Specifications

Technology Upgrade Access Control 28 3500-8
1224_01
a. The activity log shall be comprehensive, recording the date and time of the
activity, the workstation where the activity was performed, and the user that
performed the activity.
b. The system shall record changes to the database made by any user. Users
shall be prompted to enter a user name, password, and explanatory text before
any change or command is made to the system. This function shall be able to
be disabled by the head administrator.
14. The system shall allow the owner to configure the viewing of the system based on
building. In example, the people at one school shall be able to fully control their
schools independently of the doors at another school.
a. The viewing of the system shall be controlled by user login.
b. There shall be super users who can login to the system and view and control
on global basis.
G. Cardholder enrollment and photo badging:
1. Photo badging shall be an integral part of the system. It shall provide for Access
Control cards and ID cards without access control.
2. The security system shall incorporate into a single, integrated system the latest in
imaging technology and identification management.
3. The system shall include the ability to have no less than 10,000 cardholder records,
and monitor badge/credential use throughout the facility. These credentials shall be
based on data and images that are input and captured at the time of enrollment and
fabricated at any of the photo imaging/badging workstations.
4. Credential images are to be digitized using industry standard JPEG image
compression, and printed using a dye-sublimation/resin thermal transfer printing
process that is high quality and environmentally safe.
5. The user shall be able to create personnel records either through the use of
templates or direct input into the personnel record. Each personnel record shall allow
for easy navigation through the fields. The user shall have the ability from the
personnel record to easily:
a. Enable or disable the cards.
b. Define expiration date.
c. Define the acceptable card type.
d. Define the card number, site code and PIN.
e. Mark the card as lost.
f. Issue temporary or restore permanent card.
g. Display the employee photo image and/or signature.
h. Have the ability create or edit the image.
i. Create, edit, or delete the card holder’s access privileges and additional
personnel attributes.
6. The selection of card type shall be chosen from a drop-down list that shall include
ABA formats, Wiegand formats, and custom Wiegand format to allow use of smart
cards.
7. The user shall be able to mark the card as lost by selecting that control button. This
shall disable the card and create a stored record with the associated card number
and card holder.
8. In the event an attempted use of a cancelled or terminated card occurs, an invalid
card event shall be logged and an associated alarm shall be generated to an operator
workstation.
9. The owner shall be able to fully assign access levels and privileges to a card at the
time of inception.
a. The owner shall be able to define default templates for given personnel types.
If a user has proper authorization, access privileges can be overwritten.
b. When an individual’s access privileges are modified, that change shall
automatically be propagated to all required controllers immediately upon
completion of the change