Product data

[Project Number] [Project Name]
[Date] [Project Location]
28 10 00 13
Electronic Access Control/Intrusion Detection
12. Up to 10 facility codes per Access Control Panel or 100,000 system facility codes per panel with Facility
Code/Badge Concatenation.
13. Unlimited operator passwords with definable privilege levels.
14. Unlimited .wav files for alerts
15. Unlimited color dynamic graphic maps.
16. Unlimited RS-232 interface ASCII commands to a CCTV system, which provides automatic, alarm
activated camera switching, and Live Camera image Capture.
17. Unlimited number of floors for Elevator Control.
18. Cardholder activation/cancellation dates.
19. Unlimited number of CCTV DVR Servers.
20. Unlimited number of CI Scripting(linking) Servers.
21. Unlimited number of Napco Alarm Servers.
22. Unlimited number of Time Zone Offsets.
2.6 SYSTEM SECURITY
A. Password: The system software shall be capable of identifying unlimited temporary or permanent operators.
Passwords may be up to 20 alphanumeric characters, and will be case sensitive.
1. Password Security: Permanent passwords will be able to be provided only by the operators. The
administrator may only provide a temporary one-use initial password, which must be changed by the
operators, when they log on. Operators will be allowed to change their passwords any time. Operator
password invalidation will be required in cases of suspected operator security breach (which can occur
when the operator is not on site or is otherwise unable to logon) in order to enforce immediate change of
password. When an administrator adds a new operator, the concerned operator’s password may not be
left blank and must be set to a temporary value that can be used only once. When a temporary password
has been provided by the administrator, the New Password dialog will be displayed after the temporary
password has been entered.
2. An operator record will be required to have a unique name, to allow the use of same passwords by
different operators. If duplicate passwords are not allowed, security can be compromised. For example, a
‘password already in use’ message will reveal one of the existing passwords, which is of course a security
violation. No secret information is revealed by saying, ‘Operator name already in use, please enter a
different name’.
3. The system administrator will have the capability to require an operator to change his/her password. The
system administrator may invalidate the operator’s password. The operator will then be required to
provide a new password during his next logon.
4. System Operators will have the ability to change any workstation settings, from whichever station they are
working on.
5. The system administrator may assign an operator to a group. As a result, the operator will be able to
view/ change and create items that are assigned to the particular group only.
6. The system will record in the Audit Trail database, the time at which an operator logs into/out of the
system, as well as any changes that were made by the user during login.
B. System Operators:
1. Privilege levels: Each operator will be able to be assigned any combination of up to 100 user
programmed privilege levels. Operator Control will be limited by the following access rights:
a. Disable
b. View Only
c. Create Only
d. Create and Edit
C. Personnel Database Security: The system administrator will be able to restrict each operator’s privileges to
View, Create or Create/Edit each field in the Personnel database.
D. Audit Trail of Database Changes: