{"id":343405,"date":"2024-10-20T00:06:11","date_gmt":"2024-10-20T00:06:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-dd-2632007\/"},"modified":"2024-10-25T23:23:55","modified_gmt":"2024-10-25T23:23:55","slug":"bsi-dd-2632007","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-dd-2632007\/","title":{"rendered":"BSI DD 263:2007"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | Contents Introduction 1 1 Scope 1 2 Normative references 1 3 Terms, definitions and abbreviations 2 4 Inspection, functional testing and commissioning 4 5 Maintenance 4 6 Remote system checks 6 7 Remote support 7 8 Security measures 9 9 Responsibilities of the user\/client 10 Annexes Annex A (normative) Commissioning of an I&HAS 11 Annex B (normative) Preventative maintenance 14 Annex C (informative) Verification of health of alternative power source 16 Annex D (normative) Remote initiation of commands 17 Bibliography 18 List of tables Table 1 – Minimum frequency of preventative maintenance 5 Table 2 – Data security measures 8 Table A.1 – Commissioning recommendations 11 Table B.1 – Preventative maintenance recommendations 14 Table C.1 – Minimum load times for common storage devices 16 Table D.1 – Remote initiation of commands 17 <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Introduction 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | 3 Terms, definitions and abbreviations 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 3.2 Abbreviations 4 Inspection, functional testing and commissioning 5 Maintenance 5.1 Preventative maintenance 5.1.1 General <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 5.1.2 Frequency Table 1 Minimum frequency of preventative maintenance <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5.2 Corrective maintenance 6 Remote system checks 6.1 General 6.2 Review of the event record <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 6.3 Prime power source (PPS)\/alternative power source (APS) 6.4 Detectors 6.5 Alarm transmission system (ATS) 6.6 Records of remote system checks 7 Remote support 7.1 General a) lead to precise definitions for the levels of authorization, including client authorization, that are associated with each remote command as itemized in Table 2; b) ensure that in all cases, written agreements exist with clients concerning levels of authorization; c) ensure the proper use of dialogues by authorized persons in accordance with the agreements with clients. <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 7.2 Initialization of remote communications 7.3 Security of data 7.3.1 General Table 2 Data security measures <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 7.3.2 Authentication 7.3.3 Audit trail a) date and time of the dialogue; b) identification of the remote service personnel carrying out the dialogue; c) full details of any changes to site specific parameters; d) the identity of the user\/client authorizing such changes even though it might be impractical to obtain a written signature from the user. 8 Security measures <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 9 Responsibilities of the user\/client <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Annex A (normative) Commissioning of an I&HAS Table A.1 Commissioning recommendations <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Table A.1 Commissioning recommendations (continued) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Annex B (normative) Preventative maintenance Table B.1 Preventative maintenance recommendations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Table B.1 Preventative maintenance recommendations (concluded) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Annex C (informative) Verification of health of alternative power source a) With the APS disconnected from the I&HAS (which is therefore operating from the Prime Power Source only), a load is applied t… b) The voltage of a programmable power supply may be reduced in a controlled manner to a level such that the APS is switched int… Table C.1 Minimum load times for common storage devices <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex D (normative) Remote initiation of commands Table D.1 Remote initiation of commands <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Intruder and hold-up alarm systems. Commissioning, maintenance and remote support. Code of practice<\/b><\/p>\n |