Specifications
Technology Upgrade Access Control 28 3500-4
1224_01
4. The relational database shall support online backup, stored procedures with control
logic, and server-based referential integrity.
5. Contractor shall install a Windows or windows like control system able to control and
view all aspects of the security/access system.
a. This software shall be part of the system provided by the contractor.
6. Contractor shall provide any SQL database software and server software required to
make the system work.
C. System shall be an access control system with alarm monitoring and reporting and shall
have three primary components:
1. The Security systems primary requirement is to provide access control. The system
shall be able to make access granted or denied decisions, define access privileges,
and to set schedules and holiday groups.
a. Through the use of application programming these inputs and outputs shall be
capable of being linked at all field controllers for purposes of implementing
system-wide control strategies.
b. The system shall provide for features such as dial-up field hardware
communications and extended shunt time.
c. The access control system shall control operations at all controlled and
monitored doors. The system shall be available to lock, unlock, alarm, disarm
totally or temporarily. Silence alarms or pulse control points or groups of points
as a standard feature.
d. Shall provide for a mapping function where the owner can view a map of the
building and will be able to see door status based on different colors for the
door icon.
A) The doors shall also be able to be shown and “clicked” on to allow the
user to see door status and lock or unlock a door or pulse the lock on a
door for temporary unlocking.
B) A color graphic application shall allow a user to create or import
customized color graphic maps of their facility and to attach alarm icons
to those maps.
2. Alarm Monitoring/Intrusion Detection more commonly referred to as intrusion
detection monitoring.
a. Shall include a listing of current alarms and reviewed or non-reviewed alarms.
The system shall allow all alarms to be prioritized. A status window shall
provide information about the specific alarm including date and time and
location of the alarm.
b. The system shall allow configuration to allow unique instructions or
acknowledgement requirements to be specified for each type of alarm.
c. Shall provide for multiple levels of alarms to allow the owner to configure if a
person should be notified or certain alarms. This shall be able to be changed
based on time of day.
A) Systems shall provide for the distribution of emails or texts or both to
make the owner aware of a chosen issue. Those issues may include:
1) Door Held open
2) Intrusion after hours
3) Card not recognized
B) The emails and texts shall be able to be configured so they are only
sent out based on a time schedule as required by the owner.
d. Journal of daily alarms and acknowledgements or events. Print Reports of all
events if the owner requests.
3. Card Holder Management and Enrollment
a. Review card holder information through a quick search and display of images
in the database.
b. The security system shall include an employee management system integrated
with the access control system.