Specifications

St. David Catholic School Manning Architects
Gym and Classroom Replacement N10.024.00
New Orleans, Louisiana July 20, 2012
ACCESS CONTROL SYSTEM 16670 -3
WBI Web Browser Interface
LAN Local Area Network
WAN Wide Area Network
PICS Product Interoperability Compliance Statement
.CSV Comma Separated Value file format
.PDF Portable Data File format
1.5 DIVISION OF WORK
A. The Division 16 contractor shall be responsible for the Security Controller, software and
programming of the Security Controller, development of all graphical screens, initial set-up
of schedules, logs and alarms, and connection of the Security Controller to the local or wide
area network.
B. The Division 16 contractor shall be responsible for assuring that the ACMS functions do not
interfere with safety systems in the facility including, but not limited to, Fire Alarm/Life
Safety systems, elevator control systems, and evacuation systems.
C. The Division 16 contractor shall b responsible for integration between ACMS and the Fire
Detection system and Intrusion Detections system. Systems shall interface as necessary to
disarm the Intrusion Detection system upon first entry swipe into the facility for specific
users, and to unlock all access control doors upon initiation of the Fire Detection system..
D. Data entry for personnel and badge records, other than that required for system check out,
shall be the responsibility of the Owner.
1.6 SOFTWARE LICENSE AGREEMENT
A. The Owner shall agree to the manufacturer's standard software and firmware licensing
agreement as a condition of this contract. Such license shall grant use of all programs and
application software to Owner as defined by the manufacturer's license agreement, but shall
protect manufacturer's rights to disclosure of trade secrets contained within such software.
B. The Owner shall be the named license holder of all software associated with any and all
incremental work on the project(s). In addition, the Owner shall receive ownership of all job
specific configuration documentation, data files, and application-level software developed
for the project. This shall include all custom, job specific software code and documentation
for all configuration and programming that is generated for a given project and/or
configured for use with the Security Controller and any related LAN / WAN / Intranet and
Internet connected routers and devices. Any and all required IDs and passwords for access
to any component or software program shall be provided to the owner.
C. The owner, or his appointed agent, shall receive ownership of all job specific software
configuration documentation, data files, and application-level software developed for the
project. This shall include all custom, job specific software code and documentation for all