A check list: practical, step-by-step guides for the busy security manager

June 2005 News & Events, Products & Solutions

Security System Maintenance Contracts

You have no sooner put the finishing touches on a security system installation contract than someone stops by, pats you on the back, and says, "By the way, who is maintaining this system?" There you go again. If you have not already put the system installation contract out for bid, you might consider including maintenance provisions in it as well, to obtain the best possible negotiating leverage - when no one has your company's business yet.

Most security system manufacturers and installers guarantee or warrant the reliable operation of their system and components for at least one year. If you cannot obtain at least this minimal guarantee, seriously consider selecting alternate manufacturers or their representatives.

Before a warranty period expires, be sure to execute a service contract with knowledgeable suppliers certified by the manufacturers to service the equipment. The following items should be included in a service contract specification:

* List the facilities covered by the contract.

* List the normal hours and days on which work will be required. The contractor should provide the rates per hour for the work minus the cost of materials and parts.

* Describe the required emergency response time in case of system failure and how to communicate with the supplier outside normal business days and hours. Because access control and physical protection of virtually all business occupancies are critical, response times outside normal business days and hours are important.

* Compile a detailed list of all equipment to be serviced under the contract, including:

a) Card readers.

b) Field panels.

c) CPU, terminals, printers and peripheral devices.

d) CCTV cameras, housings, domes, time-lapse video recording devices, and camera controller devices and monitors.

e) UPS and surge protection devices.

f) Electronic door locks/strikes.

g) Emergency devices, such as break-glass devices.

h) Alarm contacts and audible alarm devices.

* Define all local work rules that may exist, such as those governing parking, building admittance, communication with local management about problems, sign-in and sign-out on building registers, work area safety, work area cleanup, storage of materials, lockout and tagout, and the hot work permit process to control welding and cutting activities.

* Define what spare parts will be maintained and immediately available for emergency installation in case a system component fails. After a security system has been selected and installed, it must be properly administered to prevent retention of outdated information, which will tax the memory and storage capacity of the host computer. Facilities and security managers should ensure that one person and a backup are assigned system administration duties, which should entail the following tasks:

- Deleting system records of people who have left the payroll or tenancy, or of those whose entry privileges have expired. This task requires very close collaboration with the human resources department and the organisation responsible for hiring contracted workers.

- Printing hard-copy access reports from the system for a given period and retaining them for a specified period, usually three to six months.

- Periodically polling the system to determine whether cardholders have stopped using their cards or have left the payroll or tenancy without the security department being notified.

- Programming the system to deny entry privileges to a certain person or groups of people as business needs dictate.

- For investigative purposes, providing archived reports of entries and departures of specific individuals and matching the reports to video or CD recordings of entries and departures.

- Assuring that the time stamp for the entry control system is perfectly synchronised with the time stamp for the video surveillance system, so that actual facility entry and departure times are properly matched with recorded times.

Source: BOMI Institute's Technologies for Facilities Management course.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...
From security technician to salesperson
News & Events
Being great at security sales starts with having the right mindset. How you think informs what you say and how you act; and how you act informs the results you will achieve in your business.

Read more...