Specifications
St. David Catholic School Manning Architects
Gym and Classroom Replacement N10.024.00
New Orleans, Louisiana July 20, 2012
ACCESS CONTROL SYSTEM 16670 -7
number to initiate a duress alarm. The location shall appear to access normally, but an
alarm shall be generated to notify the system operators that an access occurred under
duress.
14. Schedules. The Security Controller shall provide a scheduling interface that uses
standard calendar functions and scheduling features including standard time programs,
special event programming, and holiday scheduling. Scheduling shall be performed via
a GUI that employs sliders and point-and-click programming. Schedules may be used
to control access rights, lock/unlock doors, arm/disarm intrusion zones, disable
alarms, and enable/disable remote alarm notification.
15. Reports. The following reports shall be pre-configured and available for use. The
system user shall be able to modify these reports to include the desired information
and sort the report by any field included in the report by using point-and-click
selection. All report records shall be time-stamped. All reports may be exported to a
.CSV or .PDF format.
a. Access History Report. The access history report displays a table of all access
activity.
b. Audit History Report. This report displays a table of all log entries and system
changes by system users.
c. Log History Report. This report contains system application messages and the
name of the log that contains detailed information for the event.
d. Alarm Activity Report. This report displays a table of alarm records.
e. Intrusion History Report. This report contains time-stamped information
describing arming and disarming of intrusion zones and intrusion alarms.
f. Attendance History Report. This report contains transactions for persons using
badge readers as being used for time and attendance. Records may be manually
inserted into the report to allow for editing the attendance record.
g. Hardware Reports. The hardware report shall list the current status of all
connected ACMS hardware including card readers, expansion modules, inputs,
outputs, and BACnet points.
h. Doors Report. This report lists all system defined doors and the current status of
each.
F. Event Alarm Notification and actions
1. The Security Controller shall provide alarm recognition, storage; routing, management,
and analysis.
2. The Security Controller shall be able to route any alarm condition to any defined user
location whether connected to a local network, or remote via wide-area network.
3. Alarms shall be prioritized as being:
a. High
b. Medium
c. Low