door
held open too long or forced open).
4.4.2.3
An alarm event occurs at one or more of the auxiliary alarm points.
If the ACU cabinet is tampered with, an alarm output for each ACU shall
always be actuated.
SCHEDULED CONTROL OF READER CONTROLLED DOORS
The system shall provide a feature that will allow readers to be controlled on
a scheduled basis. Scheduled commands supported shall be the same as
those supported for manual keyboard commands from the computer (see
section 2.3). These schedules shall be user definable.
INHIBITING ALARMS
4.6.1
The system shall provide an alarm inhibit feature whereby changes of state
from alarm to secure or from secure to alarm for individual alarm points are
not printed, recorded or displayed by the computer. When this feature has
been invoked, trouble conditions shall continue to be reported. This feature
shall be available as both a manual keyboard command from the computer
and as a scheduled inhibit. When scheduled, the “inhibit” shall automatically
be applied to and removed from the alarm point at the scheduled times. The
schedules used for this feature are user definable on a weekly basis.
4.6.2
The system shall support the ability to completely disable an alarm point such
that no changes to or from any state shall be printed, recorded, or displayed
by the computer.
4.7
4.7.1
DATABASE STORAGE AND VERIFICATION
System information shall be stored in a database. Appropriate database
information required for full functioning of each reader shall be distributed to
reside in the non-volatile memory of the field devices. Systems-wide
PAGE 8 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
database information shall also be stored on a hard drive within the host
computer.
4.7.2
4.8
The system shall be able to ascertain if the field device or ACU has been
exchanged. Database verification checks shall be performed to ensure that
all devices operate according to the most current information. The system
shall provide the capability to perform database updates on demand.
COMMUNICATION FAILURES
4.8.1
In the event of a computer failure, all field devices installed on the system
shall remain fully functional.
4.8.2
Each field device shall be capable of retaining in memory at minimum the last
three thousand (3,000) events that occurred during the off line mode. When
communication with the computer is restored, these stored transactions shall
be transmitted to the computer for the appropriate treatment. (i. e. printout
and/or recording and/or display)
4.9
ALARM DISPLAY AND PROCESSING
4.9.1
System occurrences that are exception to the conditions shall be enunciated
as an alarm at the computer.
4.9.2
It shall be possible to assign a user definable fifteen (15) character name
from any reader or input point in order to distinguish its location to the
operator.
4.9.3
The operator shall be advised that an alarm is waiting to be processed. The
system shall display the event in a window or by audible tone waiting to be
processed at all times. Such window shall come to the foreground on any
window software program currently running, when the access control
program is running in the background.
4.9.4
Event information shall be presented on the display screen by operator
command via a dedicated function key. When the function key is pressed, an
event processing window shall open to display the event list. The user shall
be able to select from this list for viewing and acknowledging. Information
shown shall include time of occurrence, type of occurrence, and the user
defined description of the location of the initiating device.
4.9.5
When an operator “Acknowledges” an event, it shall be removed from the
screen.
4.9.6
The system shall allow the operator to examine information for all alarms
currently awaiting processing one at a time without acknowledging them.
4.10 SYSTEM STATUS
4.10.1 It shall be possible for an operator to review the current system status on a
list that shall include all current system status and exception conditions.
PAGE 9 OF 22
GUIDELINE
SECURITY
SYSTEMS
Card Access
4.11 PRINTOUT OF SYSTEM ACTIVITY
4.11.1 All messages directed to the printer shall be fully formatted complete with
headers, page number and information in clear text format. They shall also
contain the time and date of the event, name and location descriptors.
4.11.2 The system shall be capable (where the appropriate computer configuration
allows) of monitoring printer status. The operator shall be advised whenever
the printer becomes no longer available.
4.12 RECORDING AND RETRIEVING SYSTEM ACTIVITY FOR AUDIT
4.12.1 The system’s audit storage capacity shall be limited only by the hard disk
capacity. Each audit file shall provide for storage of a minimum of fifty
thousand (50,000) events on hard disk storage for recording all system
activity.
4.12.2 The storage shall be modular such that when an event file becomes full, that
file can be saved, or copied onto floppy disk and stored separately from the
computer while system events continue to be recorded in the next file without
interruption.
4.12.3 The system shall provide a means to obtain structured audit reports to be
generated from either the online storage facility or from portions of the events
record which have previously been removed onto floppy disk.
4.13 INHIBIT PRINTING OR DISPLAYING OF CARD TRANSACTIONS
4.13.1 The system shall allow printout and display of card access granted
transactions to be inhibited on a reader by reader and time zone basis.
4.14 PASSKEY PROTECTION OF COMMANDS
4.14.1 All commands are passkey protected. Each operator must log on to access
the workstation. The system shall confirm the validity of the passkey for that
operator before allowing access.
4.14.2 It shall be possible to give each operator individualized access for browsing,
changing, adding, editing and deleting database information, as well as to
interrogate and command field devices.
4.14.3 The system shall support at least fifty (50) passwords. Passwords shall not
be displayed or printed by the system at any time during usage. It shall be
possible for the system supervisor to enter, change, or modify passkeys at
any time.
4.14.4 The workstation screen shall time out after a preset number of seconds, in
case the operator must leave his station. In this event, a valid passkey must
be entered to access the workstation.
4.14.5 The
system shall provide a means of enabling/disabling password
processing. This shall include restrictions on access to protected commands.
PAGE 10 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
4.15 HELP SCREENS AND ONLINE OPERATOR AIDS
4.15.1 The system shall provide help information for various commands that require
operator input, in order to minimize the need to refer to manuals.
4.15.2 The system shall provide the operator with on-screen guidance on the type of
information to be entered.
4.16 TIME SCHEDULE AND HOLIDAYS
4.16.1 The system shall provide a minimum of two-hundred and fifty six (256) time
zones and five-hundred and twelve (512) user definable time schedules per
ACU for access control, alarm and output control inhibits etc. Each schedule
shall contain one start and stop time per day for a seven (7) day week, &
three (3) holiday types.
4.16.2 All time zones will have the ability to have First Person In (FPI) configuration.
4.16.3 The system shall support a minimum of 64 (64) dates that shall be used to
invoke holiday processing complete with date, type definition & holiday type.
4.16.4 Holiday processing shall automatically become effective when the system
clock matches any of the dates defined as Holidays. Personnel access shall
be determined by the authorizations given to each cardholder for each type of
holiday in their assigned time schedule.
4.17 DATABASE MAINTENANCE AND PRINTOUT
4.17.1 It shall be possible to specify the contents of database and/or activity reports
based upon selected criteria such as name, department, and access level.
4.17.2 It shall be possible to specify contents of database and/or activity reports
based on selection of any, or up to ten, (10) optional user defined fields.
4.17.3 Data printouts shall be fully formatted with clear text headings. Where space
requirements prohibit the use of full textual headings, a key explaining
abbreviated headings shall be included in the printout.
4.18 AUTOMATIC SYSTEM STARTUP
4.18.1 It shall be possible to provide automatic start-up such that no operator action
shall be required to start the system up after a power off condition.
5
EQUIPMENT
5.1
5.1.1
DOOR CONTROL UNITS
The system shall support a variety of intelligent door controllers. These shall
include the following packages:
5.1.1.1
Keyscan CA 200 2 reader/Door Access Control Unit
PAGE 11 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
5.1.1.2
Keyscan CA 4000 4 Reader/Door Access Control Unit
5.1.1.3
Keyscan CA 8000 8 Reader/Door Access Control Unit
5.1.2
Each of the controllers supplied shall meet the characteristics detailed in the
Guideline for the door controllers.
5.1.3
It shall be possible for an operator, if authorized to do so, to issue commands
to any of the reader controlled portals to cause the mode of operation to
change. These commands shall include the following functions:
5.1.4
5.2
5.2.1
5.1.3.1
Add a cardholder
5.1.3.2
Delete cardholder
5.1.3.3
Assign/change time zones
5.1.3.4
Print activity file
5.1.3.5
Change card processing mode to require a card and/or PIN before
an access request shall be processed
5.1.3.6
Unlock door momentarily
5.1.3.7
Unlock door until command is rescinded
5.1.3.8
Re-lock previously unlocked door
5.1.3.9
Reset anti-pass back conditions
For additional operational details refer to the detailed guide specifications for
the appropriate door controller.
ELEVATOR CONTROL UNITS
The system shall support a variety of intelligent elevator controllers. These
shall include at least the following packages:
Keyscan EC1000 Single Reader – Single cab elevator c/w control of
40 floors of elevator access
5.2.1.1
AND/OR
5.2.2
5.2.1.2
Keyscan EC2000 Dual reader dual cab elevators c/w control of 16
floors per elevator cab
5.2.1.3
Each of the controllers supplied shall meet the characteristics
detailed in the Guideline for the elevator controllers.
It shall be possible for an operator, if authorized to do so, to issue commands
to any of the reader controlled portals to cause the mode of operation to
change. These commands shall include the following functions:
5.2.2.1
Add a cardholder
5.2.2.2
Delete cardholder
PAGE 12 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
5.2.3
5.3
5.3.1
5.2.2.3
Assign/change time zones
5.2.2.4
Print activity file
5.2.2.5
Change card processing mode to require a card and/or PIN before
an access request shall be processed
5.2.2.6
Unlock floor momentarily
5.2.2.7
Unlock floor until command is rescinded
5.2.2.8
Re-lock previously unlocked floor
For additional operational details, refer to the detailed guide specifications for
the appropriate door controller.
READERS
The readers used for access control shall be available in the following types
and technologies:
5.3.1.1
Proximity readers with or without number pad, suitable for surface or
“concealed” mounting behind a wall or glass
5.3.1.2
Card insertion style Wiegand Effect readers, with or without number
pad, suitable for flush or door frame mounting.
5.3.1.3
Card swipe through style Wiegand Effect readers, with or without
number pad., suitable for surface or door frame mounting.
5.3.1.4
Insertion or swipe magnetic stripe readers, with or without number
pad suitable for flush or door frame mounting.
5.3.1.5
Key pad only reader suitable for flush or surface mounting
5.3.1.6
Dallas touch memory disk, with or without number pad, suitable for
flush or door frame mounting.
5.3.2
Readers shall be equipped with visual indication for access granted and door
unlocked.
5.3.3
The ACU shall be capable of receiving data transmitted from readers installed
up to five hundred (500) cable feet away, without additional signal conversion
equipment; or up to four thousand (4000) cable feet away, using additional
signal conversion equipment, supplied by the same equipment manufacturer.
5.4
5.4.1
CARDS
Cards shall be available in one or more of the following styles and
technologies:
5.4.1.1
Proximity credit card size and shape, Keyscan 36 bit format
5.4.1.2
Proximity key tag style
5.4.1.3
Wiegand Effect credit card size and shape, Keyscan 36 bit format
5.4.1.4
Magnetic stripe credit card size and shape
PAGE 13 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
5.4.1.5
Dallas touch memory disk
5.4.2
Each card shall bear a number hot stamped or printed number on its surface.
5.4.3
It shall be possible to laminate a user-supplied photo ID onto the surface of
the credit-card sized card.
5.4.4
The PIN number associated with each card shall not be obtainable by direct
manipulation of the internal encoded number.
5.4.5
Each card, in addition to the randomly encoded number specified above,
shall also contain a “facility” or “batch” code hot stamped or printed on its
surface. It shall be possible for the system to utilize this facility code in either
of two methods: general or site specific. When site specific processing is
enabled, this facility code shall be checked by the ACU and access will be
denied to any card that does not belong to this project.
5.4.6
The system shall be capable of accepting up to 255 different facility codes
simultaneously.
5.4.7
Cards that require predefined “issue levels” shall not be acceptable.
5.5
COMPUTERS AND PERIPERALS
5.5.1
6
The system shall be minimum Pentium D 2.0 Ghz equipped, running on
Windows™ Operating Systems 2000 Professional, Server 2003 XP
Professional (32 bit) or Vista Business (32 bit). It shall have minimum 1 GB
of RAM, and 20 Gig Hard Drive. At least one USB port and DVDR/W drive
shall be present for installation and back-up purposes. The PC shall not have
to be a dedicated PC. It shall be able to reside on end-users existing
network.
GENERAL CONTRACT TERMS AND CONDITIONS
6.1
MAINTENANCE AND REPAIR AGREEMENTS
6.1.1
If awarded the contract, the Supplier/Installer agrees to enter into an ongoing
agreement with the Board for the maintenance and repair of the system
equipment. The cost of maintenance for a period of XX months after system
installation shall be included in the tender price.
6.1.2
Requirements for maintenance schedules, documentation and tasks will be
listed in an attached addendum.
6.1.3
If awarded the contract, the Vendor agrees that he will arrange from his
supplier all software licenses as required by the supplier. The Vendor also
agrees that he will purchase appropriate software maintenance agreements
for full support and maintenance of all system software as available from the
supplier. The price of all software licenses and maintenance agreements
shall be included in the tender.
PAGE 14 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
6.1.4
Where the Vendor plans to sub-contract any portion of the maintenance
contract, the shall indicate the items affected and the names of the subcontractors.
6.1.5
The Vendor shall specify the number and location of trained service
personnel available to support the system.
6.2
GUARANTEE
6.2.1
The Vendor shall warrant all equipment furnished to be new, undamaged,
free from defects and in conformity with the requirements specified within this
document.
6.2.2
The Vendor’s obligation shall include removal, repair or replacement,
transportation, re-installation and testing, without charge to the Purchaser, for
all or any parts of the system found to be defective due to faulty materials or
workmanship for a period of XX months after system installation.
6.3
APPROVALS
6.3.1
All equipment supplied shall be approved for the purpose intended by the
authority having jurisdiction. Installation shall be in accordance with all
standards and practices dictated by this authority.
6.3.2
Installation, testing and commissioning shall be done by individuals fully
qualified to perform such work.
6.4
DOCUMENTATION AND TRAINING
6.4.1
Complete documentation shall be provided which covers all aspects of the
system operation. Excerpts from each available document shall be submitted
with the tender as proof of its current existence and acceptability.
6.4.2
Documentation which covers the following topics shall be provided at a
minimum:
6.4.3
6.5
6.5.1
6.4.2.1
An easy to use operation guide for non-technical and security staff
6.4.2.2
All planning assistance forms shall be provided, including a system
planning guide for collecting and preparing data.
The Vendor shall provide at least XX days of formal, hands-on training, using
the purchased and installed system. This training shall cover all aspects of
system operation, management, and troubleshooting. The cost of this
training shall be included in the tender price.
DRAWINGS
The Vendor shall furnish such shop drawings and diagrams as are
reasonably required to clarify the details of work included in this tender.
PAGE 15 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
6.5.2
6.6
At the conclusion of the project, the Vendor shall provide one (1) set of “as
built” drawings which indicate for example, the location of all supplied
equipment in the system, all electrical box locations and cable identification
as installed under the terms and conditions of the final contract.
MISCELLANEOUS HARDWARE
6.6.1
6.7
Any miscellaneous hardware items, such as connectors, cable plugs,
mounting brackets, not specified in this document but which are required to
make up a fully operational system shall be provided by the Vendor as part of
his tender.
SUPERVISION
6.7.1
6.8
The vendor shall be responsible for the following project supervision
functions:
6.7.1.1
Supervision of sub-trades (as required)
6.7.1.2
Attendance at site meetings (as required)
6.7.1.3
Attendance at project planning meetings
6.7.1.4
Co-ordinating his work with the Architect, Consulting Engineer,
General Contractor and others
COMMISSIONING OF THE SYSTEM
6.8.1
The Vendor shall be responsible for verifying that each component of the
system is fully operational and in conformity with the requirements specified
within this document. The Vendor shall also be responsible for ensuring that
all elements function together as a system.
6.8.2
Commissioning shall be done in a phased manner as the installation for
ACU’s proceeds. It shall not be necessary for the computer to be installed
and operational in order for commissioning of the system to begin. ACU’s
shall be capable of being installed and programmed to operate in a standalone mode prior to installation of the computer.
7
INSTRUCTIONS TO BIDDERS
7.1
VENDOR QUALIFICATIONS
7.1.1
The Vendor shall be fully qualified in the performance of the class of work
specified within this document and shall provide a list of similar installations
which have been completed and which may be inspected by the Purchaser or
his representative.
7.1.2
The Board reserves the right to reject any tender submitted by a party whose
financial standing is not considered to be such as to ensure the Vendor
PAGE 16 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
obtaining reasonable credit from the Vendor’s proposed suppliers for
materials.
7.2
RESPONSE TO SPECIFICATION
7.2.1
The Vendor shall submit a point by point statement of compliance with
Sections 2, 3, and 4. Each point shall be numbered as per the paragraphs in
Sections 2, 3, and 4. Any tender submission that does not include a point by
point statement of compliance with the requirements as specified in Section
2, 3, and 4 shall be disqualified.
7.2.2
Where a full description of a deviation is not provided, it shall be assumed
that the proposed system does not comply with the paragraph in question.
7.3
DESCRIPTION OF PROPOSED EQUIPMENT
7.3.1
The Vendor shall provide, as part of his proposal, a complete list and detailed
description of all equipment and software that is included in this tender.
7.3.2
Full specification sheets shall be provided for each hardware component in
order to allow the Board to make a comparison of the hardware proposed by
all Vendors.
8
PHOTO BADGING & VERIFICATION
8.1
8.1.1
SYSTEM FUNCTIONS AND FEATURES
The system shall integrate the following functions into a simple to use
package:
8.1.1.1
The Photo Badging & Verification feature shall be a separate
module integrated into the access control software at any given time.
8.1.1.2
The Photo Badging & Verification shall provide full integration into
the Access Control Software.
8.1.1.3
The photo capturing of a cardholder shall be done by any Twain
compatible device. (i.e.: Video capture card, scanner, digital camera
or other.) The card holder photo shall be displayed when viewing
that particular cardholder’s data.
8.1.1.4
End user will have the ability to view, edit, import, capture photo’s
live and print the card from the cardholder database at any given
time.
8.1.1.5
End user will be able to create, edit & import their own card
template(s) or use predefined templates for setting up their
cardholder’s background(s).
8.1.1.6
The system will allow photo verification when a token is read by the
reader, displaying the card holder photo in a separate transaction
PAGE 17 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
window.
The photo verification will also allow for up to 9 photo transaction
history windows to be displayed.
8.1.1.7
9
TYPICAL TENDER FORMAT FOR ACCESS CONTROL SYSTEM
The Dufferin-Peel Catholic District School Board (the Board) invites
proposal bids for the supply and installation of a “KEYSCAN ACCESS
CONTROL SYSTEM BY KEYSCAN” to integrate the Board’s existing
Keyscan network for the following school named herein:
9.1.1
10
The Board at the present time uses Motorola Keyscan Cards to activate the
readers. No substitution to this system is permitted.
TENDER REQUIREMENTS
10.1.1 Provide company profile with Bidder’s response.
10.1.2 Submit 3 references naming the company, contact person, and phone
number.
10.1.3 Include in your bid complete information on the following:
10.1.3.1 A detailed list of hardware being proposed for the project
10.1.3.2 A detailed list of access control hardware and its application for the
project.
10.1.3.3 Software
applications to
control
the
access control
where
applicable.
10.1.3.4 Expandability of the card access system
10.1.3.5 Compatibility of the access system, with the Motorola Keyscan
Proximity Readers
10.1.4 All products quoted relating to the access control installations on the network
of the Board, must be of Keyscan origin and must comply to the following
requirements:
10.1.4.1 All bidders must be a certified Keyscan System VII for Networks
dealer (Proof of certificate must be available) and have training and
or experience in the installation of the MSS-COMMP and MSSCOMM products from Keyscan to be eligible for consideration.
10.1.4.2 Dealer must have proven work-related experience in the area of
LAN/WAN’s utilizing the protocol of TCP/IP. (References an asset)
10.1.4.3 MSS-COMM & MSSCOMMP must be ordered from Keyscan and
pre-programmed by them. No Alternatives allowed.
PAGE 18 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
10.2 WARRANTY/GUARANTEE INFORMATION
10.2.1 Vendor presentation/demonstration may be required, and vendors must be
prepared to demonstrate the system being proposed, - at no cost to the
Board.
10.3 INSTALLATION
10.3.1 The bidder who is awarded any contract for this project must adhere to the
following procedures:
10.3.1.1 Work on the project to be conducted between the hours of xx:xx and
xx:xx during the weekdays.
10.3.1.2 Work must be done on existing doors.
10.3.1.3 Security and control of the doors must be intact during installation.
10.3.1.4 All electrical hardware must have the appropriate approvals.
10.3.1.5 All open wiring installed in the ceiling spaces shall be plenum rated.
Surface wiring shall be installed in ether EMT conduit or wiremould
minimum size conductor 22 gauge AWG. All wiring shall be tagged
or marked clearly to provide ease of reference and any cable to that
is used in any way for the Ethernet connections should be white in
colour.
10.3.1.6 Patch cables that are used at both ends of the Ethernet run are to
be ordered through the Board’s Technical Services Department.
10.3.1.7 Contact name, title
of the
Board’s IT Department at 905-890-0708 ext. XXXX.
10.3.1.8 Request Netcom 2 with the appropriate IP address for that site pre-
programmed.
10.3.1.9 Arrange in advance to have IT personal at each school site at the
end of the install (dealer must be flexible with the times IT personal
are available) in order to be shown HUB locations and connections
of same.
10.3.1.10 All work must be open for inspection at any time.
10.3.1.11 Project must be completed and invoiced by XX XXX 20XX
11 SYSTEM REQUIREMENTS
11.1.1 The Floor Plans, as prepared by the Architect’s Consultant, showing power
characteristics and conduits as necessary to integrate the Card Access
System will be attached to the specification, and will become an integral part
of the Card Access Tender.
11.1.2 The complete system shall include equipment and methodology as described
in an attachment with the card Access Tender.
PAGE 19 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
12 PROPOSAL EVALUATION CRITERIA
12.1.1 This RFP includes standards and specifications that the Board believes are
the most appropriate to its needs.
12.1.2 All proposals received shall be subject to evaluation by a committee of
qualified personnel for the purpose of selecting the proposal, which most
closely meets the requirements of the RFP. The following areas of
consideration will be used in making selections:
12.1.2.1 Experience and background of the bidding individual or firm
(Please submit references, including contact names and telephone
numbers.)
12.1.2.2 Ability of vendor to perform the required service competently and
expeditiously
13 APPLICABLE TAXES
13.1.1 With the exception of the GST, the Contractor shall include all applicable
taxes in force, during the progress of this project. GST shall be shown and
invoiced separately.
13.1.2 Any taxes announced prior to date of quotation and scheduled to come into
effect subsequent to it shall be taken to be included. Any changes to taxes
announced subsequent to date of quotation shall be added or deducted from
the contract sum on evidence submitted by the Contractor.
14 WORKER’S COMPENSATION
14.1.1 The Contractor shall provide Worker’s Compensation coverage for all
employees who are employed under the contract.
14.1.2 The successful Contractor, prior to having a purchase order issued to him,
and prior to commencing any work on the site, shall present proof of this
coverage to the Board.
14.1.3 Proof of this coverage shall also be submitted to the Board with each invoice
when requesting payment.
15 BOARD’S RIGHT TO TERMINATE THE CONTRACT
15.1.1 In the event that the Board’s Consultant deems that sufficient cause exists,
the Board may notify the Contractor, in writing, that he is in default of his
contractual obligations. The default may apply if the Contractor:
15.1.1.1 Refuses or fails to supply sufficient properly skilled workmen, or
proper workmanship, products or construction machinery and
equipment for the scheduled performance of the work or,
PAGE 20 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
15.1.1.2 Fails to make payments due to his Subcontractors, his suppliers, or
his workmen; or,
15.1.1.3 Persistently
disregards laws or ordinances, or the owners
instructions, or,
15.1.1.4 Otherwise violates the provisions of the contract to a substantial
degree.
15.1.2 In the event of a Health and Safety violation, such written notice by the Board
shall instruct the Contractor to correct the default immediately.
15.1.3
Violations other than Health and Safety must be corrected by the Contractor,
within five (5) working days from the receipt of the written notice.
15.1.4 If the Contractor fails to correct the default within the time specified, or
subsequently agreed upon, the Board may, without prejudice to any other
right or remedy it may have, terminate the Contract.
15.1.5 If the Board terminates the contract under the conditions set out above, it is
entitled to:
15.1.5.1 Take possession of the premises and products and utilise the
construction machinery and equipment the whole subject to the
rights of third parties, and to finish the work by whatever methods he
may deem expedient but without undue delay or expense;
15.1.5.2 Withhold any further payments to the Contractor until the work is
finished.
16 CONSTRUCTION SAFETY ACT
16.1.1 The work of this contract shall be executed in strict accordance with the
current Occupational Health and Safety Act of the Province of Ontario.
16.1.2 The Contractor shall be responsible for ensuring that his workmen abide by
the rules and requirements set forth under the Act and a copy of the Act is to
be available on the site at all times when work is being performed.
17 ASSIGNMENT OF CONTRACT
17.1.1 The Contractor acknowledges that neither the contract nor any part of the
proceeds thereof may be assigned or sublet to any other Contractor or Subcontractor without the written consent of the Board.
18 LIENS AND DAMAGES
18.1.1 The successful Contractor agrees to protect and save harmless the Board
from all liens, damages, etc., arising from or caused by his work.
PAGE 21 OF 22
SECURITY
SYSTEMS
GUIDELINE
Card Access
19 CONTRACTOR ON SITE
19.1.1 The Contractor shall ensure the procurement of all required materials for the
project, prior to the commencement of work on the project.
19.1.2 All furniture must be placed back into position and the room left clean and
tidy.
19.1.3 The contractor shall clean up and remove debris on a daily basis. Under NO
circumstances shall the Contractor use the school's garbage dispose
containers.
19.1.4 Smoking is NOT permitted in any of the Board’s buildings or on any of the
Board’s properties. All smoking must be done off premises.
20 PROTECTION AND MAKING GOOD
20.1.1 Provide proper and adequate protection for all school property and
equipment. Ensure that dust is contained within the area of work.
20.1.2 The contractor shall be responsible for moving all furniture and equipment
and replacing same at the completion of the work all as directed by the
custodian.
20.1.3 Make good, at no additional cost to the Board, all surfaces disturbed by the
execution of this contract whether such surfaces are located within the area
of work or not. Make good to new condition matching surrounding surface.
END OF CARD ACCESS SYSTEM GUIDELINE
LATEST REVISION IN GREEN FONT
DATE ISSUED:
REVISION 1:
MARCH 2001
APRIL 2002
REVISED:
JUNE 2009
E:\Data\Word\INSTRUCTIONS\DPCDSB SECURITY SYSTEMS - Card Access.doc
PAGE 22 OF 22
Download