Loading...
HomeMy WebLinkAbout28-1000-Electronic-Access-Control-System-(Part-of-FSB-26-0000)_Rev_1Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control i of ii SECTION 28 1000 ELECTRONIC ACCESS CONTROL SYSTEM (sub-contract to ELECTRICAL DIVISION 26) PART 1 – GENERAL 1.01 FILED SUB-BID REQUIREMENTS ........................................................................................................ 1 1.02 RELATED DOCUMENTS ....................................................................................................................... 1 1.03 SUMMARY .............................................................................................................................................. 1 1.04 PRECEDENCE ....................................................................................................................................... 2 1.05 DEFINITIONS.......................................................................................................................................... 2 1.06 RELATED SECTIONS ............................................................................................................................ 3 1.07 REFERENCES ........................................................................................................................................ 3 1.08 COORDINATION .................................................................................................................................... 4 1.09 COORDINATION DRAWINGS ............................................................................................................... 4 1.10 PROJECT MEETINGS ............................................................................................................................ 5 1.11 SHOP DRAWINGS & EQUIPMENT SUBMITTAL .................................................................................. 5 1.12 OPERATIONS AND MAINTANANCE MANUALS .................................................................................. 5 1.13 WARRANTY ............................................................................................................................................ 5 1.14 TESTING ................................................................................................................................................. 5 1.15 TRAINING ............................................................................................................................................... 5 1.16 OWNER’S RIGHT TO USE EQUIPMENT .............................................................................................. 5 1.17 TECHNICAL REQUIREMENTS, ELECTRONIC ACCESS CONTROL SYSTEM .................................. 5 PART 2 - PRODUCTS 2.01 GENERAL ............................................................................................................................................. 15 2.02 ACCESS CONTROL SYSTEM ............................................................................................................. 16 2.03 ACCESS CONTROL SYSTEM SOFTWARE MANUFACTURERS ...................................................... 17 2.04 ACCESS CONTROL SYSTEM HARDWARE OVERALL DESCRIPTION ........................................... 17 2.05 ACCESS CONTROL SYSTEM OPERATION ....................................................................................... 17 2.06 ACCESS CONTROL SYSTEM SOFTWARE AND COMMUNICATIONS ............................................ 19 2.07 ACCESS CONTROL SYSTEM DATABASE ......................................................................................... 29 2.08 ACCESS CONTROL SYSTEM ARCHITECTURE ................................................................................ 32 2.09 CENTRAL HARDWARE AND WORKSTATIONS ................................................................................ 33 2.10 ACCESS CONTROL SYSTEM INTEGRATION REQUIREMENTS ..................................................... 37 2.11 ACCESS CONTROL SYSTEM FIELD HARDWARE............................................................................ 38 2.12 CARD READERS AND CARDS ........................................................................................................... 39 2.13 DOOR POSITION SWITCH .................................................................................................................. 40 2.14 REQUEST TO EXIT DEVICES ............................................................................................................. 41 2.15 ELECTRIFIED LOCKING HARDWARE ............................................................................................... 41 2.16 POWER AND POWER SUPPLIES ....................................................................................................... 41 2.17 WIRE AND CABLE ............................................................................................................................... 42 2.18 ENCLOSURES...................................................................................................................................... 42 2.19 MISCELLANEOUS ................................................................................................................................ 42 2.20 OPEN ARCHITECTURE ....................................................................................................................... 43 PART 3 - EXECUTION 3.01 GENERAL PROGRAMMING ................................................................................................................ 43 3.02 SPECIAL CONDITIONS AND PROGRAMMING .................................................................................. 43 3.03 ELECTRONIC SECURITY SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY ................. 44 3.04 IDENTIFICATION AND TAGGING ....................................................................................................... 44 3.05 DATABASE PREPARATION, CHECKING AND ACTIVATION ............................................................ 44 3.06 START-UP RESPONSIBILITY .............................................................................................................. 45 3.07 PRELIMINARY INSPECTION, TESTING AND COMMISSIONING ..................................................... 45 Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control ii of ii 3.08 FINAL PROCEDURES .......................................................................................................................... 45 3.09 NOTICE OF COMPLETION .................................................................................................................. 45 Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 1 of 45 SECTION 28 1000 ELECTRONIC ACCESS CONTROL SYSTEM (sub-contract to ELECTRICAL DIVISION 26) PART 1 - GENERAL 1.01 FILED SUB-BID REQUIREMENTS A. Filed Sub-Sub-Bid Requiring a Paragraph “E” LISTING on the FORM FOR SUB-BID required per M.G.L. Chapter 149 Section 44A to 44L, as amended to date. The Electrical Subcontractor shall be responsible for all related building preparation and coordination, see specification for additional Paragraph “E” Listing requirements of the Listed Systems Contractor, and coordination of responsibilities. B. Section 28 0000 “ELECTRONIC SECURITY SYSTEM GENERAL”, Section 28 1000 “ELECTRONIC ACCESS CONTROL SYSTEM”, Section 28 1100 “INTRUSION DETECTION SYSTEM”, Section 28 1200 “INTERCOM AND EMERGENCY PHONE SYSTEM”, Section 28 2000 “ELECTRONIC VIDEO MANAGEMENT SYSTEM”, and Section 28 4000 “ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT AND WARRANTY” shall be a Filed Sub-Sub Bid of Section 26 0000 “ELECTRICAL”, requiring a Paragraph “E” Listing on the FORM FOR SUB-BID. C. The work in this is Section shall be provided by a trained and certified Company (or Security Subcontractor) in the Systems they are providing. D. The Security Subcontractor shall be DCAMM Certified by the state of Massachusetts Division of Capital Asset Management and Maintenance, in the category of: ALARM SYSTEMS, and shall hold a current S-License per the requirements of the Commonwealth of Massachusetts. E. A single Security Subcontractor shall be responsible for the DIV28 contract in its entirety as included in these contract documents. 1.02 RELATED DOCUMENTS A. Drawings and general provisions of the Contract, including General and Supplementary Conditions and other Division 01 Specification Sections, apply to these sections. B. Security General Requirements as outlined in Section 28 0000 are applicable to these sections. C. These Specification Sections and contract documents shall be in accordance with Section 28 0000 “ELECTRONIC SECURITY SYSTEMS GENERAL”, Section 28 1200 “VIDEO SURVEILLENCE SYSTEMS” and Section 28 4000 “ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT & WARRANTY” 1.03 SUMMARY A. This Specification Section 28 1000 includes the furnishing, installation and programming of the following: 1. Electronic Access Control System Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 2 of 45 B. The Security Subcontractor shall provide, install, program and warranty all components to provide new complete and functional Access Control Systems. All components to be new and unused. All materials, obviously a part of the electronic safety and security infrastructure and necessary to its proper operation, but not specifically mentioned or shown on the Drawings, shall be furnished and installed without any additional charge. C. The Drawings and Specifications are complementary to each other and what is called for by one shall be as binding as if called for by both. If a discrepancy exists between the Drawings and Specifications, the higher cost and/or higher level of functionality shall be utilized. D. Coordinate work with that of all other trades affecting or affected by the work of this Section. Cooperate with such trades as to assure the steady progress of all work under the contract. E. Provide all necessary hardware, software, firmware, programming, mounting brackets, enclosures, backboards, power supplies, keypad card readers, contacts, rex’s, sensors, master stations, door stations, panels and controllers, wire, cable and conduit, batteries, relays and the like, to provide a fully functional Access Control System. F. Related Requirements: 1. Section 01 3200 "Construction Progress Documentation" for preparing and submitting Contractor's construction schedule. 2. Section 01 7300 "Execution" for procedures for coordinating general installation and field- engineering services, including establishment of benchmarks and control points. 3. Section 01 7700 "Closeout Procedures" for coordinating closeout of the Contract. 4. Section 01 9113 "General Commissioning Requirements" for coordinating the Work with Owner's Commissioning Authority. 1.04 PRECEDENCE A. Obtain, read and comply with General Conditions and applicable sub-sections of the contract specifications. Where a discrepancy may exist between any applicable sub-section and directions as contained herein, the more stringent shall apply. 1.05 DEFINITIONS A. BIM: Building Information Modeling. B. RFI: Request for Information. Request from Owner, General Contractor, Architect, or Contractor seeking information required by or clarifications of the Contract Documents. C. ACS: Access Control System D. IDS: Intrusion Detection System E. ICS: Intercom System F. EPS: Emergency Phone System G. VMS: Video Management System H. ESS: Electronic Security System Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 3 of 45 I. Credential: Data assigned to an entity and used to identify that entity J. Additional Terms: 1. "Furnish" - Purchase and deliver to the project site complete with every necessary appurtenance and support, all as part of the Work. Purchasing shall include payment of all sales taxes and other surcharges as may be· required to assure that purchased items are free of all liens, claims, or encumbrances. 2. "Install" - Unload at the delivery point at the site and perform every operation necessary to establish secure mounting and correct operation at the proper location in the project, all as part of the Work. 3. "New" - Manufactured within the past year and never before used. 4. “Provide”: As used herein shall mean furnish, install, commission (if not under contract of a commissioning agent), test, close out and warranty complete. 5. “Infrastructure”: As used herein shall mean cable, conduit, and raceway with all required boxes, fittings, connectors, and accessories; completely installed. 1.06 RELATED SECTIONS A. Division 01 B. Division 08 Door Hardware C. Division 26 Electrical D. Division 27 Communications E. 28 0000 Electronic Security Systems General F. 28 1100 Intrusion Detection System G. 28 1200 Intercom and Emergency Phone System H. 28 2000 Video Management System I. 28 4000 Electronic Security System Testing, Training, Closeout and Warranty 1.07 REFERENCES A. All work shall be in accordance with, but not limited to, the following: 1. The National Electrical Code 2. American National Standards Institute (ANSI) 3. National Electrical Manufacturers Association (NEMA) 4. Telecommunications Industries Association (TIA) 5. Institute of Electrical & Electronics Consultants (IEEE) 6. Underwriters Laboratories (UL) 7. Federal Communications Commission (FCC) 8. Occupational Safety and Health Administration (OSHA) 9. Americans with Disabilities Act (ADA) 10. Local city and county ordinances B. In the event of conflict of code, the more stringent shall apply. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 4 of 45 1.08 COORDINATION A. The Security Subcontractor shall coordinate with the Architect, Construction Manager/General Contractor, Division 8 and Division 26 Contractor to ensure that adequate power and locking hardware has been provided and properly located for all Access Control and Security System equipment. B. The Security Subcontractor shall coordinate locations of all devices with the Architect and Security Consultant prior to installation. C. The Security Subcontractor shall coordinate and verify the location of each piece of rack-mounted head end equipment with the Owner’s IT Department. D. The Security Subcontractor shall coordinate finishes and colors of all equipment with the Architect. E. The Security Subcontractor shall coordinate construction operations included in different Sections of the Specifications to ensure efficient and orderly installation of each part of the Work. Coordinate construction operations included in different Sections that depend on each other for proper installation, connection, and operation. F. Each contractor shall cooperate with Project coordinator, who shall coordinate its construction operations with those of other contractors, trades and entities to ensure efficient and orderly installation of each part of the Work. 1.09 COORDINATION DRAWINGS A. Prepare coordination drawings according to requirements in individual Sections, and additionally where installation is not completely indicated on Shop Drawings, where limited space availability necessitates coordination, or if coordination is required to facilitate integration of products and materials fabricated or installed by more than one entity. 1. Architect shall review coordination drawings to confirm that, in general, the Work is being coordinated, but not for the details of the coordination, which are the Security Subcontractor's responsibility. If Architect determines that coordination drawings are not being prepared in sufficient scope or detail, or are otherwise deficient, Architect will so inform the Security Subcontractor, who shall make suitable modifications and resubmit. 2. Prepare coordination drawing prints according to requirements in "Submittal Procedures." B. Coordination Drawing Process: Prepare coordination drawings in the following manner: 1. Schedule submittal and review of Fire Sprinkler, Plumbing, HVAC, and Electrical Shop Drawings to make required changes prior to preparation of coordination drawings. Ensure no conflicts. 2. Each trade shall be provided a separate color for identifying conflicts. 3. Electrical Subcontractor shall provide service and feeder conduit runs and equipment to the Security Subcontractor. Electrical Subcontractor shall forward drawing files to the Security Subcontractor for review. 4. Communications and Electronic Safety and Security Subcontractor shall indicate cable trays and back planes, and equipment needed by other trades. Electronic Safety and Security Subcontractor shall forward completed drawing files to General Contractor or Construction Manager. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 5 of 45 5. General Contractor shall perform the final coordination review. As each coordination drawing is completed, General Contractor shall meet with Architect to review and resolve conflicts on the coordination drawings. 1.10 PROJECT MEETINGS A. The General Contractor shall schedule and conduct meetings and conferences at Project site unless otherwise indicated. B. The Security Subcontractor shall attend all meeting as required by the General Contractor or Construction Manager. 1.11 SHOP DRAWINGS & EQUIPMENT SUBMITTAL A. In accordance with Section 28 0000, Security System General Requirements, and 28 4000 Electronic Security Systems Testing, Training, Closeout and Warranty 1.12 OPERATIONS AND MAINTANANCE MANUALS A. In accordance with Section 28 0000, Security System General Requirements, and 28 4000 Electronic Security Systems Testing, Training, Closeout and Warranty. 1.13 WARRANTY A. In accordance with Section 28 0000, Security System General Requirements, and 28 4000 Electronic Security Systems Testing, Training, Closeout and Warranty. 1.14 TESTING A. In accordance with Section 28 0000, Security System General Requirements, and 28 4000 Electronic Security Systems Testing, Training, Closeout and Warranty. 1.15 TRAINING A. In accordance with Section 28 0000, Security System General Requirements, and 28 4000 Electronic Security Systems Testing, Training, Closeout and Warranty. 1.16 OWNER’S RIGHT TO USE EQUIPMENT A. The Owner reserves the right to use equipment, material and services provided as part of this work prior to Acceptance of the Work, without incurring additional charges and without commencement of the Warranty period. 1.17 TECHNICAL REQUIREMENTS, ELECTRONIC ACCESS CONTROL SYSTEM A. General Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 6 of 45 1. The following information is provided to establish required system performance for the complete operating access control system. The Security Subcontractor shall provide equipment, installation wiring and software programming necessary to provide a complete system as described herein and as shown on the drawings. 2. The access control system components provided under this scope of work shall provide access control services, with a credentialing system services for the ACS. New devices shall be provided, installed and connected to the system server and database through the Security Subcontractor provided LAN. 3. The Security Subcontractor shall be responsible for providing equipment, software, and licensing to achieve the specified system performance described herein. 4. The Security Subcontractor shall ensure system additions and modifications provided under this scope of work will have no negative effect on the existing systems and operations of other properties within the Dennis-Yarmouth School District network, and have no effect beyond the scope of work. B. Purpose 1. The electronic access control system is designed to monitor and restrict access to specified areas, and to report on the activity and violations of restricted access in those areas. C. Environment 1. The system shall be wholly contained at the Dennis-Yarmouth Intermediate Middle School, with remote access by authorized and credentialed designees. 2. Primary system programming, configuration and control shall occur at this location. 3. Building Administrative Post: Administrative clients are located as shown on the drawings. Site monitoring, site configuration, and site-related access privilege management may occur at this location. 4. Infrastructure and Connectivity a. Local Sites and Buildings: The ACS workstations and controllers shall reside on the Dennis-Yarmouth Intermediate Middle School Local Area Network (LAN) or network segment. Coordinate with the Owner’s IT Department on the provision of LAN ports and network rights. b. Enterprise: Local LAN networks will be connected to the Dennis-Yarmouth School District LAN/WAN, to establish connectivity between sites. Coordinate with the Owner’s IT Department on the provision of LAN ports and network rights. D. Attributes 1. General a. The ACS shall support all access control readers, inputs / outputs, client workstations, and cardholders. b. Any system expansion shall be allowed up to an unlimited number of card readers through electronic access control system controllers and field devices. These devices shall be connected together, and communicating with the server/software to provide a complete and operational system. c. The ACS shall be based on a distributed system of fully intelligent, stand-alone controllers, operating in a multi-tasking, multi-user environment. d. The system shall be compliant with ACS standards, and the credentials and readers shall be compliant with the existing issued credentials. 2. Electronic Access Control System Description a. The Electronic Access Control System (ACS) is the key central component for managing physical access control and the bridge between physical and logical access control for this project. The system shall provide a variety of integral functions including the ability to regulate access and egress; provide identification credentials; monitor, track and interface alarms; and view, digital surveillance images linked to ACS events. b. The Security Subcontractor shall incorporate the application software features and functionality into this new work, programming and configuring the system and devices to Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 7 of 45 make use of these and any other features offered by the application software, as required by the Owner. c. The ACS shall be able to seamlessly interface with and monitor Controllers, reader interface modules, I/O panels, burglar alarm panels, burglar alarm panel receivers, biometric devices, personal protection devices, video intercom systems, emergency phone systems and video management software. d. The ACS shall be able to communicate with Controllers via RS-485, RS-232, TCP- IP/Ethernet and Dial-up via Modem. 3. The server and client software shall utilize a software-based licensing scheme. 4. The ACS shall be based on Microsoft .NET architecture. 5. The ACS server shall communicate to all clients (Workstations and field hardware) through Windows services. The ACS shall run as a service in the OS, and there shall be no requirement to run an application after the operating system is ready. 6. The ACS shall support a Graphical User Interface that minimizes training needs. The software shall include on-line help displays to eliminate operator reference manuals. 7. The ACS software shall be run using standard x86-based hardware, and the operating system shall be Microsoft Windows as follows: a. ACS server shall run on Windows Server 2019 Server 64 bit. b. ACS clients shall run on 64 bit Windows 10 Professional or Ultimate editions. 8. The server shall use 64 bit Microsoft SQL Server 2019® Standard or Enterprise database server. The system shall allow other authorized applications to gain access to the system’s database should wider integration of the system at the site become a requirement. 9. The system shall use Microsoft Message Queue (MSMQ) for handling transactions between server and clients as well as between server and field hardware. Use of custom-coded or proprietary first-in-first-out (FIFO) buffers shall not be acceptable. 10. Operator Permissions a. System operators shall be associated with a log in Name and Password. A system option will determine whether strong operator passwords will be used. b. The operator’s account shall be assigned to a role in the system. The role is a permission profile. This will determine the functions that shall be available to that operator when logged-on to the system. The system shall support an option to hide Personal Identification Numbers of cardholders when an operator is viewing a record. c. The system shall show each operator only features and options for which he or she is authorized. Features and options for which the operator does not have permission must be hidden. d. The ACS shall support an unrestricted number of operator accounts and operator roles. 11. Report Generation a. Extensive history reporting shall be a standard integrated feature; and shall include the ability to review all system alarms, access control activity, and operator actions. These reports shall be made available for review via the operator’s display screen, or to a printer, or to another disk media. Extensive sort parameters shall include by any of the “Personal Details” fields or Titles, for example by “Department”, and only Names commencing with “SM*”. b. The system shall support generation of reports detailing the system operation. The following reports shall be available in the software: 1) Cards on site 2) Hours on site 3) Cardholders with access to each door 4) Access rights of each cardholder 5) System Configuration 6) Scheduled and Conditional Commands defined 7) System operator transaction history c. The system shall provide system management reporting, including detailed listings for all the operator actions and the current cardholder database for output to the display screen, printer or disk media. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 8 of 45 d. The system shall have the ability to save frequently used report configurations and associate them with a “Title”. Such predefined reports shall be available from a list to simplify the report selection. It shall be possible to request these reports to run immediately or schedule them to occur at a specified date and time. e. The system shall allow custom reporting options by providing an interface to a commercially available ‘off the shelf’ reporting product, such as Crystal Reports. The interface shall present all database fields in a structured format, which does not require detailed knowledge of the database design and table relationships. f. History Reporting 1) Extensive reporting shall be included to provide the ability to review system alarms, access control activity and operator actions. These reports shall be available for review on the operator’s display, to a printer, or to a file. 2) Extensive sort parameters shall include any of the personal detail’s fields of information such as by department, job title, vehicle registration, contractor company name or any other reference appropriate for each site. 12. Clients: The system shall support ACS clients where shown on the drawings. The system shall provide the means for multiple operators to simultaneously administer the system from convenient locations connected via a local area network (LAN) or across a wide area network (WAN). The system shall utilize the Owner’s LAN/WAN network backbone. Coordinate with the Owner’s IT Department on the requirements for LAN/WAN connectivity. 13. Addition of Cardholders to the System Database a. The system shall provide a means of assigning access control rights to each cardholder. Access control rights determine which access points are accessible to the cardholder based on date and time of day. The system shall support an unrestricted number of access rights. b. The software shall also provide an ALTERNATE set of Access rights to a cardholder on a temporary basis. The change may be initiated at any time by an authorized operator, or automatically between specified dates. This shall provide the facility of automatically changing a card’s rights between a specified date range, after which the card will revert to its normal Doors and Times. Alternate access rights shall be able to be configured for multiple date ranges. c. Each cardholder shall either be associated with standard door timings for door release, door open and door pre-held, or be given extended timings for disabled persons or someone who has to push a cart. d. Cardholders who have not used a reader for some time shall be readily listed to allow their card’s status to be reviewed. e. Cardholders shall be assigned an expiration date, and more specifically an expiry time, after which a card shall automatically become inactive and therefore be rejected at all readers on the system. f. The system shall allow for the definition of Access control rights to be associated with a badge design. Each user that selects that badge design shall be provided with the associated access control rights that can further be customized for the specific cardholder. g. The system shall allow access control rights to be defined for a cardholder on a reader basis. A timecode will be associated with each reader as it is assigned to the cardholder’s access control rights. h. The system shall allow access control rights to be defined for a cardholder on a reader group basis. Reader groups are groups of readers. A timecode will be associated with each reader group as it is assigned to the cardholder’s access control rights. 14. Cardholder Details a. Cardholder information shall include first and last name, card number, PIN code and valid period to provide automatic expiration. Each cardholder record shall also incorporate at least 50 user-defined personal data fields, independent of user-defined fields for visitor management. b. Personal data fields shall support free entry text, picking an entry from a previously configured list, or picking an entry from an updatable list. Each of these entries shall Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 9 of 45 further be categorized as a date, a time, general input, or customized input. Each category shall support the masking of input data to assure data integrity. For instance, a date mask might look like “mm/dd/yyyy” to indicate that the date input should be a two-digit month followed by a two-digit day followed by a four-digit year all separated by the slash character. The mask shall be required for customized input. c. Personal data fields shall have the option of being configured as mandatory. 15. Locator: This feature shall provide a quick method of locating cardholders by displaying the last 25 valid history events along with the time, date and access point used. This information shall be available for an individual or group of persons by name, card number or by personal data. 16. Card Watch Feature: Any cardholder shall be easily tracked as they move around a large site by selecting card watch. As the person uses their access control card, the system shall have the ability to automatically notify the operator of the person’s presence at each location. 17. Serial Device Interface: The software shall allow the definition of ASCII commands to be sent out over a computer serial port (physical or virtual) or through the RS-232 interface of the DBU. These serial commands shall be available through the user interface as well as in the conditional logic described herein. 18. Automatic Holiday Override: The software shall be programmed by the operator to recognize special or holiday dates, which in turn can be linked to operational changes in how the site is to be managed on these specific days. This feature shall notify a system operator of individual holiday dates up to seven days prior provides a useful check on the date’s current validity. Multiple types of holiday dates shall also be provided so that partial days or early closing requirements on specific dates can be accommodated. 19. System Partitioning a. The access point readers, monitor points, and auxiliary outputs shall be managed on a partition basis by simply defining which devices are to be included in a partition. b. The ACS shall be supplied with the ability to manage up to 64 partitions, and shall have an option to manage up to 999 partitions. c. Multiple private or public entities shall be able to share the system with database segregation for card records and ownership of readers, monitor point inputs and switching outputs dependent upon the operators assigned permissions. Each company partition shall allow for autonomous system administration, allowing partitioned card administration, reports, and alarms. d. Operator permissions shall be created and assigned globally or by the owning company. When created and assigned globally an Operator’s password shall be associated with one or more companies. e. Alarm reporting shall be routed to a client located at the company owning the monitor point or reader and can be automatically redirected to a different PC at pre-programmed times and selective days of the week. f. Common areas, such as the main entrance, shall have the ability to be shared so that all companies may access these doors, even when different card customer/site codes have been configured. 20. Alarm Management a. Alarm and activity management must be handled in the same executable program as other access control functions such as cardholder management, badging, and hardware configuration. Systems utilizing a separate application for alarm handling shall not be acceptable. b. Alarms must be displayed in a separate window from (non-alarm) activity. Systems which display both alarms and non-alarm activity in a single window shall not be acceptable. It must be possible to display either the alarm window, the activity window, or both at any time. c. The system must provide separate permissions for alarms and activity, and allow users to be individually granted rights to view and or process either, neither, or both. Systems which cannot separately grant privileges for alarms and for non-alarm activity shall not be acceptable. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 10 of 45 d. Alarm handling shall be efficiently managed with up to 99 priority levels and user definable instruction messages to ensure the operator monitoring the site takes appropriate responses. The facility shall have the ability to customize audible alerts for each type of alarm is provided using standard or custom generated multimedia wave files. Each alarm type shall also be presented in a user-defined color. e. To provide additional information when reviewing alarm signals, the operator shall either enter custom comments or simply select from a predefined pick list to provide a time- stamped record of all the actions taken throughout the incident. Predefined manual commands shall be uniquely assigned for each alarm, and readily activated by the operator via a command button provided on the alarm acknowledgement screen. Additionally, automatic conditional commands shall be configured to automatically operate in response to any given alarm condition. f. The ACS shall be optionally configured to require operator comments when acknowledging alarms. g. The ACS shall support the ability to selectively choose alarms to acknowledge and/or clear. h. Each alarm shall be configurable to have a specified color and sound. i. Each alarm shall be capable of linking video from digital video recorders (if applicable) for incident playback. j. The Alarm Monitor screen shall provide an indication that cardholder information is available for a specific alarm. A “Card” button shall be available that when pressed will display the cardholder badge image. k. Unacknowledged alarms shall be capable of being routed to alternate client (or Email – see Software Options below) based on age and priority of alarm. l. The system shall support a generic ASCII input capability that allows the system administrator to define specific ASCII input strings as alarms to be displayed in the alarm monitoring window as well as on the graphical map interface. 21. E-mail Alarms a. The ACS shall support the ability to automatically e-mail alarm condition messages. b. Each alarm definition shall allow a destination e-mail address to be defined. The e-mail address may be an address group as defined in the e-mail MAPI application. c. E-mail alarm messages shall be controlled by time of day and day of the week. For example, e-mail to the Facility Security Supervisor would only be generated when alarms occur during after-hours times. 22. Graphic Site Maps a. The system shall have the ability to import and use graphical maps. Maps shall be linked together using a tiered tree structure. To speed the location of an incident, each map level shall contain a clearly visible indicator as to which sub map the operator should select next to find the device that is in alarm. b. Maps shall also have the ability to be configured to appear automatically on presentation of a new alarm, providing the operator with prompt visual indication that an alarm has occurred. c. The status of readers, doors, monitor points and auxiliary outputs shall be requested from any map by simply selecting the icon representing the device and its current state will be displayed. d. The icons on the graphic map shall dynamically indicate the status of the device they represent. For example, a door icon shall change to show the door open when the door position sensor indicates such, and shall change to the original icon when the door is again secure. Additionally, monitor points shall also change to show their current state. e. Should the operator wish to change the current setting, simply pressing the right mouse button shall cause the appropriate command options list to appear for selection. f. Having selected a command, confirmation shall be provided by reflecting the change in status on the display. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 11 of 45 g. Maps shall be created using standard office tools such as Paint® or drawing packages such as AutoCAD®. It shall be possible to import drawings in the following formats: JPEG, Bitmap, Windows metafile or DXF. h. Icons representing access points, monitoring points, switching outputs, alarm inputs, CCTV cameras or intercom call stations shall be placed on any map at the required location in a drag and drop manner. i. It shall be possible to define on the map the location of readers, access doors, alarm monitored points, output switching relays, CCTV cameras, Digital Video Recorder Cameras, Intercom call stations and alarm panel devices. j. It shall also be possible to change the status of readers, reader groups, floor groups, alarm monitored points or output switching relays and confirm the successful execution of such commands from the map display. This functionality shall be capable of being restricted per device based on operator permission. k. The map display shall include the option to display a group of similar devices as a single icon. Once devices are grouped it shall be possible to change their status. For example, it shall be possible to unlock all entrance doors by executing a single command from the map display. l. It shall be possible to display a device on any map, on multiple maps, or on no maps. It shall also be possible to display the same device in multiple locations on the same map. Systems that do not allow devices to be placed multiple times on the same or multiple maps shall not be acceptable. 23. Manual and Automatic Commands a. Operators shall be provided with a wide choice of manual commands embracing the control of readers, monitor points, output switching relays and door locking devices. Also, the operator shall have the ability to check the status of single, or multiple devices when graphical maps are utilized, status requests shall be simply initiated by “clicking” on the device icon within the map. b. Automatic commands shall be included and may operate on a timed or event basis. c. Scheduled commands shall easily be defined linking complimentary commands to occur at the start and stop times of any chosen timecode. d. Event triggered commands shall provide an extremely powerful means of creating IF/THEN/WHEN associations encompassing a wide selection of IF conditions to the automatic execution of THEN commands subject to a WHEN timecode being active. A minimum of 10 THEN actions shall be available per trigger command. e. Devices shall be managed on a partition basis by grouping readers, monitor points and auxiliary outputs. This feature shall allow multiple devices to be actioned by a single command when using manual, timed and conditional commands. This functionality shall be capable of being restricted per device based on operator permission. f. The ACS shall support an unrestricted number of automatic (scheduled and trigger) and manual commands. These commands shall be capable of spanning across multiple field controllers. 24. User Code Mode a. The ACS shall support the ability to put a keypad-equipped reader into User Code Mode. This feature shall allow a cardholder to gain access by entering a valid card’s number at a reader keypad, therefore not requiring the holder to carry a card. b. User code mode shall be enabled on a per reader basis. c. This mode shall support card number only, or card number and its assigned PIN code. 25. Visitor Management (as needed in ACS Software applications. The Dennis-Yarmouth Intermediate Middle School shall use the Raptor Visitor Management System to be installed under this contract in two locations) a. Visitor Management shall be incorporated as a standard feature of software, with no separate licenses or license fees required to activate the feature. Operators shall be able to pre-enroll visitors using a Web (thin) or Standard (thick) client. The thin client shall connect to the server via Microsoft™ Terminal Services and Microsoft™ Internet Explorer Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 12 of 45 to permit any operator with visitor permissions assigned the ability to pre-enroll visitors without the need to install client software on their local machine. b. Visitor Management shall be fully integrated with other key areas of the system, such as access, alarms management, muster and Video ID Badging. Visitor records shall have 50 personal data fields with user definable data titles independent from the personal data fields defined for cardholders. All visitor transactions and movements shall be recorded and may be reported on and filtered, using the extensive reporting capabilities of the software. Visitors may exist without being assigned a card number if access control is not required. c. Data entry shall be simplified by remembering previous entries of personal data and allowing selection from a pick list to minimize repetitive typing when creating each visitor’s record. The cardholder database and the history log shall also be sorted by any of the additional fields of information making them a powerful tool for filtering data. d. Personal data fields shall support free entry text, picking an entry from a previously configured list, or picking an entry from an updatable list. Each of these entries shall further be categorized as a date, a time, general input, or customized input. Each category shall support the masking of input data to assure data integrity. For instance, a date mask might look like “mm/dd/yyyy” to indicate that the date input should be a two-digit month followed by a two-digit day followed by a four-digit year all separated by the slash character. The mask shall be required for customized input. e. Personal data fields shall have the option of being configured as mandatory. f. Visitor time of arrival and time of departure shall be tracked by the system. This feature shall be available even if a visitor is not issued a card or card number in the system. g. The system shall support a driver’s license scanner including optical character recognition to ease data entry. h. The ACS shall support capture of a business card image. i. The ACS shall support the inclusion of a custom message for each visitor record. j. The Security Subcontractor shall provide a network jack and power outlet at the two (2) Visitor management locations only. The Owner to provide the Raptor Visitor Management System hardware. 26. Windows Daylight Saving Auto Adjustment a. The system shall support Windows TimeSrv or Windows time management. 27. History Archive and System Back up a. The system shall be capable of retaining at least 25 years of activity in its online log file, disk storage space permitting. Systems that require offline storage of historical events shall not be acceptable. b. The system shall allow on line archiving of history logs, along with database back up of system configuration and cardholder details. To further ease the burden of remembering to back up your system’s database, this function shall be able to be automated to occur without intervention at a pre-set time. c. The system backup and history archive shall be to a local or remotely accessible UNC path 28. The manufacturer of the ACS shall make available documentation on Server Hardening, which shall, at a minimum, detail the TCP/IP ports that are utilized by the system to allow other ports to be closed. 29. Map Database: Contractor shall research, design, develop and provide all maps described herein in complete operating condition including graphic representations, icons, alarm and control interfaces. a. Site: Site maps shall include the entire site perimeter showing all buildings, vehicle and foot traffic features and street frontage. b. Building Maps: Building Maps shall include each building, interior floor plan, a floor stacking plan and all stairwell risers. c. Floor Plan Maps: Floor plan maps shall include rooms, corridors, elevators, door and room designations (number and usage), penetrable wall points, column supports, location of security control equipment and any other details necessary to clearly depict the secured environment. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 13 of 45 d. Required maps: provide a site map for each of the five facilities and floor plan map of the ELWRF building. e. Maps shall show text and icons for all devices monitored or controlled by the security system. 30. ACS Controllers a. The ACS intelligent database controller shall support a minimum of 20,000 cardholders with expansion capabilities of up to 1,000,000 cardholders. Retrofit controllers shall support a minimum of 200,000 cardholders. b. The ACS intelligent database controller shall support a minimum of 12,000 offline transactions. The option to provide for at least 65,000 transaction storage at the panel must be available. Retrofit controllers shall support a minimum of 16,000 offline transactions. c. The ACS hardware shall be comprised of modular components that connect over standard interfaces to one another. There shall be database storage and processing module (DBU), and once data has been downloaded to the DBU it shall locally make access control decisions. Access granted or denied decisions shall be made in under 0.5 seconds. d. The DBU shall store firmware in non-volatile flash memory to allow for convenient updates through the head-end software application. The DBU shall store the cardholder and configuration database information in battery-backed memory so that loss of primary power will not cause the loss of the database. e. The ACS hardware shall be capable of expansion via 2-, 4-, and 8- door controllers (DC). Door controllers shall support one or more input/output module expansion cards that requires no additional addressing and provides 8 monitored input points or 8 auxiliary output points. Retrofit hardware shall support expansion via 2-door controllers and/or 8- door controllers, 20-output, and 16-input modules. f. The DBU shall support configurations that include: 16 card readers, 96 monitored input points, or 96 auxiliary output points. Retrofit DBU’s shall support configurations that include: 16 F2F interface card readers, 8 Wiegand interface card readers, 64 monitored points, or 64 output points. g. There shall be an intelligent controller option to provide control of 8 readers/doors from a single circuit board (communications, memory, CPU, and reader/door functions integrated) with an available 8-reader/door add-on to provide a 16-door controller from two circuit boards. The 8-door controller shall provide an integrated on-board RS-232 interface, and shall have provisions for modular expandable memory. h. System must support the installation of readers at any distance from 3 feet to 3000 feet from the reader interface board. Systems that do not support this requirement, or that require additional, separately mounted components to achieve the requirement shall not be acceptable. This requirement does not apply to biometric reader devices or Wiegand readers. i. Each supplied reader shall be continuously monitored for tamper (reader removed from backing plate or reader removed from wall). Tamper detection switch must be part of the reader and fit entirely within the reader housing. Use of external tamper switches shall not be acceptable. This requirement does not apply to biometric reader devices. j. When using the vendor’s proprietary readers, each supplied reader shall be actively and continuously monitored for communications loss by the ACS hardware. This monitoring shall consist of a two-way Poll-Response mechanism that insures the integrity of all signaling including LED and LCD (if equipped) data paths. Systems utilizing uni-directional “heartbeats” or not including active, continuous monitoring of reader communications shall not be acceptable. This requirement does not apply to biometric reader devices or Wiegand readers . k. When using the vendor’s proprietary readers, the ACS shall optionally annunciate door forced and held conditions using the reader’s onboard sounder, Systems that do not offer this behavior, or that require additional wiring, use additional relay outputs, or require external sounders to accomplish it shall not be acceptable. This requirement does not apply to biometric reader devices or retained legacy readers. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 14 of 45 l. The hardware shall be made with a lead-free manufacturing process to meet RoHS requirements. m. Communication Schemes 1) Hardwired Communications 2) The field panels shall be located convenient to the access and monitor points that they control, and shall be interconnected in a chain configuration to a serial port of a convenient client PC on the system. 3) The system shall support a minimum of 31 intelligent field panels (nodes) daisy- chained together such that they communicate back to a single serial communications port at the host. 4) Bi-Directional Communications: A chain of field panels may be wired in a loop configuration, by the addition of a cable from the last controller and connecting it into a second port on the PC. When this configuration is installed, should a break in the cable occur, the PC shall be able to communicate with the nodes after the break, via the secondary port. 5) Dial-Up Communications: Remote sites with field panels shall also have the ability to be centrally administered and monitored using low cost dial-up connections via autodial/auto-answer modems with each site storing all access activity for up-loading during periodic calls to update the central history log. Should an alarm occur, the remote site shall immediately call and report the incident. n. Network Communications 1) The first field panel in a chain of panels shall have the ability to communicate with its monitoring client PC over the local or wide area network. This shall be achieved by the addition of a network interface option module (except in the case of retrofit controllers) and provide a cost effective alternative configuration to a direct connection via a client PC’s serial port. The network interface shall support both “10 base T” and “100 base TX” (10/100) communications speeds. The network interface shall support encryption utilizing AES algorithm. 2) An optional modem and telephone line shall be configured to provide an alternative path for the reporting of alarms in the case of unavailability of the network. The fallback to dial-up alarms reporting shall be automatic in the event of detecting a network o. Efficient Memory Management 1) Controllers shall be capable of supporting cardholder populations of at least 1,000,000 cards when equipped with sufficient memory, or be configured to a learning mode that allows the cards most frequently used to have their access rights stored locally in the panel’s memory. 2) When a card is presented which is not resident in the local panel, a verification request shall be made to the central database, if the card is valid the details shall be downloaded. If the card memory is full, the card with the oldest transaction date shall be deleted to make space for the card requested. This shall allow automatic management of cardholders, based upon frequent users having “instant” response and infrequent users learned when required. p. Database Synchronization 1) To ensure synchronization of the distributed controllers’ databases with a region’s main database an internal checking process shall be provided within each controller. In the event of corruption of a controller’s local database then it shall be able to detect this condition and automatically request the relevant data to be downloaded from it’s local server. This action shall not require Operator intervention. 2) The system shall continue to provide access control functionality during this re- synchronization process. q. Readers supporting various technologies shall provide data from card presentations or biometric authentications through a door control unit (DCU) that includes the electrical interface to the reader as well as inputs for door sensors and form C relays for outputs. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 15 of 45 r. The DCU shall support Wiegand communications to the reader. In order to provide higher levels of security, the DCU shall also support bi-directional, supervised communications to the reader. Door controllers that do not support encryption and supervision of reader communications are not considered equal. s. The system shall support an option to store cardholder biometric information (e.g. fingerprint or hand geometry templates) at the panel (as part of the cardholder record). Storage of the template data at the reader shall be unacceptable. This requirement does not apply to edge network or retrofit controllers. An acceptable alternative is to store individual templates on secure smart cards. t. The controller shall support the following options for supervision of the monitored input points. Contractor shall use 4-state supervision for this project, and provide the appropriate wire and end-of-line devices to support its operation. 1) 4-state supervision – supports secure, alarm, short circuit and open circuit states. 2) 6-state supervision – supports secure, alarm, short or open circuit for the sensor in addition to tamper alarm and tamper short circuit states. u. Enclosures and Power Supplies 1) Electronic circuits supplied shall be mounted on standoffs inside the manufacturer- supplied enclosures. These enclosures must include a key lock on a removable hinged door, and must include a tamper switch to detect when the door is opened. 2) Electronic circuits supplied for the access control system, shall be powered by 18- 20VAC through supplied 120VAC to 20VAC molded case, fully insulated isolating transformers. The transformer shall be mountable inside the supplied enclosure or inside a separately mounted enclosure with lock and tamper switch. PART 2 - PRODUCTS 2.01 GENERAL A. The product section herein contains lists of acceptable products based either on a prior approved proprietary product or a manufacturer’s product, and identifies the functional requirements of that system component. Products that have not been identified as proprietary allow for “AS EQUAL” products. B. The Access Control Manufacturer shall be in business for no less than 15 years manufacturing Access Control Software and non-proprietary Panels. Manufacturers whose main business is not of Access Control Software and Panels will not be allowed. C. The Access Control System Manufacturer must provide detailed information regarding their cybersecurity practices and hardening of Access Control Systems. Unacceptable cybersecurity practices by a manufacturer is grounds for dismissal of the manufacturer and product. D. All products shall have UL Listing that is clearly marked on the component. E. All product shall be new and unused, and shall have the latest software/firmware version that has been actively utilized in the field on a site for no less than two (2) year. No “X.0” versions shall be allowed. Access Control Software Versions require the Security Consultants approval. The Security Contractor is not to order any software versions without the approval of the Security Consultant. F. The Owner shall have the final decision regarding change in function or aesthetics. G. The Security Subcontractor shall work with, and coordinate with, the ADA Door operator vendor to ensure all inputs, outputs and devices required for access control function and integration with any Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 16 of 45 ADA paddle function have been included in the contract documents. These system components are required to be integrated for complete function to meet ADA requirements. H. The Security Subcontractor shall coordinate with and ensure that the DIV8 contract drawings include all required electrified doors locking hardware, conduit to the door, devices and electrified locking hardware required for access control function. I. The Security Subcontractor shall coordinate with the DIV8 Subcontractor and requirements for Fire System locking/unlocking function power per NFPA/the fire code. J. The Security Subcontractor shall program a minimum of twenty-five (25) groups in the new Access Control System. K. The Security Subcontractor shall provide a fully operational ID Badging System that will integrate and function with the Access Control System provided on the project. Software to be HID Fargo Asure ID 7 Express Model number 086512, Access Control Manufacturers Badging ID System Model OR EQUAL, with One-Year Protect Plan for HID Fargo Asure ID 7 Express Model number 086452, Access Control Manufacturers Badging ID System Model OR EQUAL. All licenses and software to be included as part of the contract. The ID Badging System shall include: 1. A dual-sided Card Printer; FA-52100 Fargo dual-sided DTC-4250e Card Printer OR EQUAL 2. A Digital Camera with tripod; Logitech, Canon PowerShot OR EQUAL 3. Color Ribbons/Cartridges to print 1,000 dual-sided Color Badges; Fargo 045100 YMCKO Full Panel Color Ribbon (quantity of four), 250 Prints OR EQUAL to reach 1,000 Color Dual-sided Card ID Prints 4. Cleaning Kits (quantity of two) for DTC-4250e; HID Fargo Part Number 086177 OR EQUAL 5. Four (4) Print Cleaning Pens 6. Ten (10) Cleaning Cards 7. The Badging ID System may be provided as a Kit or as individual components, and must function with the Access Control System on this project as part of the contract. 8. The Security Subcontractor provide all software to integrate the ID Badging Kit with the Access Control System and shall create the database and print the initial 400 Badges for the project as part of this contract. 9. The Badging ID System shall have a 3-year warranty that includes all parts and labor. 10. The Badging ID System shall meet all conditions with and shall be covered by the General Requirements as found in the Section 28 0000 ELECTRONIC SECURITY SYSTEMS GENERAL, and all requirements of 28 4000 TESTING, TRAINING, CLOSEOUT AND WARRANTY. L. The Security Subcontractor shall coordinate with the Architect and the Owner for the location of the ID Badging Kit. 2.02 ACCESS CONTROL SYSTEM A. The Access Control System shall be a networked system with field installed control units, and central file server, field devices and be connected by a high-speed data transmission Infrastructure. B. The Access Control System Software shall be Microsoft Windows Based (WIN10 or greater), with Multiuser and multitasking capabilities simultaneously or from different work stations locally or remotely. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 17 of 45 C. The Access Control System shall be the key central component for managing physical security access control, alarms, visitor management, and other functions provided through third party integrations as specified herein. D. The Access Control System shall provide a variety of integrated core functions and integrations to include: 1. Regulation of access and egress 2. Provision of identification credentials 3. Video management integration 4. Monitoring and managing alarms related to both access control and intrusion detection system 5. Notification of and response to panic alarms 6. Triggering thru outputs of special school functions such as lock down, shelter in place, evacuation or the like. 7. Visitor management E. Scalability 1. The ACS shall be capable of processing an unlimited number of credential readers, scalable from this single site to multiple sites, or the whole Dennis-Yarmouth School District at a later date. 2.03 ACCESS CONTROL SYSTEM SOFTWARE MANUFACTURERS A. Access Control System Software manufactured by: 1. Lenel Onguard, Software House Enterprise Level, S2, AMAG OR EQUAL 2.04 ACCESS CONTROL SYSTEM HARDWARE OVERALL DESCRIPTION A. Access Control System shall be database Server based with one or more networked workstations, with field controllers and field devices, connected by a high-speed electronic-data transmission network infrastructure. B. System Software running on a 64-bit, Microsoft Windows high speed processing and RAM(16 GB) central server hardware operating system and application software. Software shall have the following capabilities: 1. Multiuser and multitasking to allow for independent activities and monitoring to occur simultaneously at different workstations. 2. Graphical user interface to show pull-down menus and a menu-tree format that complies with interface guidelines of the operating system. 3. System license for the entire system including capability for future additions that are within the indicated system size limits specified in this Section. 4. Open-architecture system that allows importing and exporting of data and interfacing with other systems that are compatible with operating system. 5. Password-protected operator login and access. 6. Open-database-connectivity compliant. C. Network connecting the central station and workstations shall be a LAN using TCP/IP with a capacity of connecting multiple workstations. System shall be portable across multiple communication platforms without changing system software. 2.05 ACCESS CONTROL SYSTEM OPERATION Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 18 of 45 A. Access Control System shall use a single database for access-control and credential-creation functions. B. The Access Control System shall be a fully distributed processing system. 1. Access-control information, including time, date, valid codes, access levels, and similar data, shall be downloaded to controllers so each controller can make access-control decisions. 2. Intermediate controllers for access control are prohibited. 3. In the event that communications with the central controller are lost, controllers shall automatically buffer event transactions until communications are restored, at which time buffered events shall be uploaded to the central station. C. Number of Locations: 1. Support at least 32,000 separate Locations using a single workstation with combinations of direct-connect, or TCP/IP LAN connections to each Location. 2. Each Location shall have its own database and history in the central station. 3. Locations may be combined to share a common database. D. Data Capacity: 1. 130 different card-reader formats. 2. 999 comments. 3. 48 graphic file types for importing maps. E. Location Capacity: 1. 1024 reader-controlled doors. 2. 50,000 total-access credentials. 3. 2048 supervised alarm inputs. 4. 2048 programmable outputs. 5. 32,000 custom action messages per Location to instruct operator on action required when alarm is received. F. System Network Requirements: 1. System components shall be interconnected and shall provide automatic communication of status changes, commands, field-initiated interrupts, and other communications required for proper system operation. 2. Communication shall not require operator initiation or response and shall return to normal after partial- or total-network interruption such as power loss or transient upset. 3. System shall automatically annunciate communication failures to the operator and shall identify the communications link that has experienced a partial or total failure. 4. Communications controller may be used as an interface between the central- station display systems and the field device network. Communications controller shall provide functions required to attain the specified network communications performance. G. Central station shall provide operator interface, interaction, display, control, and dynamic and real- time monitoring. Central station shall control system networks to interconnect all system components, including workstations and field-installed controllers. H. Field equipment shall include controllers, sensors, and controls. 1. Controllers shall serve as an interface between the central station and sensors and controls. 2. Data exchange between the central station and the controllers shall include down-line transmission of commands, software, and databases to controllers. 3. The up-line data exchange from the controller to the central station shall include status data such as intrusion alarms, status reports, and entry- control records. 4. Controllers are classified as alarm-annunciation or entry-control type. I. System Response to Alarms: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 19 of 45 1. Field device network shall provide a system end-to-end response time of one second(s) or less for every device connected to the system. 2. Alarms shall be annunciated at the central station within one second of the alarm occurring at a controller or at a device controlled by a local controller, and within 100 ms if the alarm occurs at the central station. 3. Alarm and status changes shall be displayed within 100 ms after receipt of data by the central station. 4. All graphics shall be displayed, including graphics-generated map displays, on the console monitor within five seconds of alarm receipt at the security console. 5. This response time shall be maintained during system heavy load. J. The design of the central server station and controllers shall contain features to reduce false alarms. Equipment and software shall comply with SIA CP-01. K. Error Detection: 1. Use a cyclic code method to detect single- and double-bit errors, burst errors of eight bits or fewer, and at least 99 percent of all other multibit and burst errors between controllers and the central station. 2. Interactive or product error-detection codes alone will not be acceptable. 3. A message shall be in error if one bit is received incorrectly. 4. Retransmit messages with detected errors. 5. Allow for an operator-assigned two-digit decimal number to each communications link representing the number of retransmission attempts. 6. Central station shall print a communication failure alarm message when the number of consecutive retransmission attempts equals the assigned quantity. 7. Monitor the frequency of data transmission failure for display and logging. L. The Access Control System shall initiate an alarm in response to opening, closing, shorting, or grounding of data transmission lines. M. Door Hardware Interface shall comply with requirements in "Door Hardware” Specification Section or Division 8. N. Electrical characteristics of controllers shall match the signal and power requirements of door hardware. 2.06 ACCESS CONTROL SYSTEM SOFTWARE AND COMMUNICATIONS A. Shall function on a central database Server with control panels, and may be controlled with proper credentials on workstations with operating system and application software. 1. Access Control System Software shall be procured separate from server hardware. All security system hardware shall have the ability to be used with any non-proprietary software. B. Multiuser multitasking shall allow independent activities and monitoring to occur simultaneously at different workstations. C. Graphical user interface shall show pull-down menus and a menu-tree format. D. Capability for future additions within the indicated system size limits. E. Open architecture that allows importing and exporting of data and interfacing with other systems that are compatible with operating system, including SQL and Active Directory. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 20 of 45 F. Password-protected operator login and access. G. Peer Computer Control Software: Detect a failure of a central computer and cause the other central computer to assume control of all system functions without interruption of operation. Both central computers shall have drivers to support this mode of operation. H. Application Software: Interface between the alarm annunciation and entry-control controllers to monitor sensors, operate displays, report alarms, generate reports, and help train system operators. 1. Reside at the central station, workstations, and controllers as required to perform specified functions. 2. Operate and manage peripheral devices. 3. Manage files for disk I/O, including creating, deleting, and copying files; and automatically maintain a directory of all files, including size and location of each sequential and random- ordered record. 4. Import custom icons into graphics to represent alarms and I/O devices. 5. Globally link I/O so that any I/O can link to any other I/O within the same Location without requiring interaction with the host workstation. This operation shall be at the controller. 6. Globally code I/O links so that any access-granted event can link to any I/O with the same Location without requiring interaction with the host workstation. This operation shall be at the controller. 7. Messages from workstation to controllers and controllers to controllers shall be on a polled network that utilizes check summing and acknowledgment of each message. Communication shall be automatically verified, buffered, and retransmitted if message is not acknowledged. 8. Selectable poll frequency and message time-out settings shall handle bandwidth and latency issues for TCP/IP, RF, and other workstation-to- controller communications methods by changing the polling frequency and the amount of time the system waits for a response. 9. Automatic and encrypted backups for database and history backups shall be automatically stored at the central-control workstation and encrypted with a nine-character alphanumeric password that must be used to restore or read data contained in backup. 10. Operator audit trail for recording and reporting all changes made to database and system software. 11. Support network protocol and topology, TCP/IP, LAN/WAN, VLAN and RAS. I. Workstation Software: 1. Password levels shall be individually customized at each workstation to allow or disallow operator access to program functions for each Location. 2. Workstation event filtering shall allow user to define events and alarms that will be displayed at each workstation. If an alarm is unacknowledged (not handled by another workstation) for a preset amount of time, the alarm will automatically appear on the filtered workstation. J. Controller Software: 1. Controllers shall operate as autonomous, intelligent processing units. a. Controllers shall make decisions about access control, alarm monitoring, linking functions, and door-locking schedules for their operation, independent of other system components. b. Controllers shall be part of a fully distributed processing-control network. c. The portion of the database associated with a controller, and consisting of parameters, constraints, and the latest value or status of points connected to that controller, shall be maintained in the controller. 2. The following functions shall be fully implemented and operational within each controller: a. Monitoring inputs. b. Controlling outputs. c. Automatically reporting alarms to the central station. d. Reporting of sensor and output status to the central station on request. e. Maintaining real time, automatically updated by the central station at least once a day. f. Communicating with the central station. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 21 of 45 g. Executing controller resident programs. h. Diagnosing. i. Downloading and uploading data to and from the central station. 3. Controller Operations at a Location a. Up to 64 controllers connected to TIA 485-A communications loop. Globally operating I/O linking and anti-passback functions between controllers within the same Location without central-station or workstation intervention. Linking and anti-passback shall remain fully functional within the same Location even when the central station or workstations are off- line. b. In the event of communication failure between the central station and a Location, there shall be no degradation in operations at the controllers at that Location. Controllers at each Location shall be connected to a memory buffer with a capacity to store up to 10,000 events; there shall be no loss of transactions in system history files until the buffer overflows. c. Buffered events shall be handled in a first-in-first-out mode of operation. 4. Individual Controller Operation a. Controllers shall transmit alarms, status changes, and other data to the central station when communications circuits are operable. If communications are not available, controllers shall function in a stand-alone mode; operational data, including the status and alarm data normally transmitted to the central station, shall be stored for later transmission to the central station. Storage capacity for the latest 1024 events shall be provided at each controller. b. Card-reader ports of a controller shall be custom configurable for at least 120 different card-reader or keypad formats. Multiple reader or keypad formats may be used simultaneously at different controllers or within the same controller. c. Controllers shall provide a response to card readers or keypad entries in less than 0.25 seconds, regardless of system size. d. Controllers that are reset, or powered up from a nonpowered state, shall automatically request a parameter download and reboot to their proper working state. This shall happen without any operator intervention. e. Initial Startup: When controllers are brought on-line, database parameters shall be automatically downloaded to them. After initial download is completed, only database changes shall be downloaded to each controller. f. On failure for any reason, controllers shall perform an orderly shutdown and force controller outputs to a predetermined failure- mode state, consistent with the failure modes shown and the associated control device. g. After power is restored, following a power failure, startup software shall initiate self-test diagnostic routines, after which controllers shall resume normal operation. h. After controller failure, if the database and application software are no longer resident, controllers shall not restart but shall remain in the failure mode until repaired. If database and application programs are resident, controllers shall immediately resume operation. If not, software shall be restored automatically from the central station. 5. Communications Monitoring a. System shall monitor and report status of TIA 485-A communications loop of each Location. b. Communication status window shall display which controllers are currently communicating, a total count of missed polls since midnight, and which controller last missed a poll. c. Communication status window shall show the type of CPU, the type of I/O board, and the amount of RAM for each controller. 6. Operating systems shall include a real-time clock function that maintains seconds, minutes, hours, day, date, and month. The real-time clock shall be automatically synchronized with the central station at least once a day to plus or minus 10 seconds. The time synchronization shall be automatic, without operator action and without requiring system shutdown. K. Workstation-to-Controller Communications: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 22 of 45 1. Central-station or workstation communications shall use the following: a. TCP/IP LAN interface cards. 2. Direct serial, TCP/IP, and dial-up, cable, or satellite communications shall be alike in the monitoring or control of the system except for the connection that must first be made to a dial-up or voice-over IP Location. 3. TCP/IP network interface card (NIV) shall have an option to set the poll- frequency and message-response time-out settings. 4. Workstation-to-controller and controller-to-controller communications (direct, dial-up, or TCP/IP) shall use a polled-communication protocol that checks sum and acknowledges each message. All communications in this subparagraph shall be verified and buffered, and retransmitted if not acknowledged. L. Direct Serial or TCP/IP Workstation-to-Controller Communications: 1. Communication software on the workstation shall supervise the workstation- to-controller communications link. 2. Loss of communications to any controller shall result in an alarm at all workstations running the communication software. 3. When communications are restored, all buffered events shall automatically upload to the workstation, and any database changes shall be automatically sent to the controller. M. Controller-to-Controller Communications: 1. TIA 485-A, four-wire, point-to-point, regenerative (repeater) communications network methodology. 2. TIA 485-A communications signal shall be regenerated at each controller. N. Database Downloads: 1. All data transmissions from workstations to a Location, and between controllers at a Location, shall include a complete database checksum to check the integrity of the transmission. If the data checksum does not match, a full data download shall be automatically retransmitted. 2. If a controller is reset for any reason, it shall automatically request and receive a database download from the workstation. The download shall restore data stored at the controller to their normal working state and shall take place with no operator intervention. O. Operator Interface: 1. Inputs in system shall have two icon representations, one for the normal state and one for the abnormal state. 2. When viewing and controlling inputs, displayed icons shall automatically change to the proper icon to display the current system state in real time. Icons shall also display the input's state, whether armed or bypassed, and if the input is in the armed or bypassed state due to a time zone or a manual command. 3. Outputs in system shall have two icon representations, one for the secure (locked) state and one for the open (unlocked) state. 4. Icons displaying status of the I/O points shall be constantly updated to show their current real- time condition without prompting by the operator. 5. The operator shall be able to scroll the list of I/Os and press the appropriate toolbar button, or right click, to command the system to perform the desired function. 6. Graphic maps or drawings containing inputs, outputs, and override groups shall include the following: a. Database to import and store full-color maps or drawings and allow for input, output, and override group icons to be placed on maps. b. Maps to provide real-time display animation and allow for control of points assigned to them. c. System to allow inputs, outputs, and override groups to be placed on different maps. d. Software to allow changing the order or priority in which maps will be displayed. 7. Override Groups Containing I/Os Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 23 of 45 a. System shall incorporate override groups that provide the operator with the status and control over user-defined "sets" of I/Os with a single icon. b. Icon shall change automatically to show the live summary status of points in that group. c. Override group icon shall provide a method to manually control or set to time-zone points in the group. d. Override group icon shall allow the expanding of the group to show icons representing the live status for each point in the group, individual control over each point, and the ability to compress the individual icons back into one summary icon. 8. Schedule Overrides of I/Os and Override Groups a. To accommodate temporary schedule changes that do not fall within the holiday parameters, the operator shall have the ability to override schedules individually for each input, output, or override group. b. Each schedule shall be composed of a minimum of two dates with separate times for each date. c. The first time and date shall be assigned the override state that the point shall advance to when the time and date become current. d. The second time and date shall be assigned the state that the point shall return to when the time and date become current. 9. Copy command in database shall allow for like data to be copied and then edited for specific requirements, to reduce redundant data entry. P. Operator Access Control: 1. Control operator access to system controls through three password- protected operator levels. System operators and managers with appropriate password clearances shall be able to change operator levels for operators. 2. Three successive attempts by an operator to execute functions beyond their defined level during a 24-hour period shall initiate a software tamper alarm. 3. A minimum of 1024 unique user accounts shall be available with the system software. System shall display the operator's name or initials in the console's first field. System shall print the operator's name or initials, action, date, and time on the system printer at login and logoff. 4. The password shall not be displayed or printed. 5. Each password shall be definable and assignable for the following: a. Selected commands to be usable. b. Access to system software. c. Access to application software. d. Individual zones that are to be accessed. e. Access to database. Q. Operator Commands: 1. Command Input: Plain-language words and acronyms shall allow operators to use the system without extensive training or data-processing backgrounds. System prompts shall be a word, a phrase, or an acronym. 2. Command inputs shall be acknowledged and processing shall start in not less than one second(s). 3. Tasks that are executed by operator's commands shall include the following: a. Acknowledge Alarms: Used to acknowledge that the operator has observed the alarm message. b. Place Zone in Access: Used to remotely disable intrusion-alarm circuits emanating from a specific zone. System shall be structured so that console operator cannot disable tamper circuits. c. Place Zone in Secure: Used to remotely activate intrusion-alarm circuits emanating from a specific zone. d. System Test: Allows the operator to initiate a system-wide operational test. e. Zone Test: Allows the operator to initiate an operational test for a specific zone. f. Print reports. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 24 of 45 g. Change Operator: Used for changing operators. h. Security Lighting Controls: Allows the operator to remotely turn on or turn off security lights. i. Display Graphics: Used to show any graphic displays implemented in the system. Graphic displays shall be completed within 20 seconds from time of operator command. j. Run system tests. k. Generate and format reports. l. Request help with the system operation. 1) Include in main menus. 2) Provide unique, descriptive, context-sensitive help for selections and functions with the press of one function key. 3) Provide navigation to specific topic from within the first help window. 4) Help shall be accessible outside the application program. R. Entry-Control Commands 1. Lock (secure) or unlock (open) each controlled entry and exit up to ten times a day through time-zone programming. 2. Arm or disarm each monitored input up to two times a day through time-zone programming. 3. Enable or disable readers or keypads up to four times a day through time-zone programming. 4. Enable or disable cards or codes up to four times a day per entry point through access-level programming. 5. Command Input Errors: Show operator input assistance when a command cannot be executed because of operator input errors. Assistance screen shall use plain-language words and phrases to explain why the command cannot be executed. Error responses that require an operator to look up a code in a manual or other document are not acceptable. Conditions causing operator assistance messages include the following: a. Command entered is incorrect or incomplete. b. Operator is restricted from using that command. c. Command addresses a point that is disabled or out of service. d. Command addresses a point that does not exist. e. Command is outside the system's capacity. S. Alarms: 1. System Setup a. Assign manual and automatic responses to incoming-point status change or alarms. b. Automatically respond to input with a link to other inputs, outputs, or operator-response plans; unique sound with use of WAV files; and maps or images that graphically represent the point location. c. Sixty-character message field for each alarm. d. Operator-response-action messages shall allow message length of at least 65,000 characters, with database storage capacity of up to 32,000 messages. Setup shall assign messages to access point. e. Secondary messages shall be assignable by the operator for printing to provide further information and shall be editable by the operator. f. Allow 25 secondary messages with a field of four lines of 60 characters each. g. Store the most recent 1000 alarms for recall by the operator using the report generator. 2. Software Tamper a. Annunciate a tamper alarm when unauthorized changes to system database files are attempted. Three consecutive unsuccessful attempts to log onto system shall generate a software tamper alarm and lock out. b. Annunciate a software tamper alarm when an operator or other individual makes three consecutive unsuccessful attempts to invoke functions beyond the authorization level. c. Maintain a transcript file of the last 5000 commands entered at each central station server to serve as an audit trail. System shall not allow write access to system transcript files by any person, regardless of their authorization level. d. Allow only acknowledgment of software tamper alarms. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 25 of 45 3. Read access to system transcript files shall be reserved for operators with the highest password authorization level available in system. 4. Animated Response Graphics: Highlight alarms with flashing icons on graphic maps; display and constantly update the current status of alarm inputs and outputs in real time through animated icons. 5. Multimedia Alarm Annunciation: WAV files to be associated with alarm events for audio annunciation or instructions. 6. Alarm Handling: Each input may be configured so that an alarm cannot be cleared unless it has returned to normal, with options of requiring the operator to enter a comment about disposition of alarm. Allow operator to silence alarm sound when alarm is acknowledged. 7. Alarm Automation Interface: High-level interface to central-station alarm automation software systems. Allows input alarms to be passed to and handled by automation systems in the same manner as burglar alarms, using a TIA 232-F ASCII interface. 8. CCTV Alarm Interface: Allow commands to be sent to CCTV systems during alarms (or input change of state) through serial ports. 9. Camera Control: Provides operator ability to select and control cameras from graphic maps. T. Alarm Monitoring: Monitor sensors, controllers, and DPS circuits and notify operators of an alarm condition. Display higher-priority alarms first and, within alarm priorities, display the oldest unacknowledged alarm first. Operator acknowledgment of one alarm shall not be considered acknowledgment of other alarms nor shall it inhibit reporting of subsequent alarms. 1. Displayed alarm data shall include type of alarm, location of alarm, and secondary alarm messages. 2. Printed alarm data shall include type of alarm, location of alarm, date and time (to nearest second) of occurrence, and operator responses. 3. Maps shall automatically display the alarm condition for each input assigned to that map if that option is selected for that input location. 4. Alarms initiate a status of "pending" and require the following two handling steps by operators: a. First Operator Step: "Acknowledged." This action shall silence sounds associated with the alarm. The alarm remains in the system "Acknowledged" but "Un-Resolved." b. Second Operator Step: Operators enter the resolution or operator comment, giving the disposition of the alarm event. The alarm shall then clear. c. System must provide means of notification, verification and acknowledgement. 5. Each workstation shall display the total pending alarms and total unresolved alarms. 6. Each alarm point shall be programmable to disallow the resolution of alarms until the alarm point has returned to its normal state. 7. Alarms shall transmit to the central station in real time except for allowing connection time for dial-up locations. 8. Alarms shall be displayed and managed from a minimum of four different windows. a. Input Status Window: Overlay status icon with a large red blinking icon. Selecting the icon will acknowledge the alarm. b. History Log Transaction Window: Display name, time, and date in red text. Selecting red text will acknowledge the alarm. c. Alarm Log Transaction Window: Display name, time, and date in red. Selecting red text will acknowledge the alarm. d. Graphic Map Display: Display a steady colored icon representing each alarm input location. Change icon to flashing red when the alarm occurs. Change icon from flashing red to steady red when the alarm is acknowledged. 9. Once an alarm is acknowledged, the operator shall be prompted to enter comments about the nature of the alarm and actions taken. Operator's comments may be manually entered or selected from a programmed predefined list, or a combination of both. 10. For locations where there are regular alarm occurrences, provide programmed comments. Selecting that comment shall clear the alarm. 11. The time and name of the operator who acknowledged and resolved the alarm shall be recorded in the database. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 26 of 45 12. Identical alarms from the same alarm point shall be acknowledged at the same time the operator acknowledges the first alarm. Identical alarms shall be resolved when the first alarm is resolved. 13. Alarm functions shall have priority over downloading, retrieving, and updating database from workstations and controllers. 14. When a reader-controlled output (relay) is opened, the corresponding alarm point shall be automatically bypassed. U. Monitor Display: Display text and graphic maps that include zone status integrated into the display. Colors are used for the various components and current data. Colors shall be uniform throughout the system. 1. Color Code a. FLASHING RED: Alerts operator that a zone has gone into an alarm or that primary power has failed. b. STEADY RED: Alerts operator that a zone is in alarm and alarm has been acknowledged. c. YELLOW: Advises operator that a zone is in access. d. GREEN: Indicates that a zone is secure and that power is on. 2. Graphics a. Support 32,000 graphic display maps and allow import of maps from a minimum of 16 standard formats from another drawing or graphics program. b. Allow I/O to be placed on graphic maps by the drag-and-drop method. c. Operators shall be able to view the inputs, outputs, and the point's name by moving the mouse cursor over the point on the graphic map. d. Inputs or outputs may be placed on multiple graphic maps. The operator shall be able to toggle to view graphic maps associated with I/Os. e. Each graphic map shall have a display-order sequence number associated with it to provide a predetermined order when toggled to different views. f. Camera icons shall have the ability to be placed on graphic maps that, when selected by an operator, will open a video window, display the camera associated with that icon, and provide pan-tilt-zoom control. g. Input, output, or camera placed on a map shall allow the ability to arm or bypass an input, open or secure an output, or control the pan- tilt-zoom function of the selected camera. V. System test software enables operators to initiate a test of the entire system or of a particular portion of the system. 1. Test Report: The results of each test shall be stored for future display or printout. The report shall document the operational status of system components. W. Report-Generator Software: Include commands to generate reports for displaying, printing, and storing on disk and tape. Reports shall be stored by type, date, and time. Report printing shall be the lowest-priority activity. Report-generation mode shall be operator selectable but set up initially as periodic, automatic, or on request. Include time and date printed and the name of operator generating the report. Report formats may be configured by operators. 1. Automatic Printing: Setup shall specify, modify, or inhibit the report to be generated; the time the initial report is to be generated; the time interval between reports; the end of the period; and the default printer. 2. Printing on Request: An operator may request a printout of any report. 3. Alarm Reports: Reporting shall be automatic as initially set up. Include alarms recorded by system over the selected time and information about the type of alarm (such as door alarm, intrusion alarm, tamper alarm, etc.) the type of sensor, the location, the time, and the action taken. 4. Access and Secure Reports: Document zones placed in access, the time placed in access, and the time placed in secure mode. 5. Custom Reports: Reports tailored to exact requirements of who, what, when, and where. As an option, custom report formats may be stored for future printing. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 27 of 45 6. Automatic History Reports: Named, saved, and scheduled for automatic generation. 7. Cardholder Reports: Include data, or selected parts of the data, as well as the ability to be sorted by name, card number, imprinted number, or by any of the user-defined fields. 8. Cardholder by Reader Reports: Based on who has access to a specific reader or group of readers by selecting the readers from a list. 9. Cardholder by Access-Level Reports: Display everyone that has been assigned to the specified access level. 10. Muster Report (attendance) a. Emergency Muster Report: One-click operation on toolbar launches report. b. Cardholder Report. Contain a count of persons who are "In" at a selected Location and a detailed listing of name, date, and time of last use, sorted by the last reader used or by the group assignment. 11. Panel Labels Reports: Printout of control-panel field documentation including the actual location of equipment, programming parameters, and wiring identification. Maintain system installation data within system database so that data are available on-site at all times. 12. Activity and Alarm On-Line Printing: Activity printers for use at workstations; prints all events, or alarms only. 13. History Reports: Custom reports that allow the operator to select any date, time, event type, device, output, input, operator, Location, name, or cardholder to be included or excluded from the report. Proper credentials required to set up. a. Initially store history on the hard disk of the host workstation. b. Permit viewing of the history on workstations or print history to any system printer. c. The report shall be definable by a range of dates and times with the ability to have a daily start and stop time over a given date range. d. Each report shall depict the date, time, event type, event description, and device; or I/O name, cardholder group assignment, and cardholder name or code number. e. Each line of a printed report shall be numbered to ensure that the integrity of the report has not been compromised. f. Total number of lines of the report shall be given at the end of the report. If the report is run for a single event such as "Alarms," the total shall reflect how many alarms occurred during that period. g. Reports shall have the following four options: h. View on screen. i. Print to system printer. Include automatic print spooling and "Print To" options if more than one printer is connected to the system. j. "Save to File" with full path statement. k. System shall have the ability to produce a report indicating status of system inputs and outputs or of inputs and outputs that are abnormal, out of time zone, manually overridden, not reporting, or in alarm. 14. Custom Code List Subroutine: Allow the access codes of system to be sorted and printed according to the following criteria: a. Active, inactive, or future activate or deactivate. b. Code number, name, or imprinted card number. c. Group, Location access levels. d. Start and stop code range. e. Codes that have not been used since a selectable number of days. f. In, out, or either status. g. Codes with trace designation. 15. The reports of system database shall allow options so that every data field may be printed. 16. The reports of system database shall be constructed so that the actual position of the printed data shall closely match the position of the data on the data-entry windows. X. Anti-Passback: 1. System shall have global and local anti-passback features, selectable by Location. System shall support hard and soft anti-passback. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 28 of 45 2. Hard Anti-Passback: Once a credential holder is granted access through a reader with one type of designation (IN or OUT), the credential holder may not pass through that type of reader designation until the credential holder passes through a reader of opposite designation. 3. Soft Anti-Passback: Should a violation of the proper IN or OUT sequence occur, access shall be granted, but a unique alarm shall be transmitted to the control station, reporting the credential holder and the door involved in the violation. A separate report may be run on this event. 4. Timed Anti-Passback: A controller capability that prevents an access code from being used twice at the same device (door) within a user-defined amount of time. 5. Provide four separate zones per Location that can operate without requiring interaction with the host workstation (done at controller). Each reader shall be assignable to one or all four anti- passback zones. In addition, each anti- passback reader can be further designated as "Hard," "Soft," or "Timed" in each of the four anti-passback zones. The four anti-passback zones shall operate independently. 6. The anti-passback schemes shall be definable for each individual door. 7. The Master Access Level shall override anti-passback. 8. System shall have the ability to forgive (or reset) an individual credential holder or the entire credential-holder population anti-passback status to a neutral status. Y. Visitor Assignment: 1. Provide for and allow an operator to be restricted to only working with visitors. The visitor badging subsystem shall assign credentials and enroll visitors. Allow only those access levels that have been designated as approved for visitors. 2. Provide an automated log of visitor name, time and doors accessed, and name of person contacted. 3. Allow a visitor designation to be assigned to a credential holder. 4. Security access system shall be able to restrict the access levels that may be assigned to credentials issued to visitors. 5. Allow operator to recall visitors' credential-holder file once a visitor is enrolled in the system. 6. The operator may designate any reader as one that deactivates the credential after use at that reader. The history log shall show the return of the credential. 7. System shall have the ability to use the visitor designation in searches and reports. Reports shall be able to print all or any visitor activity. Z. Time and Attendance: 1. Time and attendance reporting shall be provided to match IN and OUT reads and display cumulative time in for each day and cumulative time in for length designated in the report. 2. Shall be provided to match IN and OUT reads and display cumulative time in for each day and cumulative time in for length designated in the report. 3. System software setup shall allow designation of selected access-control readers as time and attendance hardware to gather the clock-in and clock- out times of the users at these readers. a. Reports shall show in and out times for each day, total time in for each day, and a total time in for period specified by the user. b. Allow the operator to view and print the reports or save the reports to a file. c. Alphabetically sort reports on the person's last name, by Location or location group. Include all credential holders or optionally select individual credential holders for the report. AA. Database management functions that allow operators to add, delete, and modify access data as needed. 1. The enrollment station shall not have alarm response or acknowledgment functions. 2. Provide multiple, password-protected access levels. Database management and modification functions shall require a higher operator access level than personnel enrollment functions. 3. The program shall provide means to disable the enrollment station when it is unattended, to prevent unauthorized use. 4. The program shall provide a method to enter personnel identifying information into the entry- control database files through enrollment stations. In the case of personnel identity-verification Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 29 of 45 subsystems, this shall include biometric data. Allow entry of personnel identifying information into the system database using menu selections and data fields. The data field names shall be customized during setup to suit user and site needs. Personnel identity-verification subsystems selected for use with the system shall fully support the enrollment function and shall be compatible with the entry-control database files. 5. Cardholder Data: Provide 99 user-defined fields. System shall have the ability to run searches and reports using any combination of these fields. Each user-defined field shall be configurable, using any combination of the following features: a. MASK: Determines a specific format with which data must comply. b. REQUIRED: Operator is required to enter data into field before saving. c. UNIQUE: Data entered must be unique. d. DEACTIVATE DATE: Data entered shall be evaluated as an additional deactivate date for all cards assigned to this cardholder. e. NAME ID: Data entered shall be considered a unique ID for the cardholder. 6. Personnel Search Engine: A report generator with capabilities such as search by last name, first name, group, or any predetermined user-defined data field; by codes not used in definable number of days; by skills; or by seven other methods. 7. Multiple Deactivate Dates for Cards: User-defined fields to be configured as additional stop dates to deactivate any cards assigned to the cardholder. 8. Batch card printing. 9. Default card data can be programmed to speed data entry for sites where most card data are similar. BB. Enhanced ASCII File Import Utility: Allows the importing of cardholder data and images. 1. Card Expire Function: Allows readers to be configured to deactivate cards when a card is used at selected devices. 2.07 ACCESS CONTROL SYSTEM DATABASE A. Database and database management software shall define and modify each point in database using operator commands. Definition shall include parameters and constraints associated with each system device. B. Database Operations: 1. System data management shall be in a hierarchical menu-tree format, with navigation through expandable menu branches and manipulated with use of menus and icons in a main menu and system toolbar. 2. Navigational Aids: a. Toolbar icons for add, delete, copy, print, capture image, activate, deactivate, and muster report. b. Point and click feature to facilitate data manipulation. c. Next and previous command buttons visible when editing database fields to facilitate navigation from one record to the next. d. Copy command and copy tool in the toolbar to copy data from one record to create a new similar record. 3. Data entry shall be automatically checked for duplicate and illegal data and shall be verified for valid format. 4. System shall generate a memo or note field for each item that is stored in database, allowing the storing of information about any defining characteristics of the item. Memo field is used for noting the purpose for which the item was entered, reasons for changes that were made, and the like. C. File Management: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 30 of 45 1. File management shall include database backup and restoration system, allowing selection of storage media, including 3.5-inch floppy disk, Zip and Jaz drives, and designated network resources. 2. Operations shall be both manual and automatic modes. The number of automatic sequential backups before the oldest backup will be overwritten; FIFO mode shall be operator selectable. 3. Backup program shall provide manual operation from any workstation on the LAN and shall operate while system remains operational. D. Operator Passwords: 1. Support up to [32,000] <Insert number> individual system operators, each with a unique password. 2. Twelve to thirty-two alphanumeric characters 3. Allow passwords to be case sensitive. 4. Passwords shall not be displayed when entered. 5. Passwords shall have unique and customizable password profile and allow several operators to share a password profile. Include the following features in the password profile: a. Predetermine the highest-level password profile for access to all functions and areas of program. b. Allow or disallow operator access to any program operation, including the functions of View, Add, Edit, and Delete. c. Restrict doors to which an operator can assign access. 6. Operators shall use a username and password to log on to system. This username and password shall be used to access database areas and programs as determined by the associated profile. 7. Make provision to allow the operator to log off without fully exiting program. User may be logged off, but program will remain running while displaying the login window for the next operator. E. Access Card/Code Operation and Management: Access authorization shall be by card, by a manually entered code (PIN), or by a combination of both (card plus PIN). 1. Access authorization shall verify the facility code first, the card or card-and- PIN validation second, and the access level (time of day, day of week, date), anti-passback status, and number of uses last. 2. Use data-entry windows to view, edit, and issue access levels. Access- authorization entry- management system shall maintain and coordinate all access levels to prevent duplication or the incorrect creation of levels. 3. Allow assignment of multiple cards/codes to a cardholder. 4. Allow assignment of up to four access levels for each Location to a cardholder. Each access level may contain any combination of doors. 5. Each door may be assigned four time zones. 6. Access codes may be up to 11 digits in length. 7. Software shall allow the grouping of locations so cardholder data can be shared by all locations in the group. 8. Visitor Access: Issue a visitor badge for data tracking or photo ID purposes without assigning that person a card or code. 9. Cardholder Tracing: Allow for selection of cardholder for tracing. Make a special audible and visible annunciation at control station when a selected card or code is used at a designated code reader. Annunciation shall include an automatic display of the cardholder image. 10. Allow each cardholder to be given either an unlimited number of uses or a number from one to 9999 that regulates the number of times the card can be used before it is automatically deactivated. 11. Provide for cards and codes to be activated and deactivated manually or automatically by date. Provide for multiple deactivate dates to be preprogrammed. F. Security Access Integration: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 31 of 45 1. Photo ID badging and photo verification shall use the same database as the security access and may query data from cardholder, group, and other personal information to build a custom ID badge. 2. Automatic or manual image recall and manual access based on photo verification shall also be a means of access verification and entry. 3. System shall allow sorting of cardholders together by group or other characteristic for a fast and efficient method of reporting on, and enabling or disabling, cards or codes. G. Key control and tracking shall be an integrated function of cardholder data. 1. Provide the ability to store information about which conventional metal keys are issued and to whom, along with key construction information. 2. Reports shall be designed to list everyone who possesses a specified key. H. Facility Codes: System shall accommodate up to 2048 facility codes per Location, with the option of allowing facility codes to work at all doors or only at particular doors. I. Operator Comments: 1. With the press of one appropriate button on the toolbar, the user shall be permitted to enter operator comments into the history at any time. 2. Automatic prompting of operator comment shall occur before the resolution of each alarm. 3. Operator comments shall be recorded by time, date, and operator number. 4. Comments shall be sorted and viewed through reports and history. 5. The operator may enter comments in two ways; either or both may be used: a. Manually entered through keyboard data entry (typed), up to 65,000 characters per each alarm. b. Predefined and stored in database for retrieval on request. 6. System shall have a minimum of 999 predefined operator comments with up to 30 characters per comment. J. Group: 1. Group names may be used to sort cardholders into groups that allow the operator to determine the tenant, vendor, contractor, department, division, or any other designation of a group to which the person belongs. 2. System software shall have the capacity to assign one of 32,000 group names to an access authorization. 3. Make provision in software to deactivate and reactivate all access authorizations assigned to a particular group. 4. Allow sorting of history reports and code list printouts by group name. 5. The Dennis-Yarmouth Intermediate Middle School shall have a minimum of twenty-five (25) Groups to be programmed as part of this contract. K. Time Zones: 1. Each zone consists of a start and stop time for seven days of the week and three holiday schedules. A time zone is assigned to inputs, outputs, or access levels to determine when an input shall automatically arm or disarm, when an output automatically opens or secures, or when access authorization assigned to an access level will be denied or granted. 2. Up to four time zones may be assigned to inputs and outputs to allow up to four arm or disarm periods per day or four lock or unlock periods per day; up to three holiday override schedules may be assigned to a time zone. 3. Data-entry window shall display a dynamically linked bar graph showing active and inactive times for each day and holiday, as start and stop times are entered or edited. 4. System shall have the capacity for 2048 time zones for each Location. L. Holidays: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 32 of 45 1. Three different holiday schedules may be assigned to a time zone. Holiday schedule consists of date in format MM/DD/YYYY and a description. When the holiday date matches the current date of the time zone, the holiday schedule replaces the time-zone schedule for that 24-hour period. 2. System shall have the capacity for 32,000 holidays. 3. Three separate holiday schedules may be applied to a time zone. 4. Holidays have an option to be designated as occurring on the designated date each year. These holidays remain in the system and will not be purged. 5. Holidays not designated to occur each year shall be automatically purged from the database after the date expires. M. Access Levels: 1. System shall allow for the creation of up to 32,000 access levels. 2. One level shall be predefined as the Master Access Level. The Master Access Level shall work at all doors at all times and override any anti-passback. 3. System shall allow for access to be restricted to any area by reader and by time. Access levels shall determine when and where an Identifier is authorized. 4. System shall be able to create multiple door and time-zone combinations under the same access level so that an Identifier may be valid during different time periods at different readers even if the readers are on the same controller. N. User-Defined Fields: 1. System shall provide a minimum of 99 user-defined fields, each with up to 50 characters, for specific information about each credential holder. 2. System shall accommodate a title for each field; field length shall be 20 characters. 3. A "Required" option may be applied to each user-defined field that, when selected, forces the operator to enter data in the user-defined field before the credential can be saved. 4. A "Unique" option may be applied to each user-defined field that, when selected, will not allow duplicate data from different credential holders to be entered. 5. Data format option may be assigned to each user-defined field that will require the data to be entered with certain character types in specific spots in the field entry window. 6. A user-defined field, if selected, will define the field as a deactivate date. The selection shall automatically cause the data to be formatted with the windows MM/DD/YYYY date format. The credential of the holder will be deactivated on that date. 7. A search function shall allow any one user-defined field or combination of user-defined fields to be searched to find the appropriate cardholder. The search function shall include a search for a character string. 8. System shall have the ability to print cardholders based on and organized by the user-defined fields. O. Code Tracing: 1. System shall perform code tracing selectable by cardholder and by reader. 2. Any code may be designated as a "traced code" with no limit to how many codes can be traced. 3. Any reader may be designated as a "trace reader" with no limit to which or how many readers can be used for code tracing. 4. When a traced code is used at a trace reader, the access-granted message that usually appears on the monitor window of the central station shall be highlighted with a different color than regular messages. A short singular beep shall occur at the same time the highlighted message is displayed on the window. 5. The traced cardholder image (if image exists) shall appear on workstations when used at a trace reader. 2.08 ACCESS CONTROL SYSTEM ARCHITECTURE Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 33 of 45 A. The system shall be Open Architecture. The Access Control System shall support an ‘open architecture’ allowing for additional support of products outside of the manufacturer’s options. NO PROPRIETARY SYSTEMS HARDWARE ALLOWED. 1. ACS shall support hardware that is non-proprietary such that other vendors could readily offer support for these devices. Access Control Panels that are only supported by a single ACS provider shall not be acceptable. 2. The ACS shall, when possible, leverage open or industry standards for device and system design. B. System Topology 1. The ACS shall include a central or distributed server component for managing security and any associated integrations. a. The ACS server shall function as an application server for connectivity of workstation based or browser-based clients for support of configuration and management. 2. An input or output linkage feature shall allow linking of input points to output control points. 3. Tasks shall be accessible from compatible client workstations on the network utilizing any of the following: a. Traditional client-server architecture, using either Windows clients or browser clients for common day-to-day tasks. b. Support for federated system architecture (multi-server, multi-database) where the ACS supports the expansion of the system architecture and allows for user deployment based upon their system architectural needs c. Centralized distribution (publishing) of applications using Windows Terminal Server and Citrix® on Windows, UNIX, Linux or Apple Macintosh based systems through any compatible internet browsers and/or by means of a mobile computing platform or mobile device. 4. Redundancy: (as specified) a. A Primary Server shall be the main server that is in use when the ACS is operating under normal conditions, and the ACS shall mirror its database information to a Backup/Secondary Server (as specified.) b. Field hardware shall be configured for both the Primary Server and the Backup Server, which shall each recognize the same TCP/IP ISC address on the network. c. Upon sensing Primary Server failure, the Backup Server shall automatically initiate itself as the Primary Server and shall begin communication with the Field Hardware. 1) Frequency of check for Primary Server failure: 5 seconds 2) Resynchronization time upon Primary Service restoration: 5 minutes maximum 5. Disk Mirroring (as specified) - This configuration shall allow data to be stored on dual hard disks running simultaneously. 6. RAID Level 10 (as specified) - The ACS shall offer a Fault Tolerant Redundant Array of Independent Disks Level 10 (RAID Level 10) with a hot standby disk. 7. Redundant components: disk storage, controller channels, high efficiency power supplies 8. Distributed Intelligence - In the event ACS communications is lost or the database server fails, Intelligent System Controllers shall provide complete control, operation and supervision of the system’s monitoring and control points. a. Should the downtime exceed the capacity of the Field Hardware buffer and events are overwritten, an alarm shall appear in the Alarm Monitoring Window notifying the System Operator that events were overwritten. 2.09 CENTRAL HARDWARE AND WORKSTATIONS A. Standard computer workstation of modular design. No small form factor workstations allowed, all work stations to be standard form factor for expansion capabilities. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 34 of 45 B. Desktop Workstations: 1. Dell, HP, Lenovo or Security Consultant approved agnostic equal. 2. Performance Requirements: a. Performance requirements may dictate equipment exceeding minimum requirements indicated. b. Microsoft Windows 10 Minimum, with 64-bit processor c. Processor – Dual i7 processors minimum d. RAM 1) 16 GB Required upgradable to 32 in current chassis e. Primary Hard Drive 1) DDR4 2) Number of Hard Drives: Two. 3) Capacity: 512 GB. 4) Type: M.2 f. Second Hard Drive 1) DDR4 2) Number of Hard Drives: Two. 3) Capacity: 512 GB. 4) Type: M.2 g. Optical Drive 1) Type: DVD +/-RW 2) Reading Formats: Data, audio, recordable, DVD and rewritable. h. Video Card 1) Capable of supporting two monitors. 2) Resolution: 3840x2160 pixels minimum for each monitor. 3) RAM: 16 GB. 4) Controller Speed: 1.25 TFLOPS 5) On-Board Memory Data Width: 96 BB/s. i. Sound Card 1) High-resolution 16-bit stereo digital audio recording and playback with user-selectable sample rates up to 48,000 Hz. j. Network Interface Card: Include card with connection, as applicable. 1) DUAL 10-100-1000 base TX Ethernet with RJ45 connector port. k. Optical Modem: Full duplex link for connection to optical fiber cable provided. l. I/O Ports 1) Two USB 3.0 ports on front panel, six on back panel, and three internal on motherboard. 2) One serial port. 3) One parallel port. 4) Two PS/2 ports. 5) One RJ-45. 6) One stereo line-in and line-out on back panel. 7) One microphone and headphone connector on front panel. 8) One IEEE 1394 on front and back panel with workstation I-e card. 9) One ESATA port on back panel. m. Battery: Life of at least three years to maintain system clock/calendar and ROM, as a minimum. 3. Keyboard a. Ergometric Microsoft Keyboard OR EQUAL. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 35 of 45 b. Full upper- and lowercase ASCII keyset, numeric keypad, dedicated cursor control keypad, and 12 programmable function keys. c. Wireless operation within up to 72 inches in front of workstation. 4. Pointing Device a. Two- or three-button ergonomic mouse. b. Wireless operation. 5. Flat Panel Display Monitor a. Number of Displays: Two. b. Display Support: Individual tilt adjustable base c. Color display with 27 diagonal viewable area. d. Aspect Ratio: 16 to 9. e. Resolution: 3840-2160 pixels at 60 Hz with pixel size of 0.277 mm or smaller. f. Digital input signal. g. Dynamic Contrast Ratio: 50000 to 1 h. Brightness: 250 cd/sq. m i. Energy Star compliant. j. Antiglare display. 6. Speakers a. Two, with individual controls for volume, bass and treble. b. Signal to Noise Ratio: At least 65 dB. c. Power: At least 4 W per speaker/channel. d. Magnetic shielding to prevent distortion on the video monitor. 7. I/O Cabling: Include applicable cabling to connect I/O devices. C. Servers: 1. Description: x86 based computer used for client-server computing. 2. Manufacturers: Dell, HP, Lenovo OR EQUAL. 3. Mounting: Rack. 4. Power: dual power supply, minimum 300 W. 5. Performance Requirements a. Performance requirements may dictate equipment exceeding minimum requirements indicated. b. Energy Star compliant. 6. Processor a. Minimum Speed: 3.7 Ghz, b. Cores: Dual. c. Series: Core i7. 7. RAM a. Capacity: 32 GB b. Speed and Type: 2666 MGz, DDR4 c. Expandable Capacity: 32 GB. 8. Redundant Array of Independent Disks: Five configuration. 9. Drive Bays: 4 at 2.5 inches or four at 3.5 inches (90 mm). 10. Hard Drives: Solid state. 11. Hard-Drive Storage: Four drives each with 1 TB storage capable. 12. Network Interface: Dual port Gigabit Ethernet. 13. DVD +RW Drive. 14. Color, flat-screen display with 27 diagonal viewable area. 15. Keyboard and mouse. 16. Servers shall include the following: a. Full-feature backup server (server and backup minimum requirement). b. Software licenses. c. Cable installation between server(s) and network. 17. Web Server Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 36 of 45 a. If required to be separate, include Web server hardware and software to match, except backup server is not required. b. Firewalls between server Web and networks. c. Password protection for access to server from Web server. d. Cable installation between the server(s) and building Ethernet network. 18. Power each server through a UPS unit. D. Printers: 1. Color Laser Printer a. Dell, Canon, HP or owner approved equal. b. 1200 by 1200 dots per inch resolution black and white, 1200 by 1200 value dots per inch resolution black and white and color. c. First sheet printed within 10 seconds. d. 25 page per minute rated print speed at best quality mode. e. Complies with Energy Star requirements. f. Capable of handling letter- and legal-size paper and overhead transparencies. g. Two-sided printing. h. At least 500 page toner/cartridge capacity. E. Inter-site Communications 1. The ACS shall support a distributed system (application and database) installation to support geographical or logical separation and management of installations while maintaining a centralized system for reporting. a. Each distributed system shall support operation of the local clients and hardware, and provide configuration, event, and transactional events to the central system. b. The ACS shall use a message architecture to transfer necessary incremental credential data from one site to another. This architecture shall provide data queuing, guaranteed delivery, and secure transmission of this data. F. External Interaction of Data 1. The ACS shall be able to connect to and interface bi-directionally with external data sources utilizing the following methods: a. ASCII with support for XML formatted text exchange b. Real-time exchange of data via Active Directory or LDAP c. Software Application Programming Interface (API) G. Database - The ACS shall utilize a single supported relational database. 1. Acceptable databases: Microsoft SQL, Oracle 2. Acceptable operating systems: Microsoft Windows Servers 2019 or for Clients Workstations WIN10. 3. Protection of ‘Data at Rest’ within the database shall be provided via SQL Transparent data encryption (TDE) and shall be supported to perform real-time I/O encryption and decryption of the database and database log files. 4. The ACS database server shall support an unlimited number of cardholders and visitors limited by the available memory, storage, and processing of the devices. The ACS database server shall support an unlimited number of system events and System Operator transactions in the history file limited only by available hard disk space. The ACS database server shall support an unlimited number of system events and System Operator transactions in the history file limited only by available hard disk space. 5. The ACS shall support bi-directional data interface to external databases in real-time or in a batch mode basis. a. The ACS shall support a one-step download and distribution process of cardholder and security information from the external database to the ACS database and through the system to Intelligent System Controller (ISC) databases. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 37 of 45 b. If a required communication path is broken, the data shall be stored in a temporary queue and shall be automatically downloaded once the communication path is restored. H. Security 1. Each page in the cardholder record shall be permission protected. 2. Each field in the database shall be permission protected. 3. Communication throughout the ACS shall be AES encrypted, using TLS where practical. 4. All cardholder PIN codes within the system shall be encrypted. I. A Network Account Management Module shall integrate ACS cardholders with external user network accounts, allowing System Administrators to perform a set of administrative tasks in Windows domains from the System Administration Module, and to create a link between physical access control and logical domains. J. The ACS shall allow, through standard API toolkits, System Administrators to expose specific ACS data and events that are relevant to IT information or other third-party systems or to allow, System Administrators to accept and process information exposed from the IT information or other third-party systems. 2.10 ACCESS CONTROL SYSTEM INTEGRATION REQUIREMENTS A. The Electronic Access Control (ACS) shall be the key central component for managing physical security. The system shall provide a variety of integrated functions including access control, alarm monitoring, intrusion detection, visitor management and video as described herein. B. Manufacturer Capabilities 1. Advanced Services - The ACS Manufacturer shall have an in-house Advanced Services group available to contract for: a. Professional engineering services to include on-site or remote advanced support, enterprise planning and advanced deployments, system design, supporting software tools, database migrations and conversions, emergency service, system assessments. b. Remote Management and Embedded Services to include project management and coordination, contract management, VAR coordination, and Manufacturer resource coordination c. Custom applications and reports. 2. 3rd Party Product Certification Program a. The ACS Manufacturer shall have a Partner Program that allows other products to develop interfaces to the Security Platform. b. Third-party integrations shall have been certified by ACS Manufacturer personnel c. Each new revision or version of the third-party system shall be subject to recertification. 3. Interfaces developed shall be tested and certified by the ACS Manufacturer for each new version of product released. The Certification Program shall have integrations which include, as a minimum, Command and Control, Key Management, Fire Detection, Intrusion, Elevator and Critical Communication products, and the capability to integrate with other security and non- security products, as desired by the customer. C. License 1. The ACS shall only require a single license key to be present on the database server for the ACS to operate. a. A license key on the database server shall determine the number of client workstations that shall be able to connect to the ACS and access its functionality. b. The license key shall either be a physical device or a software license key. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 38 of 45 c. License keys shall not be required at the client workstations. 2. The ACS shall allow the ACS user the ability to activate, return, or repair the software license key. 3. The software license shall only be used on a physical computer or in a VMware virtual environment. D. Scalability 1. The ACS shall be capable of processing an unlimited number of credential readers, scalable from single site to multiple sites. E. Database 1. The ACS shall be based upon one or more independent secure SQL database instances, one of which has been designated as the system master. F. The ACS shall provide a variety of integrated core functions to include: 1. Regulation of access and egress 2. Provision of identification credentials 3. Video management as needed 4. Monitoring and managing alarms related to both access control and intrusion 5. Visitor management as needed 6. Video Intercom and Emergency Phones as needed. G. Integrations – The ACS shall employ a RESTful, Web Services API to enable the integration of select third party products and functions with the core functions of the ACS. H. User Interface 1. The ACS shall provide access to licensed and installed applications through a common browser-based launcher application that can invoke various components and modules of the ACS from a single location, with users able to customize, rearrange, and retain configurations. a. This launcher shall offer Single Sign On and enable launch of both Windows and browser clients. 2.11 ACCESS CONTROL SYSTEM FIELD HARDWARE A. The ACS shall allow for a Windows-based configuration of the following types of field devices which participate in the access control function: 1. Intelligent System Controllers (ISC’s) 2. Input Control Modules (ICM’s) 3. Output Control Modules (OCM’s) 4. Access card readers and related field devices 5. External audible and visible field devices for school incident response functions. B. The ACS shall provide a device discovery utility to aid in configuration. 1. Scope: local subnet or multiple subnets 2. Display categories: brand, discovery service, device status, device type 3. Available functions: ping, reboot, default password check, version discovery, launch device web server, save credentials, update IP address a. When a field hardware device is configured, the device shall appear in a graphical system overview tree and be available in drop down lists which support operator access. b. The ACS shall have the ability for bulk add, modify, and delete privileges for ISCs and card readers to allow for the ease of addition and maintenance of themes. c. The System Administrator shall have the ability to group field devices into monitor zones. d. System status update frequency shall be configurable. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 39 of 45 2.12 CARD READERS AND CARDS A. Manufacturers: HID Global OR EQUAL B. Non-Contact Multi-Technology Key Pad Readers 1. All Project Card Readers to be Keypad Readers with ability to program school function codes such as Lock down, Shelter in Place or Evacuation. 2. Multi-Technology Reader: Multi-technology contactless reader shall read access control data from both 125 kHz and 13.56 MHz contactless smart cards and be NFC-compatible. The multi- technology contactless reader shall be optimally designed for use in access control applications that require reading both 125 kHz Proximity and 13.56 MHz contactless smart cards meeting the following requirements: a. Secure access control data exchange between the smart card and the reader utilizing diversified keys and mutual authentication sequences. b. Optimal read range and read speed for increased access control throughput. c. Suitable for both indoor and outdoor applications. d. Customizable behavior for indicator lights and beeper. e. Multi-technology contactless reader shall comply with the ISO 14443 13.56MHz-related standard. f. Configurable to read data from any compatible 125 kHz technology simultaneously with 13.56 MHz data. g. Provide the ability to read card access data stored in the secure access control sector/application area of the ISO 14443 XceedID MIFARE or MIFARE DESFire EV1 card. h. Open Supervised Device Protocol (OSDP) compliant. i. Configurable to provide compatibility with all standard Proximity formats up to 37 bits (including Corporate 1000®). j. Reader firmware may be upgraded in the field without the need to remove the reader from the wall through the use of factory-provided device. k. Compliant with the SIA AC-01 Wiegand standard. l. Reader shall provide the ability to transmit an alarm signal via an integrated optical tamper switch if an attempt is made to remove the reader from the wall. m. Reader electronics shall be enclosed in a full potted assembly, and provided with a quick connect wire harness. 3. Audio/visual indications shall include: a. An audio beeper shall provide tone sequence to signify: access granted, access denied, power up, and diagnostics. b. A light bar shall provide clear visual status (red/green/amber). 4. Multi-technology contactless reader shall be designed for low current operation to enable migration from most legacy proximity applications without the need to replace existing access control panels and/or power supplies. Contactless smart card power requirements shall be: a. Operating voltage: 5 – 16 VDC, reverse voltage protected. Current requirements: 160 mA DC, 195 mA PEAK @ 12 VDC b. Multi-technology contactless reader shall meet the following physical specifications: c. Color: Black, Gray, Brown or Cream as approved by the project architect. d. Weatherized design suitable to withstand harsh environments e. Certified rating of IP65 f. The Keypad shall be an integral part of the reader assembly. g. The reader shall have an approximate read range of .5”-1.2” when used with the compatible access card. h. Provide Weather Kit when mounting outside. 5. HID multiclass RPK40 OR EQUAL C. Access Control Cards 1. Proximity Cards or Key Fobs: Use proximity detection without physical contact with the reader for proper operation. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 40 of 45 2. Allow entry-control card to be modified by lamination or direct print process during the enrollment process for use as a picture and identification badge without reduction of readability. The design shall allow for the addition of at least one slot or hole to accommodate the attachment of a clip for affixing the credential card to the type of badge holder used at the site. 3. Card Size and Dimensional Stability: Standard size, 2-1/8 by 3-3/8 inches dimensionally stable so that an undamaged card with deformations resulting from normal use shall be readable by the card reader. 4. Card Material: Abrasion resistant, nonflammable, and nontoxic; and impervious to solar radiation and effects of ultraviolet light. 5. Card Durability and Maintainability: Designed and constructed to yield a useful lifetime of at least five years minimum. Allow credential cards to be cleaned by wiping with a sponge or cloth wetted with soap and water. 6. Access Control Cards require both 125 kHz Proximity and 13.56 MHz contactless smart cards meeting the following requirements: a. Compatible with the existing district HID 125kHz proximity identification media. b. Compatible with Secure Mifare and DesFire identification media, including the Configuration allows reader to be enabled to read smart, proximity or both technologies at the same time. c. Secure access control data exchange between the smart card and the reader utilizing diversified keys and mutual authentication sequences. 7. Security Subcontractor to provide 400 Access Control Cards. 2.13 DOOR POSITION SWITCH A. Door Position Switches shall be furnished and installed by the Security Contractor. The Security Contractor shall align, prepare and fabricate doors and frames to accept specified door position switches. The Security Contractor shall be responsible for coordinating the installation so systems and hardware operate as specified. B. Security Contractor shall coordinate all access control hardware equipment and installation so as to maintain the Fire Rating of each specific door to the satisfaction of the local Authority Having Jurisdiction. C. All Door Position Switches to be Double Pole Double Throw (DPDT) and report to both the Access Control System and the Intrusion Detection System. D. Surface Mounted Door Switch: Interlogix Model 2505-A-06 or approved equal Surface Mounted Magnetic Switch with armored cable. Route armored cable to junction box and permanently secure to box with clamp or set-screws. Use only where flush mounted devices cannot be installed. E. Flush Mounted Door Switch: Interlogix Model 1076D-N (DPDT) or approved equal. Flush Mounted Magnetic Switch with armored cable. F. Overhead Door Switch: Interlogix Model 2202AU-L or approved equal. Floor-mount Magnetic Contact for Overhead Doors, Universal Magnet, 3 in. Gap Size, Closed Loop, Includes 18 in. Stainless Steel Armored Cable. G. Gates and Roll-Up Doors: Interlogix Model 2205-A, 2205-AU, 2507A series with armored cable. H. Slide Gates: Interlogix Model 2700 Series with appropriate mounting brackets and cable. I. Security Subcontractor to coordinate with DIV 8 locking hardware Subcontractor, as some door contact and REX are provided in lockset. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 41 of 45 2.14 REQUEST TO EXIT DEVICES A. Request-to-Exit Exit Device: 1. Request-to-exit (RX) infrared motion sensors for detecting authorized exits through card reader- controlled doors as indicated in the Contract Documents. 2. For doors equipped with electromagnetic locks, activation of the RX motion sensor shall release the electric locking mechanism and shall shunt the intrusion alarm output. Add pneumatic button where required by code for secondary activation. 3. For doors equipped with electric locking hardware that are free egress at all times, the RX motion sensor shall be on the secure side of the door. It shall also shunt the Intrusion Detection side of the systems. Integrate REX devices into ACS and IDS. 4. Request-to-exit device shall be PIR with an adjustable Detection Pattern. The Output contact shall be two (2) Form C relay contacts. It will be 12VAC/VDC to 30 VAC/VDC. The Request-to- Exit device shall be either mounted above the door frame or ceiling mounted. 5. Provide Bosch DS150, OR EQUAL. 2.15 ELECTRIFIED LOCKING HARDWARE A. Provided by Others (Division 8) 2.16 POWER AND POWER SUPPLIES A. Emergency Standby Power 1. Coordinate with the Electrical Contractor for Emergency Generator Circuits. B. Servers, Computers, Clients, and Other 120VAC Equipment: 1. Provide a UPS with sufficient time for power transfer where the respective buildings have an Emergency Power (EP) source. Where a building Emergency Power source is not available, provide sufficient UPS time to allow the system to run for a minimum of 1-Hour, plus (15) minutes to manage the shutdown process. C. Low-Voltage Equipment: 1. ACS Remote Controllers, peripheral devices and Lock Power Supplies shall also have their own 4-hour battery back-up systems. 2. Power back-up may be in the form of direct DC battery power back-up or by 120VAC Uninterruptable Power Supplies (UPS), depending upon equipment requirements. D. Lock Power Supply 1. Provide Locknetics Series 500, Alarm Saf PS Series or equal UL Listed Class II central lock power supplies within a ventilated, locked cabinet and as required to provide proper system performance. Power supply shall include separate terminals for each door lock. Enclosure shall be equipped with a tamper switch, which shall be connected to the ACS to provide a supervisory alarm. 2. Power supply shall include separate terminals for each door lock. Power supply voltage shall be as required by the hardware supplied locks. 3. Capacity: The power supply shall be capable of powering 200 percent of the load required at the time of acceptance (100% spare capacity). 4. Power Monitoring: The system shall monitor the loss and restoration of power. Restoration of power shall be displayed at the console, but shall not require resetting of the system. 5. Battery Back-Up: Power supplies shall be equipped with integral battery recharging circuits and batteries. If a separate cabinet is used for batteries, the cabinet shall be locked and provided with a tamper switch connected to the ACS. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 42 of 45 a. Fail Safe Door Locks: Provide 4 hours of battery backup for low-voltage electrified door hardware. b. Fail-Secure Door Locks: Provide battery backup sufficient to operate fail-secure door locks 100 times per hour, for four hours. 6. Power supply output may be connected to a remote UL-approved distribution board of the same manufacturer mounted within the enclosure. 7. Transformers shall be installed in locked cabinets, protected by tamper switches. Plug-in transformers which are not protected by locked cabinets are not acceptable. 8. The system shall monitor the loss and restoration of power at the intelligent panels of both primary and secondary loss of power. Loss and restoration of power shall be displayed at the console, but shall not require resetting of the system. 9. Provide battery back-up to retain functions of all electronics for a period of four (4) hours upon loss of 120VAC power. 2.17 WIRE AND CABLE A. Security Subcontractor shall install all required wire and cable as per manufacturers requirements, and as indicated on contract documents. B. Security Subcontractor to coordinate with Division 26 Contractor for electronic security system field device conduit and backboxes, and building penetrations, coring and fire stopping. 2.18 ENCLOSURES A. All ACS Panels, Power Supplies and Batteries supplied shall be mounted inside the manufacturer- supplied or recommended enclosures. These enclosures shall be mounted on wall board in the appropriate Electric, IDF or MDF closet. These enclosures must include a key lock on a removable hinged door, and must include a tamper switch to detect when the door is left open. 1. Indoor enclosures shall be NEMA 2, hinged, locking cabinet by Hoffman or Owner approved equal, sized to fit contents. Lock shall be coordinated with the Owner allowing for replacement or rekeying by the Owner. 2. Outdoor enclosures shall be stainless steel, NEMA 4X, hinged, locking handle cabinet by Hoffman or Rittal, or equal, sized to fit contents. 3. All enclosures on the project to have door tamper switches and be wired into an alarm input. 2.19 MISCELLANEOUS A. Visitor Management System 1. Raptor Technologies K-12 Visitor Management System B. Mercury Panel Power Supplies Life Safety Power model number (8 Doors) FP0 150- B100C8D8PE6M. OR EQUAL, (16 Doors) FP0 150/250-2c82d8pe8m1 OR EQUAL C. In/output Modules 1. Mercury modules OR EQUAL D. Power Supplies 1. Life Safety Power OR EQUAL E. Back-up Battery 1. Simplex 2081-9288 OR EQUAL Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 43 of 45 F. Locking Hardware (Hardware provided by DIV8, will there be a requirement for anything special like Maglocks and extra pneumatic button) G. Back plane (Coordinate with General Contractor) H. Power circuitry and network jacks (Coordinate with Electrical Subcontractor) I. Exterior Visual Indicator Blue Lights/Strobe J. Special Equipment K. Infrastructure 2.20 OPEN ARCHITECTURE A. The ACS shall support an ‘open architecture’ allowing for additional support of products outside of the vendor proprietary options. 1. ACS shall support hardware that is non-proprietary such that other vendors could readily offer support for these devices. Access Control Panels that are only supported by a single ACS provider shall not be acceptable. 2. The ACS shall, when possible, leverage open or industry standards for device and system design. B. Access Control System Software shall be compatible with Genetec Video Management System OR EQUAL. Only Manufacturers whose main business is Access Control Systems Software. PART 3 - EXECUTION 3.01 GENERAL PROGRAMMING A. The Security Subcontractor shall request all required database information from the Owner no less than 60 days prior to the date of programming into the new Systems. B. The Security Subcontractor shall coordinate with the Owner all programming requirements for all standard and special conditions. C. The Security Subcontractor shall coordinate with Owners IT Department for all IP scheming, IP Addressing, Subnet masks, Nomenclature and required programming needs for Network compatibility. 3.02 SPECIAL CONDITIONS AND PROGRAMMING A. The Security Subcontractor shall program special conditions and trigger functions for: 1. Shelter in Place 2. Lock Down 3. Evacuation 4. Conditions for First Responders and Law Enforcement B. The Security Subcontractor shall program outputs to initiate the Amber Beacons on the perimeter of the building, and messaging thru the communications. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 44 of 45 1. The Security Subcontractor to provide inputs and outputs for audio and visual triggers to be initiated for warning of conditions. Coordinate with Fire Alarm Subcontractor for messaging. C. The Security Subcontractor shall coordinate with the School Administration and the Architect for all required functions, including know box control functions as needed. 3.03 ELECTRONIC SECURITY SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY A. See SECTION 28 4000 “ELECTRONIC SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY.” 3.04 IDENTIFICATION AND TAGGING A. Cables, wires, wiring forms, terminal blocks and terminals shall be identified by labels, tags or other permanent markings. The markings shall clearly indicate the function, source, or destination of all cabling, wiring and terminals. The wire-marking format contained in the shop drawings shall be utilized for all conductors installed under this Specification. All cables and wires shall be identified, utilizing heat-shrink, machine-printed, polyolefin wire markers. Hand written tags are not acceptable. B. All terminal points shall be appropriately identified and labeled as shown on shop drawings. C. All panels shall be provided with permanently attached engraved labels with identifying names and functions. Labels shall be consistent in form, color, and typeface throughout the system and all must contain the name of the system or subsystem as part of the label textual information. Design, color, font and layout shall be coordinated with, and approved by, the Owner. 3.05 DATABASE PREPARATION, CHECKING AND ACTIVATION A. Security Subcontractor shall provide the Owner with the appropriate request forms necessary to organize the system database inputs. Guidance shall also be provided to Owner’s IT personnel to insure their understanding of database format requirements and constraints. B. The Security Subcontractor to clearly identified on the Project Schedule, any database requirements so database preparation is accomplished in sufficient time to permit orderly and on time system activation. The forms and guidance shall be presented to the Owner no less than 60 days prior to scheduled central system activation. C. It shall be the responsibility of the Owner to ensure the accuracy of the database information entered on forms by thoroughly checking all completed data entry forms. D. It shall be the responsibility of Security Subcontractor to ensure that database formatting is correct prior to entry into the system and system activation. E. The Security Subcontractor shall be responsible for the initial database entry into the system prior to activation. This database entry may be manual and will be the responsibility if the Security Subcontractor. The database shall consist of users, hardware and function-related information, i.e., system configuration, cameras, alarm points, software parameters for system management, graphical maps and telephone entry system interfaces. A printout of the final database shall be provided to the Owner’s IT Department for review and approval prior to system activation. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 3 February 19, 2021 28 1000 Electronic Access Control 45 of 45 F. System activation shall be the responsibility of Security Subcontractor. Once the system and database have been demonstrated to be functioning properly according to manufacturer's guidelines and the system design, all further database entries and upgrades shall be the responsibility of the Owner’s IT Department after final close-out. 3.06 START-UP RESPONSIBILITY A. The Security Subcontractor shall initiate System Operation. Competent CERTIFIED start-up technicians shall be provided by the Security Subcontractor on each consecutive working day until the System is functional and ready to start the acceptance test phase. If in Architects judgment the Security Subcontractor is not demonstrating progress, the Security Subcontractor shall supply Manufacturer's factory technical representation and diagnostic equipment at no cost to Owner, until resolution of those defined problems. B. Properly ground each piece of electronic equipment prior to applying power. C. Properly ground all shielded wire shields to the appropriate earth ground at the hub end only, not at the remote or device end. Provide EOL resistors. D. Use a start-up sequence that incrementally brings each portion of the system on-line in a logical order that incorporates checking individual elements before proceeding to subsequent elements until the entire system is operational. 3.07 PRELIMINARY INSPECTION, TESTING AND COMMISSIONING A. The Security Subcontractor shall provide Preliminary Testing, Inspection, Acceptance Testing, Burn-In and Commissioning Performance services for systems and equipment. General Commissioning Requirements as found in General Conditions. 3.08 FINAL PROCEDURES A. Post Acceptance Work: 1. The Security Subcontractor shall return to the project site thirty (30) days after Acceptance of the Installation for a two (2) Hour retraining session as part of this contract. 2. Check, inspect and adjust systems, equipment, devices and components specified, programming updates, at the Owner’s convenience, approximately thirty (30) days after Acceptance of the Installation. 3.09 NOTICE OF COMPLETION A. When the performance and acceptance requirements described, including the Final Acceptance Test, have been satisfactorily completed, the General Contractor shall issue a Letter of Completion to Security Subcontractor indicating the date of such completion. B. The Notice of Completion shall be recorded by Security Subcontractor upon receipt of the General Contractor completion letter. This date of record shall be the start of the warranty period. END OF SECTION 28 1000 (THIS PAGE IS BLANK)