91导航视频

Security Device Installation Protocol

Purpose

Scope

Definitions

Protocol

Responsibilities

References

Protocol History

1. Purpose

(1.0) Physical Security Systems (PSS), a sub-unit of 91导航视频 Security Services, administers the University鈥檚 central security system, which includes overseeing the alarm monitoring operation, access control system, and the security camera network. For the system to be effective and efficient, security devices must be installed and utilized in accordance with established standards and best practices.

(1.1) A security system or device is only effective if it is used properly. A security device should never be used as a substitute for individual care and caution.

(1.2) The protocol outlined in this document has two (2) goals:

(1.2.1) The establishment of a process and consistent standards regulating the selection, purchase, installation, and operation of security devices that promote and maintain a safe and secure environment at 91导航视频.

(1.2.2) The reduction of the incidence of nuisance alarms caused by installation issues. Nuisance alarms degrade the system鈥檚 effectiveness and increase operating costs.

2. Scope

(2.1) This protocol applies to all current and future University sites under the operational jurisdiction of Security Services, including new construction and capital improvement projects.

(2.2) It applies to any space leased by the University where the security device will be monitored by Security Services.

3. Definitions

(3.1) Access Control System:听a device or electronic system restricting physical access and entry to authorized persons. This type of system is used in areas that have a large number of authorized users entering at various times of the day or night. An access control system usually replaces a traditional key system.

(3.2) Area Access Manager (AAM): a designated person within a department or faculty responsible for managing its card reader(s) by assigning and removing cardholder access to their areas and establishing and modifying card reader settings. AAMs receive specific training from Security Services. An AAM is distinct from a subscriber although the same person can assume both roles.

(3.3) Anti Theft Tab: a type of sensor consisting of a fibre-optic loop forming a circuit generally used to secure expensive pieces of equipment within an alarmed area. The loop is secured to the equipment. When the equipment is removed, the circuit is broken, and the alarm activates.

(3.4) Card Reader: is an electronic device that can read a specific identification badge such as a proximity card, verify the access rights associated with that badge and unlock predetermined doors or operate elevators should the access rights be valid.

(3.5) Door/Window Contact: a sensor installed within the frame or on the surface of a door or window. The sensor is part of the intrusion alarm system. It detects the opening and closing of the door or window and will signal an alarm if an unauthorized entry or exit is made.

(3.6) Elevator Emergency Call Button: emergency phone located in an elevator that is linked to a camera.

(3.7) Enhanced Call Verification: a procedure whereby the Security Operations Centre makes a minimum of two telephone calls to two pre-determined contact persons prior to dispatching a security patrol to investigate the alarm. If a contact person answers, indicates an error, and confirms their identity with a password, the alarm is resolved and no security patrol is dispatched.

(3.8) Exit Detection Device: (aka request to exit device) a sensor used to permit egress through an alarmed door without setting off the alarm. These may be motion detectors (T-Rex) or integrated in handles or hardware.

(3.9) Glass Break Detector: a type of sensor designed to monitor the alarmed area for the specific sound of breaking glass.

(3.10) Hold-up Alarm: a button alarm activated when a hold-up (robbery) or attempted hold-up takes place. The hold-up alarm is reserved for use at cashiering points or other areas where money is handled. Hold-up alarms summon immediate response by police. See also <Panic Alarm>.

(3.11) Intrusion Alarm System: uses motion sensors, door/window contacts, and other devices to detect the presence, entry or attempted entry of an intruder into the supervised area. It sends a signal to the Security Operations Centre when such an event occurs.

(3.12) Keypad: the device into which the user enters a numeric code, key, or scans a proximity device, such as a card or fob, to arm (turn the alarm "on") or disarm (turn the alarm "off") the intrusion alarm system.

(3.13) Lockdown Button: a button alarm activated when an emergency situation requiring the lockdown of doors takes place. Pushing the button creates a silent alarm and automatically locks all doors leading into the space. The activation of lockdown buttons summon immediate response by police.

(3.14) Motion Sensor: a device monitoring movement within an alarmed area. The motion sensor connects to the intrusion alarm panel, and it is part of the intrusion alarm system.

(3.15) Panic Alarm: a panic button alarm is used in locations where life threatening, medical aid or other situations requiring an immediate emergency response may arise. Panic alarms are usually installed at frontline customer service points, but portable alarms are also available. See also <Hold-up Alarm> for cash disbursement points.

(3.16) Password: a confidential alphanumeric code used to authenticate users when they call Security Services.

(3.17) Proximity Card: a generic name for contactless integrated circuit devices used for security access. 91导航视频 uses three types of proximity cards: (1) the 91导航视频 staff and student card with photo; (2) a blank proximity card for temporary employees and visitors; and (3) the 91导航视频 Service Provider ID card for employees of contracted firms working at 91导航视频.

(3.18) Requestor: someone who requests a security device. A requestor may be the end user or someone representing the end user (e.g. project manager, faculty or department administrator, or building director).

(3.19) Security Operations Centre: serves as the main alarm monitoring station for the University. There is one for each of the Downtown and Macdonald campuses.

(3.20) Subscriber: a faculty, department, or outside agency at 91导航视频 operating a security device; or the designated person responsible for managing a security device. A subscriber who manages a card reader is referred to as an Area Access Manager.

(3.21) Users: are members of the 91导航视频 community who use, work or study in, or have authorized access to the area protected by the security device installed by the owning faculty or department.

(3.22) Zone: a specific area within the alarmed area monitored by the intrusion alarm system. Current standards allow for only one sensor device per zone for the safety of the responders and to improve diagnostic capability. This restriction does not apply to Anti-theft Tabs.

4.0 Protocol

4.1 General

(4.1.1) All security devices installed on 91导航视频 controlled sites require the approval of PSS.

(4.1.2) Where applicable, all security devices installed in a 91导航视频 building must have the approval of the building director.

(4.1.3) Where it is not covered by the lease agreement, all security devices installed in a commercially rented space must have the approval of the landlord.

(4.1.4) No security device on a 91导航视频 controlled site shall be removed or modified without the approval of PSS.

(4.1.5) All security devices on a 91导航视频 controlled site will be installed by IT Infrastructure and Information Security (IIS) or a qualified contractor approved by IIS.

(4.1.6) To facilitate alarm investigations, room numbers to all areas containing a security device must be visibly displayed at all times. Room numbers should be consistent with data from the central space management system (Espace).

(4.1.7) If a space containing security devices is going to be repurposed, PSS must be advised so that a proper evaluation can be made to determine if the current security devices will support the new space. Failure to do so may result in a cessation of service support and/or alarm monitoring services.

(4.1.8) Security devices in place that are no longer used must be decommissioned by IIS at the expense of the device owner. Leaving non-functioning security devices in place for deterrent purposes is not permitted.

(4.1.9) Access to all areas containing security devices or alarm equipment must be provided to Security Services by the subscriber so that responding security personnel can investigate any possible crimes in progress. Where the area is restricted for safety reasons, an alternative response protocol must be established.

4.2 Requisition Process

(4.2.1) Requestors who wish to install a security device may contact Physical Security Systems directly at systems.security [at] mcgill.ca.

(4.2.2) If required, PSS will perform an on-site assessment to determine the requestor鈥檚 security needs and propose the most effective solution. The assessment will evaluate the security of the area, personnel safety, alarm responder safety, and current alarm technologies. As a result, PSS may recommend a different solution than the one originally requested.

(4.2.3) The process of the on-site assessment may include consultation with Network and Communication Services (IIS), Facilities Operations and Development (FOD), and/or the Fire Prevention Office (FPO).

(4.2.4) Following the scope of work draft, PSS will request budget amounts from IIS and FOD to install the requested device(s). PSS will be responsible for including estimates from IIS and FOD in the Security Device Request form. The length of this process is variable, especially if custom installations are required. PSS will then forward the budgetary amount to the requestor for approval.

(4.2.5) If the requestor approves the anticipated cost, a FOAPAL or Client number will be required for billing. The length of the installation process is variable.

(4.2.6) For renovation and construction projects, PSS will participate in the design reviews starting at 30% design status.

(4.2.7) As part of the installation process, the requestor must designate a minimum of two (2) subscribers to be trained by PSS and be responsible for the device.

(4.2.8) After the security device is physically installed, PSS will complete the configuration, perform an inspection, and advise the subscriber when the device is ready to go 鈥渓ive鈥.

4.3 Card Readers

(4.3.1) A card reader is primarily an access control device. Requestors seeking a security device to protect valuable property will be advised to acquire an intrusion alarm system controlled by a keypad that will be monitored 24/7 (when armed).

(4.3.2) There are three different types of card reader installations at 91导航视频, each with a different level of service:

  1. Card reader with alarm monitoring: this type of installation is equipped to detect door held open and door forced open alarms. Any other door that provides access to the space will have to be modified also. Moreover, the alarm monitoring is limited to what is provided in the Security Alarm Monitoring Protocol. This would not be a practical application for areas that are occupied at all hours of the day.
  2. Card reader for access control only: this type of card reader installation is not programmed to detect door held open or door forced open alarms. Any other door that provides access to the space will have to be modified also to ensure effective access control.
  3. Card reader for key use only: The card reader replaces the key lock on the particular door. Other doors to the space need not be modified but card reader reports for this type of installation will not be provided. Note that this option is only available to areas where there are multiple doors to the space. If the space contains only one access door, the standards are the same as for a card reader for access control only.

(4.3.3) The door on which the card reader is to be installed must meet the following requirements:

  1. The door must be in good condition and suited for a card reader system;
  2. The door must have a door closer;
  3. The door must have an exit detection device;
  4. The door lock must have a Medeco cylinder using 91导航视频's restricted keyway, pinned to a restricted code available only to Security Services, to prevent users from bypassing the card reader with a key.
  5. The door lock function must be 'storeroom' to ensure that the door remains always locked from the outside, even if a key is used to bypass the card reader.
  6. Card reader doors may not have door stoppers; and
  7. The door must have an anti-pick plate, interlock or astragal if the reader is paired with an electric strike or when the lock latch is exposed on the exterior.

(4.3.4) If there are other doors that provide access to the space, they will require security devices and door hardware changes, depending on the type of card reader installation requested.

(4.3.5) Where applicable, Security Services will monitor card readers for alarms in accordance with its Security Alarm Monitoring Protocol. A copy will be provided to the subscriber as part of the installation process.

(4.3.6) The hardware requirements for card readers are detailed in 91导航视频 Building Design Standards, Division 08, Hardware 08 71 10.

4.4 Intrusion Systems and Components

(4.4.1) An area where an intrusion alarm system is requested must meet the following conditions:

  1. Doors must be in good condition and suited for contacts or other devices;
  2. Windows must be in good condition and suited for contacts or glass-break detectors; and
  3. Motion sensors must not be obstructed by furniture or light fixtures.

(4.4.2) The following standards will apply to all intrusion alarm systems installed at 91导航视频:

  1. Keypads must be installed at every entrance used to enter an alarmed area;
  1. Each alarm type (intrusion, unknown trouble, tamper, low battery) must report on a separate zone;
  2. Glass break detectors must be linked to an intrusion system with keypad;
  3. Each intrusion sensor must report on a separate zone unless otherwise approved by PSS, exceptions will only be made for devices of the same type in the same room;
  4. Zones must be clearly labeled on the keypad;
  5. An audible siren is required for all intrusion detection systems;
  6. The keypad must emit an audible sound for the exit delay alerting the user that the exit delay cycle has started; and
  7. The keypad must emit an audible sound for an exit error fault alerting the user when an error has been made when arming the alarm or leaving the alarmed area.

(4.4.3) Each area equipped with an intrusion system must appoint a Panel Manager responsible for adding and removing codes for their local users, including cleaning staff and visitors.

(4.4.4) PSS manages intrusion panel codes for Security Services and their partners.

(4.4.5) Security Services will monitor intrusion alarm systems in accordance with its Security Alarm Monitoring Protocol. A copy will be provided to the subscriber as part of the installation process.

(4.4.6) The components required will be determined by the security survey. PSS will not authorize the installation of an intrusion system unless the entire perimeter of an area is protected

4.5 Anti-theft Tabs

(4.5.1) Anti-Theft tab installations should always be part of a broader security system that also includes locking devices, card readers, security cameras; etc.

(4.5.2) Anti-Theft tab installations must be accompanied by a siren.

(4.5.3) Note that all television flat screen monitors installed by IT Multimedia Services are affixed automatically with Anti-Theft tabs.

(4.5.4) Anti-Theft tabs must be installed on fixed items only. For this reason, PSS has ceased the installation of Anti-Theft tabs on personal computers and monitors.

4.6 Video Cameras

(4.6.1) Camera installations and access to live and recorded images are governed by the CCTV Protocol.

(4.6.2) The location for outdoor camera installations for the Downtown Campus needs to be approved by Design Services.

4.7 Panic Alarms and Hold-up Alarms

(4.7.1) Panic alarms and hold-up alarms should never be used as the sole solution to a security risk. They must always be employed as a complement to other security measures to address that risk. Panic buttons and hold-up buttons cannot be used to provide a general sense of security.

(4.7.2) The best option in an emergency is to call 911 and then call Security Services at 514-398-3000 for the Downtown Campus, and 514-398-7777 for Macdonald Campus.

(4.7.3) Panic buttons and hold-up buttons are installed at approved locations on campus where there is a demonstrated risk or threat. This includes, but is not limited to:

i. Cash handling locations;

ii. Areas with customer service counters open to the public; and

iii. Areas with a recorded history of security incidents.

(4.7.4) Users of panic alarms and hold-up alarms are strongly encouraged to take the De-escalating Potentially Violent Situations training provided by Security Services.

(4.7.5) All users of panic and hold-up alarms must have authentication passwords to call Security Services in the event of a false alarm.

(4.7.6) The subscriber requesting a panic or a hold-up alarm must also install a camera. A camera is required to aid in effective alarm response and ensure responder safety.

(4.7.7) The installation of wireless panic buttons is highly restricted and reserved for areas where the installation of a fixed panic button is not possible. Hold-up buttons are always wired.

(4.7.8) Contact information of the button subscriber must be provided to PSS for proper alarm response. Any changes in contact information must be communicated to PSS by the subscriber.

(4.7.9) A hold-up alarm installation is reserved only for areas where money is handled and must be accompanied by a camera installation. The activation of a hold-up alarm results in an immediate response from police.

(4.7.10) Subscribers will be held accountable for any fines resulting from false reports to 911 following hold-up alarms.

(4.7.11) PSS is responsible for regular testing of panic and hold-up alarm installations.

(4.7.11) PSS is responsible for changing batteries in wireless panic buttons..

(4.7.12) PSS is responsible for regular re-evaluation of the security situation that prompted the installation of the panic button or hold-up button. If the security needs are no longer the same, the buttons may be decommissioned.

4.8 Lock-down Buttons

(4.8.1) As part of the classroom locking initiative, all classrooms with a capacity of 100 persons or more or whose access is controlled via card reader, must also by equipped with lockdown buttons.

(4.8.2) Lockdown buttons will secure all entry points to the classroom when engaged and alert Security Services who will immediately summon Police assistance. Doors will revert to the locked setting; no card swipes will allow entry.

(4.8.3) Where appropriate, lockdown buttons will also automatically engage any window privacy equipment on hallway windows such as blinds and electrified glass.

(4.8.4) All lockdown buttons must be equipped with a lockdown button cover. Lifting the lockdown button cover will alert Security Services who will immediately summon police assistance. Lifting the lockdown button cover will NOT secure the doors leading into the classroom.

(4.8.5) The subscriber requesting a lockdown button must also install a camera. A camera is required to aid in effective alarm response and ensure responder safety.

(4.8.6) Lockdown buttons must be installed at all doors leading into the classroom and, if deemed appropriate by Security Services, at/near the podium.

(4.8.7) All lockdown buttons must be accompanied by the required signage provided by PSS.

(4.8.8) Users in areas equipped with lockdown buttons are strongly encouraged to take the Active Threat Training Workshop provided by Security Services.

(4.8.9) All lockdown buttons are monitored by Security Services 24/7.

(4.8.10) All lockdown buttons will be tested by PSS on a regular basis.

(4.8.11) Lockdown button installations are reserved for use in classrooms only.

(4.8.12) To prevent false alarms, PSS will security lockdown button covers with a breakable tie wrap.

(4.8.13) Users will be held accountable for any fines resulting from false reports to 911 following the activation of lockdown buttons.

(4.8.14) The hardware requirements for lockdown buttons are detailed in 91导航视频 Building Design Standards, Division 08, Hardware 08 71 10.

4.9 Service Support, Repair and Maintenance

(4.9.1) The responsibilities of the subscribers and the support provided by PSS are outlined in the Service Level Commitment for Security Devices. A copy will be provided to the subscriber as part of the installation process.

(4.9.2) All new installations performed by IIS or its hired contractors carry a twelve-month warranty on parts and labour from the date the installation is completed. Beyond this warranty period, repairs and replacement parts are at the charge of the owners of the peripheral components.

(4.9.3) Security Services will submit work orders with IIS or FOD on behalf of the subscriber when alarm responders come upon incidents of equipment failure. Billable repairs will not be executed without client approval.

4.10 Decommissioning and Removal

(4.10.1) Subscribers who wish to decommission their security device must submit their request to PSS. The process followed will be similar to the requisition process.

(4.10.2) When a unit relocates and departs from a leased commercial space, and there is not another 91导航视频 unit moving in, the decommissioning and removal of security devices must be part of this project, along with any necessary repairs to walls, doors, etc. This work shall be coordinated with the landlord鈥檚 representative.

(4.10.3) When a unit relocates and departs from a campus space, PSS must be advised so that they may perform an evaluation to determine what security components must be decommissioned.

  1. The decommissioning of security devices is the responsibility of the unit/department who is vacating the space.

(4.10.4) Card readers cannot be relocated. Card readers are not transferable with unit relocations from a campus space as there is no cost saving.

(4.10.5) All security equipment no longer in use must be removed at the expense of the device owner. Leaving non-functional equipment in place as a deterrent or to save on expenses is not permitted.

4.11 Security Device Reports

(4.11.1) For some restricted areas, especially where government regulatory compliance is in force, reader access reports can be provided on a regular basis. These regulatory reports exclude personal identifying information except when required by regulatory authorities.

(4.11.2) Security Device Reports shall not be utilized to monitor employee, service provider, or student performance except where employee or student conduct constitutes criminal behaviour or negligent behaviour where it places others at risk.

(4.11.3) Security Services is responsible for ensuring that access to reader reports, including personal identifying information, is severely restricted and the secure storage of data is consistent with University policies and procedures concerning data protection and records management. Device audit trails are kept for a limited period of time (usually one year).

(4.11.4) The use of security device reports to conduct investigations of possible misconduct or illegal activity is limited to Security Services personnel or persons authorized by Security Services.

(4.11.5) IT infrastructure & Information Security personnel are permitted to view security device reports only for the purposes of repair and maintenance to the security equipment.

(4.11.6) Security Services will provide information, including any security device reports to the Service de Police de la Ville de Montr茅al (SPVM), or other law enforcement agencies as required for the purpose of investigation of an offence.

(4.11.7) Members of the 91导航视频 community may request that security device reports be reviewed by Security Services personnel. Representatives of outside agencies, such as the SPVM, may request to receive reports. These requests will be approved on a case-by-case basis. Situations where such approval may be provided include, but are not limited to:

  1. University disciplinary officers in cases of student discipline where Article 4.10.2 of this document applies;
  2. The Department of Human Resources in cases of employee discipline or arbitration hearings where Article 4.11.2 of this document applies;
  3. Risk Management or Legal Services to defend against claims and lawsuits;
  4. employees or students wishing to use device audit trails to prove their innocence in legal or campus judicial proceedings where Article 4.11.2 of this document applies; and
  5. The Office for Mediation and Reporting in cases of investigations of harassment, discrimination, and sexual violence.

(4.11.8) Nothing in Article 4.11.7 is designed to contravene the Access Act, which stipulates that a person is entitled to access information concerning him/her, including access to security device reports made of him/her. Nonetheless, the Access Act does specify restrictions to the right of access, and any denial of access shall be in accordance with those specifications.

(4.11.9) Any request for security device reports from an individual or agency for purposes not addressed in Articles 4.11.6, 4.11.7 or 4.11.8 will require a search warrant or subpoena.

(4.11.10) Requests to view or receive security device reports under Articles 4.11.7 and 4.11.8 will be submitted in writing that clearly identifies the reason for the request. Authorization to release reports or to permit viewing thereof is restricted to the following personnel:

  1. the Security Services supervisor responsible for investigations; or the Security Services Supervisor acting in his/her stead.
  2. Director of Campus Public Safety (Security Services).

5. Responsibilities

(5.1) PSS provides consulting expertise on loss prevention and crime risk management. They develop and implement standards concerning security devices deployed on campus, approve their installation and removal, and are responsible for the management and operation of the central alarm monitoring, access control and CCTV systems.

(5.2)IIS is responsible for the deployment and maintenance of security device installations that are installed on the University鈥檚 central alarm monitoring, access control and CCTV systems. It is also responsible for the purchase of all security devices requested and approved based on established standards.

(5.3) FOD is responsible for the deployment and maintenance of security device hardware and peripherals for installations that are monitored by the University鈥檚 central alarm monitoring, access control and CCTV systems It is also responsible for the purchase of all hardware requested and approved based on established standards.

(5.4) Security device subscribers are responsible for funding the installation and decommissioning of the security devices under their purview. They are responsible for advising PSS of any changes that may impact the functioning or use of the security devices.

6. References

(6.1) 91导航视频 FMAS Building Design Standards

(6.2) Service Level Commitment for Security Devices

(6.3) Security Alarm Monitoring Protocol

(6.4) La Commission d鈥檃cc猫s 脿 l鈥檌nformation du Qu茅bec, Rules for use of surveillance cameras with recording in public places by public bodies (June 2004)

(6.5) International Association of Campus Law Enforcement Administrators (IACLEA), Committee Report on CCTV Systems (May 2009)

(6.6) Guidelines on Overt Video Surveillance in the Private Sector, Office of the Privacy Commission of Canada (March 2008)

(6.7)听Access Act, R.S.Q., chapter A-21, An Act Respecting Access to Documents Held by Public Bodies and the Protection of Personal Information

Back to top