Security Monitoring Standards – V4.0 This document contains proprietary information, which is sole property of Monitoring & Control Centre with reference to CCTV Management and Operations Standards. V4.0
MCC 10/12/2015
Monitoring & Control Centre (MCC). All copyrights reserved. P.O. Box 114421 Abu Dhabi, United Arab Emirates
Security Monitoring Standards – V4.0/2015
Security monitoring Standards – Distributed by Abu Dhabi Monitoring and Control Center Document No.
0002
Version
4.0
Date of First Issue
April-2015
Date of Second Issue
Dec-2015
This Document is developed by Abu Dhabi Monitoring and control Centre (MCC). The document is submitted to recipient for their use only. By receiving this document the recipient undertakes full responsibility not to duplicate the document or disclose in part of, or the whole of, any of the information contained herein to any third party wi thout prior permission from the MCC.
Page | 1
Security Monitoring Standards – V4.0/2015
Security monitoring Standards – Distributed by Abu Dhabi Monitoring and Control Center Document No.
0002
Version
4.0
Date of First Issue
April-2015
Date of Second Issue
Dec-2015
This Document is developed by Abu Dhabi Monitoring and control Centre (MCC). The document is submitted to recipient for their use only. By receiving this document the recipient undertakes full responsibility not to duplicate the document or disclose in part of, or the whole of, any of the information contained herein to any third party wi thout prior permission from the MCC.
Page | 1
Security Monitoring Standards – V4.0/2015
Record of Changes Version:4.0 Section 6
Description Coverage Area with the level of Coverage
7.A
CCTV Installation Requirements
7.B
Cameras/Encoders
7.C
Network Switches/Firewall
7.D
Video Management System
7.E
Servers
7.F
Storage Units
7.K
Live Monitoring & Control Room Procedures
7.P
Pre-approved Manufacturers List
7.Q
System Integrator/Con I ntegrator/Contractor tractor Certification
8
Design, Approval and Integration Processes
9
Security System Inspection Requirements
Page | 2
Security Monitoring Standards – V4.0/2015
CONTENTS 1.
Introduction Intro duction and Overview Overvie w ................................... .................. ................................... ................................... ................................... ................................... ....................... ...... 5
2.
Abbreviations Abbrev iations ................................. ................ .................................. ................................... ................................... ................................... .................................... ............................. ........... 5
3.
Scope .................................. ................. ................................... ................................... ................................... ................................... ................................... ................................... ....................... ...... 6
4.
Confidentiality Confide ntiality ................................... .................. .................................. ................................... ................................... ................................... .................................... .......................... ........ 7
5.
Point of Contact Contac t ................................... .................. .................................. ................................... ................................... ................................... .................................... ....................... ..... 7
6.
Coverage Area with the level of Coverage. .................. ........................... .................. .................. .................. .................. ................... ................... .............. ..... 7
A. Hotels/Hotel Hotels/ Hotel Apartments/Sho Apartme nts/Shopping pping Malls ................................. ................ ................................... ................................... ................................ ............... 7 B. Commercial Commer cial & Residential Residen tial Buildings Building s ................................... ................. ................................... ................................... .................................... ....................... ..... 8 C. Government Department/Public Sector Buildings ................... ............................ .................. .................. .................. .................. ................ ....... 9 D. Mosques, Church & Temple ................................. ................ ................................... ................................... ................................... ................................... .................... ... 9 E. Educational Institutions & it’s transport ..................................................................................... transport ..................................................................................... 10 F. Private & Public Hospitals ................................. ................ ................................... ................................... ................................... ................................... ..................... .... 11 G. Men’s, ladies & children children clubs, Theme Parks, parks & other recreational areas ....................... ....................... 12 H. Liquor Retail Areas ................................... .................. ................................... ................................... ................................... ................................... .............................. ............. 12 I. Equestrian, Equestr ian, Shooting Shooti ng & Golf Clubs ................................... ................. ................................... ................................... .................................... ........................ ...... 13 J. Labor accommodation accommod ation Camps ................................... ................. ................................... ................................... .................................... .............................. ............ 14 K. Banks, Money Exchanges, Jewelry & other financial institutions institutions .................. ........................... .................. .................. ........... .. 14 L. Independent multi-level multi-level hyper hyper markets, super markets & departmental stores ........... .................... ........... .. 15 M. Museum, Stadium and Exhibition Ce nter ............. ...................... .................. .................. .................. .................. ................... ................... ............... ...... 15 N. Petrol Petro l filling stations ................................... .................. ................................... ................................... ................................... ................................... ........................... .......... 16 O. Bus/Taxi Bus/Ta xi & all public transport transpor t stands ................................... ................. ................................... .................................. ................................... .................... 16 P. Critical institutions like power plants & refineries.................. ........................... .................. .................. .................. .................. ................ ....... 17 Q. Warehouses and open/enclosed Storage Yards .......... ................... .................. ................... ................... .................. .................. ................. ........ 17 R. Individual Individua l Shops .................................. ................. .................................. ................................... ................................... ................................... .................................... .................. 18 S. Commercial Commer cial Transport Transpor t ................................... .................. ................................... ................................... ................................... ................................... ........................ ....... 18 7. Technical Techni cal Requirements Require ments .................................. ................. ................................... ................................... ................................... ................................... ........................... .......... 18 A. CCTV Installation Install ation Requirements Require ments ................................... ................. ................................... ................................... .................................... ........................... ......... 18 B. Cameras/Enco Camer as/Encoders* ders* ................................. ................ ................................... ................................... ................................... ................................... .............................. ............. 20 C. Network Networ k Switches/Firew Switche s/Firewall all .................................. ................. ................................... ................................... ................................... ................................... ................... 21 D. Video Management Managem ent System ................................. ................ ................................... ................................... ................................... ................................... ................... 22 E. Servers.............. Serve rs................................ ................................... .................................. ................................... ................................... ................................... ................................... ................... 24 F. Storage Stora ge Units ................................. ................ .................................. ................................... ................................... ................................... .................................... ........................ ...... 25 G. Alarm Logs .................................. ................. .................................. ................................... ................................... ................................... .................................... ........................... ......... 27 H. Availability Availabi lity & Maintenance Mainten ance .................................. ................. ................................... ................................... ................................... ................................... ................... 27 I. Power ................................... .................. ................................... ................................... ................................... ................................... ................................... ................................. ............... 28 J. Lighting Lightin g ................................. ................ ................................... ................................... .................................. ................................... .................................... ................................. ............... 29 K. Live Monitoring & Control Room Procedures ................. .......................... ................... ................... .................. .................. .................. .............. ..... 29 L. Documentation Docume ntation ................................... .................. .................................. ................................... ................................... ................................... .................................... .................. 31 M. 2D Maps (CCTV Layout Drawing) Drawin g) .................................. ................ ................................... ................................... .................................... ........................... ......... 31 N. Training ................................... .................. .................................. ................................... ................................... ................................... .................................... .............................. ............ 32 O. Signage ................................. ................ ................................... ................................... .................................. ................................... .................................... ................................. ............... 32 P. Pre-approved Manufacturers List ................... ............................ .................. .................. .................. .................. .................. .................. .................. ............. .... 32 Q. System Integrator/Contractor Certification ................. .......................... ................... ................... .................. .................. .................. ................. ........ 32 8. Design, Approval and and Integration Processes .................. ........................... .................. .................. .................. .................. ................... ................... ......... 33
Page | 3
Security Monitoring Standards – V4.0/2015
9.
Security System Inspection Requirements ............. ...................... .................. ................... ................... .................. .................. .................. ................. ........ 35
A. Requirements Requir ements ................................... .................. .................................. ................................... ................................... ................................... .................................... ..................... ... 35 B. Severity Sever ity Level ................................... .................. .................................. ................................... ................................... ................................... .................................... ..................... ... 36 10. Appendix A: Questionnaire/I Questionn aire/Informat nformation ion ................................... ................. ................................... .................................. ................................... .................... 37 A. B. C. D. E. F. G. H. 1. A. B. C. D. E. F. G. H.
Client General Gener al Information Informat ion .................................. ................. ................................... ................................... ................................... ................................... ................... 37 Client System Integrator Information ................... ............................ .................. .................. .................. .................. .................. .................. ................ ....... 38 Client Current CCTV System System Information (if any) .............. ........................ ................... .................. .................. .................. .................. ........... .. 38 Client Enhanced/New CCTV System Information Information ................. ........................... ................... .................. .................. .................. ................. ........ 39 Client Enhanced/New CCTV System Camera information (For all cameras) ................. .......................... ............. .... 40 Camera Details Table (On each floor CCTV layout drawing) drawing).................. ........................... ................... ................... .................. ......... 41 Project Proje ct Work Plan .................................. ................ ................................... .................................. ................................... ................................... ................................. ................ 41 Confidentiality Undertaking (Non-Disclosure (Non-Disclosure Agreement) ................... ............................ .................. .................. .................. ........... .. 42 Checklists/Register Logs templates .......... .................... ................... .................. .................. .................. .................. .................. .................. .................. ............. .... 44 Control Contro l room visitors visitor s Log .................................. ................. ................................... ................................... ................................... ................................... ..................... .... 44 CCTV Incident Incide nt Log .................................. ................ ................................... .................................. ................................... ................................... ................................. ................ 45 CCTV Maintenance Log / Fault Reports Log ................. .......................... ................... ................... .................. .................. .................. ................. ........ 46 Viewing Log of CCTV Images ................................... .................. .................................. ................................... .................................... ................................. ............... 46 Issued Copy of Image Log......................... Log........ ................................... .................................... ................................... ................................... .............................. ............ 48 Daily CCTV System Check Log ................................. ................ .................................. ................................... .................................... ................................. ............... 49 CCTV, Control room auditing checklist check list .................................. ................ ................................... .................................. ................................... .................... 50 Details Detai ls of Control Contro l room auditing .................................. ................ ................................... ................................... .................................... ........................... ......... 52
Page | 4
Security Monitoring Standards – V4.0/2015 1. Introduction and Overview
General
In order to increase the security and safety of UAE, Monitoring & Control Center – (here by “The Source”) has decided to request all Hotels, Hotel Apartments, Shopping Malls, Commercial & Residential Buildings, Government Department/Public Sector Buildings, Mosques/church/temple, Educational Institutions and its Transport, Private and Public Hospitals, Men’s; Ladies & Children’s Clubs, Theme Parks, Parks and other Recreational areas, Liquor retail areas, Restaurants, Equestrian; Shooting & Golf Clubs, Labor Accommodations & cities, Independent multi-level Hypermarkets, Supermarkets and departmental stores, Banks; Money Exchanges; Jewelry and other Financial Institutions, Museum; Stadiums and Exhibition Centers, Petrol filling stations, Bus/Taxi and public transport stands, Critical Institutions like Power plants & refineries and Warehouses & open/enclosed storage yards (hereby “The Client”) in the Emirates of Abu Dhabi to enhance their CCTV systems in order to meet the hereby described operational and technical requirements and to integrate them with the existing systems (as defined by The Source).
2. Abbreviations Term
Description
B&W
Black & White
CCAC
CCTV, Control room Auditing Checklist
CCSI
Current CCTV System Information
CCTV
Closed Circuit Television
CDT
Camera Details Table
CGI
Client General Information
CIL
CCTV Incident Log
CML
CCTV Maintenance/Fault Log
CSCL CVL DCA
CCTV System Check Log Control room visitors Log Details of Control room auditing
GPS HD HTTPS ICD ICIL
Global Positioning System High-Definition Hypertext Transfer Protocol Secure Interface Control Document Issued Copy of Image Log
IGMP
Internet Group Management Protocol
Term
Description
Page | 5
Security Monitoring Standards – V4.0/2015 LPR
License Plate Recognition
MCC
Monitoring & Control Center
MTU
Maximum Transmission Unit
NAS
Network-attached Storage
NCCI
Enhanced/New CCTV System Camera information
NCSI
Enhanced/New CCTV System Information
NDA
Non-Disclosure Agreement
NTP
Network Time Protocol
OA
Open Architecture
PIM
Protocol-Independent Multicast
POP
Point Of Presence
PWP
Project Work Plan
RAID
Redundant Array of Inexpensive Disks
RTP
Real-time Transport Protocol
SAN
Storage Area Network
SII
System Integrator Information
SL
Severity Level
SM
Sparse Mode
SMS
Security Monitoring Standards
UDP
User Datagram Protocol
UTM
Universal Transverse Mercator
VLC
Viewing Log of CCTV Images
VMS
Video Management System
WGS
World Geodetic System
3. Scope The purpose of this document is to define the requirements from the Client to enhance their CCTV systems, so they will be able to integrate them with Source systems. This document provides the following information:
Operational Concepts and Client Cameras Coverage
General and Technical Requirements
Availability and Maintenance of the system.
Design, Approval and Integration Processes
Security System Inspection requirements
Page | 6
Security Monitoring Standards – V4.0/2015 4. Confidentiality Client is kindly requested hereby, to keep this process and its related information restricted, and not to use, in any case or mean the information/designs/plans to any other purpose rather than the enhancement/design of their CCTV systems and to meet the Source requirements.
5. Point of Contact During the design and implementation process the Source, through their appointed authorized auditing consultant will answer Client questions and will review and approve the Client designs. Client can clarify the enquiries related to their CCTV System integration with the Source system to the following contact number 02 405 8888 and email
[email protected].
6. Coverage Area with the level of Coverage. The Source is requesting all the below mentioned Client’s to have fixed video coverage of following areas as per the appropriate coverage level mentioned.
A. Hotels/Hotel Apartments/Shopping Malls
All entrances and exits – indoor and outdoor. – (Identification Level)
Front desk/ Reception desk. – (Identification Level)
Full coverage of Lobby/entrance hall and Client service area such as kitchen (75% of coverage inside the kitchen), kitchen entrance door, laundry, housekeeping, etc. – (Recognition Level)
Full coverage of Client indoor & o utdoor parking passages areas. – (Recognition Level)
Full coverage of Elevators, lobbies, inside elevators, escalators, access staircases. – (Recognition
Level)
Full coverage of all floor corridors, public open areas which is inclusive of all shop entrances, ATM areas, loading areas. – (Recognition Level)
Full coverage of Emergency Doors/Exits – (Identification Level)
Full coverage of liquor retail selling area, Point of Sale, parking areas, liquor storage room, liquor warehouses inside and outside, loading/unloading areas, entrances/exits of liquor warehouses. – (Recognition Level)
Full coverage of Server/Equipment room and CCTV Monitoring room. – (Identification Level)
Page | 7
Security Monitoring Standards – V4.0/2015
Full coverage of Open Coffee shop/Fast food dining areas/phone booth, kids playing area. –
(Recognition Level)
Coverage at entrances of entertainment areas, such as spa/gym/swimming pool/ cinema/ play & game area/ball rooms/pre-function areas, etc. – (Recognition Level)
Coverage at entrances of restaurants (Full coverage required if restaurant is located in an open area)/dining area/bars, etc. – (Recognition Level)
Coverage at entrances of Public toilets. – (Detection Level)
Coverage at entrances of Conference Center/ meeting rooms/Client business center. –
(Recognition Level)
Coverage at entrances of Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Coverage at entrances of Bank/Exchange/Jewellery/ Mosque. – (Recognition Level)
General View of Swimming Pool water area/ kids pool area (Provision only).
Full coverage of adjacent parking/entrance lay-bay to client premises. – (Recognition Level)
Dedicated coverage at all entry/exit areas rear and front of each individual Villa/Chalet. – (Identification Level)
Dedicated coverage of Pathway/Side way of e ach individual Villa/Chalet. – (Recognition Level)
Full coverage of common pathway for Villa/Chalet area. – (Recognition Level)
Full coverage of common parking area for Villa/Chalet area. – (Recognition Level)
Full coverage of reception to Villa/Chalet are a. – (Identification Level)
Full coverage of perimeter to Villa/Chalet area. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
B. Commercial & Residential Buildings
Main entrances and exits – indoor and outdoor. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area – (Recognition Level)
Front desk/ Reception desk. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Page | 8
Security Monitoring Standards – V4.0/2015
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
C. Government Department/Public Sector Buildings
Main entrances and exits – indoor and outdoor. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area – (Recognition Level)
Front desk/ Reception desk/Counters. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of service areas/entrances/exits – (Recognition Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Coverage of Kitchen/Pantry’s – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
D. Mosques, Church & Temple
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of main Lobby /entrance hall – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Emergency Doors/Exits – (Identification Level)
Page | 9
Security Monitoring Standards – V4.0/2015
Coverage at entrances of Public toilets. – (Detection Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
E. Educational Institutions & it’s transport
Student Pick-up & Drop-off (Vehicle Number Plate, type and color of vehicle, passenger and overview of surrounding area). – (Recognition Level)
Landscape. – (Detection Level)
Main Entrance & Lobby/Reception Lobbies/ waiting area. – (Identification Level)
Front desk/ Reception desk/Counters. – (Identification Level)
Cashier. – (Identification Level)
Access points to all Institution buildings. – (Recognition Level)
Elevator lobbies in BOH, FOH and Car park where entry & exit from building is possible. –
(Recognition Level)
Circulation corridors on all floors. – (Recognition Level)
Emergency exits on all Institution buildings where entry & exit from building is possible. – (Identification Level)
Staircase on all floors. – (Recognition Level)
All canteen entries. – (Recognition Level)
Kitchen entry/exits. – (Recognition Level)
Canteen Dining Area. – (Recognition Level)
Food delivery and storage areas entry / exits/Cashier. – (Recognition Level)
Chemical Labs. – (Recognition Level)
Auditoriums / Ground / Play areas / Sports Hall / Swimming Pool. – (Recognition Level)
Entrances to Janitor room/ Toilets / Stores . – (Recognition Level)
Monitoring Room. – (Recognition Level)
Page | 10
Security Monitoring Standards – V4.0/2015
Corridors leading to Bathroom/Wash rooms. – (Recognition Level)
Full coverage inside the transport. – (Recognition Level)
Acknowledgment alarm to make sure all passengers has left from transport
Cameras inside the transport must be equipped with audio inputs and GPS
F. Private & Public Hospitals
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area – (Recognition Level)
Front desk/ Reception desk/Counters. – (Identification Level)
Full coverage of all corridors. – (Recognition Level)
Entrance of casualty. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Full coverage of patients/customer waiting area. – (Recognition Level)
Full coverage of Clinic entrances/laboratory entrances/exits – (Identification Level)
Full coverage of Operation theatre entrance & exits/ ICU entrances & exits/ In-patient ward entrances & exits – (Identification Level)
Full coverage of nursing station reception/visitor reception – (Identification Level)
Full coverage of In-patient wards corridors. – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of kitchen/pantry. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
Page | 11
Security Monitoring Standards – V4.0/2015 G. Men’s, ladies & children clubs, Theme Parks, parks & other recreational areas
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area – (Recognition Level)
Front desk/ Reception desk/Counters. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of all outdoor walkway. – (Recognition Level)
Coverage of ticket counters. – (Recognition Level)
Entrance to all indoor & outdoor game areas. – (Recognition Level)
Full coverage of refreshment area. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Coverage at entrances of Public toilets. – (Detection Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
H. Liquor Retail Areas
Full coverage of Liquor retail selling area – (Recognition Level)
Full coverage of Point of Sales – (Identification Level)
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of Liquor storage rooms – (Recognition Level)
Full coverage of Liquor warehouses inside and outside – (Recognition Level)
Full coverage of Loading/unloading areas – (Recognition Level)
Entrances/Exits of liquor warehouses – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Page | 12
Security Monitoring Standards – V4.0/2015 I.
Equestrian, Shooting & Golf Clubs
All entrances and exits - indoor and outdoor. – (Identification Level)
Front desk/ Reception desk/Counters. – (Identification Level)
Full coverage of Lobby/entrance hall/waiting area and Client service area such as kitchen (75% of coverage inside the kitchen), kitchen entrance door, laundry, housekeeping, etc. –
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of all floor corridors, public open areas which is inclusive of all shop entrances, ATM areas, loading areas. – (Recognition Level)
Coverage at entrances of Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Full coverage of Open Coffee Shop/Fast food dining areas/phone booth. – (Recognition Level)
Kids playing area. – (Recognition Level)
Coverage at entrances of entertainment areas, such as spa/gym/swimming pool/ cinema/ play & game area etc. – (Recognition Level)
Coverage at entrances of restaurants (Full coverage required if restaurant is located in an open area)/dining area/bars, etc. – (Recognition Level)
Coverage at entrances of Public toilets. – (Detection Level)
Coverage at all facilities such as Equestrian Club, Golf Club, Rugby club, shooting areas. –
(Recognition Level)
Coverage at entrances of Conference Center/ meeting rooms/Client business center. –
(Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
Page | 13
Security Monitoring Standards – V4.0/2015 J.
Labor accommodation Camps
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall/waiting area – (Recognition Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Full coverage of Perimeter – (Detection Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of kitchen/pantry. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Coverage at entrances of Public toilets. – (Detection Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
K. Banks, Money Exchanges, Jewelry & other financial institutions
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of cash counters – (Identification Level)
Full coverage of perimeter area – (Detection Level)
Full coverage of reception & customer waiting area. – (Identification Level)
Full coverage of service area. – (Recognition Level)
Full coverage of locker/safe rooms. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Full coverage of ATM counters – (Identification Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
Page | 14
Security Monitoring Standards – V4.0/2015 L. Independent multi-level hyper markets, super markets & departmental stores
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of point of sales. – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of ATM counters. – (Identification Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
M. Museum, Stadium and Exhibition Center
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of perimeter area. – (Detection Level)
Full coverage of main Lobby/Reception lobby/entrance hall/waiting area – (Recognition Level)
Front desk/ Reception desk/Counters. – (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Full coverage of ticket counters. – (Recognition Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of exhibition/public areas/stands/corridors – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Coverage at entrances of Public toilets. – (Detection Level)
Page | 15
Security Monitoring Standards – V4.0/2015
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
N. Petrol filling stations
Full coverage of petrol filling bay/ Vehicle service and washing areas. – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
O. Bus/Taxi & all public transport stands
Entry and Exit of station. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall – (Recognition Level)
Front desk/ Reception desk. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of Bus/Taxi bay. – (Recognition Level)
Full coverage of ticket counter & passenger waiting area. – (Recognition Level)
Full coverage of Bus service & petrol filling area. – (Recognition Level)
Full coverage of corridors & service areas. – (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Coverage at entrances of Public toilets. – (Detection Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
Page | 16
Security Monitoring Standards – V4.0/2015 P. Critical institutions like power plants & refineries
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of main Lobby/Reception lobby/entrance hall/waiting area – (Recognition Level)
Front desk/ Reception desk. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases. –
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. – (Recognition Level)
Full coverage of reception & service areas. – (Identification Level)
Full coverage of production & storage areas. – (Recognition Level)
Full coverage of perimeter. – (Detection Level)
Full coverage of loading/unloading docks & bays. – (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT room/HVAC/transformers rooms/Electrical room. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
Q. Warehouses and open/enclosed Storage Yards
All entrances and exits - indoor and outdoor. – (Identification Level)
Full coverage of loading/unloading docks & bays. – (Recognition Level)
General coverage of storage areas – (Detection Level)
Optional general coverage with thermal technology for volatile/inflammable materials storage areas. – (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver, passenger and overview of surrounding area). – (Identification Level)
Page | 17
Security Monitoring Standards – V4.0/2015 R. Individual Shops
All entrances and exits - indoor and outdoor. – (Identification Level)
Emergency Doors/Exits – (Identification Level)
Full coverage of point of sales. – (Recognition Level)
Full coverage of perimeter. – (Detection Level)
Full coverage of nearby parking areas. – (Recognition Level)
S. Commercial Transport a) Camera Coverage Requirement
Full Coverage of the driver’s cabin. – (Identification Level)
Full coverage of goods entry doors. – (Identification Level)
b) System Requirements
GPS system has to fixed for all c ommercial transport.
S No.
Surveillance Objective
Body Representation
Approximate Linear Resolution
Face Width
Camera Type recommended for coverage
1
Identification
120%
250 pixels/m
40 pixels
Full HD Camera with WDR above 120db
2
Recognition
50%
100 pixels/m
17 pixels
HD / cameras
3
Detection
10%
20 pixels/m
3 pixels
4 CIF cameras
Mega-pixel
7. Technical Requirements The Source is requesting Client to meet all the technical requirements mentioned below while designing and implementing the security system.
A. CCTV Installation Requirements The security systems design shall enable the security of the building to be monitored only in the Security
Page | 18
Security Monitoring Standards – V4.0/2015 Control Room and must have capability to integrate with third party systems in future such as BMS, Access Control, etc. The system shall be designed, engineered, furnished, delivered, installed and tested to ensure it is fully operating and free of engineering, installation, system operation and Original Equipment Manufacturer (OEM) defects that provide a "turnkey" solution. The Integrator must also be certified in installing and supporting the system equipment from which they are manufactured and supplied from. The system must support three types of recordings: motion, continuous and video analytic recording. Routine performance checks of the security system shall be the responsibility of the respective Client. A maintenance register shall be maintained to register all security equipment failure, with details on date & time of failure, type of failure, action taken, date of rectification, etc. All failures and intentional stoppage of the security system shall be reported to the Source/ authorized auditing consultant in writing. Cameras shall be installed in protective enclosures at locations and heights not easily accessible. Enclosures shall be rated to prevent ingress of dust, dirt, moisture and the likes that could affect the operation of the camera. Vandal proof housings shall be used for cameras installed at heights accessible to people. Outdoor camera enclosures shall be minimum IP66 rated with sun shroud. CCTV equipments shall be installed in lockable racks/cabinets in secure risers/rooms. Equipments installed outdoor, shall be rated for use in extreme UAE weather conditions. Properly rated outdoor enclosure shall be provided to house field power and transmission equipments. Outdoor enclosure shall be designed with sun shade and suitable cooling mechanism. Camera shall satisfy the recommended observation criteria defined for that camera location. Selection of camera location shall also consider factors such as lighting conditions, seasonal foliage obstructions, temporary or permanent man made obstructions; etc. All the cables used for CCTV system including copper, fiber and power cables shall be properly pulled, terminated, patched and labelled as per str uctured cabling standards. Client should create a dedicated administrator login credentials in all Security monitoring system components including cameras, servers, VMS, domain and network switches
Page | 19
Security Monitoring Standards – V4.0/2015 Approval from the Source/authorized auditing consultant is required for system design, CCTV layout drawings and material submittals before implementation phase.
B. Cameras/Encoders*
IP Cameras/Encoders shall be compliant with H.264 base encoding profile.
IP Cameras/Encoders shall be capable of multi-streams with its native resolution & FPS.
Live streams of IP Cameras/Encoders would be in native resolution/25-30 frames per second and the recording streams would be as per the requirements mentioned under storage units section.
Each camera/encoder channel must be configurable with single dedicated IP address.
IP cameras/encoders must support security feat ures like HTTPS and 802.1x standards.
The encoder/IP camera shall be able to automatically start streaming according to last known configuration when it is restarted/reset/rebooted.
Cameras must support resolution from 4CIF to Full HD.
Full HD quality day/night cameras with WDR above 120db and with backlight compensation should be required for the main areas as mentioned with identification level of coverage.
I-Frame rate shall be at least one I-Frame once in every 1-4 seconds.
FPS shall be selectable from 12 - 30 frames per second to allow proper video analytics of the stream.
Camera/Encoder streams shall be streamed as Transport RTP/UDP.
Cameras/Encoders/VMS must support multicast streaming and the multicast addresses will be defined by the Source.
IP cameras/Encoders shall not require having a heartbeat sent to video management system.
IP cameras/Encoders must support stamping on the live stream with camera location ID, date and time.
IP cameras/Encoders shall be synchronized to GPS time (NTP or similar based).
All the cameras shall be configured with unique name based on the location of coverage and camera names should not be repeated.
Page | 20
Security Monitoring Standards – V4.0/2015
All outdoor cameras shall be equipped with IR illuminators (capable to deliver color video image in low light condition as well) and field of view shall have appropriate background light to have clear picture quality during night.
Dedicated cameras at main point of entry & exit for all vehicles (Guest & Service vehicles) shall be capable of capturing the video images in following conditions
* Encoders
o
Day time
o
Twilight
o
Night time
o
Low Beam Head light
o
High Beam Head light
o
Headlights off (with Ambient lighting)
can be used for existing analog system by taking approval from the Source/ authorized
auditing consultant and should meet all the above technical requirements.
C. Network Switches/Firewall
Cameras/Encoders/VMS IP addressing shall be compatible with Source provided IP scheme and based on the Source/authorized auditing consultant provided scopes.
If the Client uses the Multicast routing, that routing shall be based on PIM-SM and IGMP snooping should be enabled in all edge switches.
Core Level switches (Layer 3) must be redundant in nature with two physical core switches (preferred one is a stackable solution (redundant stack cables) or a VSS enabled to effectively use the entire bandwidth) with dual uplinks from each edge switches.
Each individual Core Switch shall be equipped with dual power supplies and dual supervisor engines.
Dual network uplinks from the edge/distribution level to core level, between distribution level/core levels shall configured with Link aggregation/port channel to effectively use the entire bandwidth.
Page | 21
Security Monitoring Standards – V4.0/2015
Security systems would be installed in a dedicated network (network switches must be dedicated only for CCTV components).
The network switches must be capable to configure the MTU size and the same shall be configured according to the Source requirement which is 1300.
There should be four-core single mode fiber connectivity from equipment rack dedicated for integration to the Etisalat POP room.
Connectivity to Source’s premises will be provided by Firewall.
The Client responsibility is to purchase the Firewall according t o list provided by the Source.
The Firewall connection to the site’s Network is 1 GB copper wire.
Apart from the connectivity of Client network to Source network; there should not be any kind of network connectivity to any remote/public networks. All the activities not limited to monitoring/maintenance/updates/renewal/activation/trouble-shooting
would
be
done
onsite/offline.
The Firewall shall be defined as a default gateway for the VMS. In case this is unfeasible, VMS shall have a route defined to Source datacenter via above mentioned firewall.
The requested firewalls brands and models will be listed by the Source.
D. Video Management System
The VMS must support failsafe mode and by failsafe, the CCTV system must be equipped with fail over servers and in case if any recording server fails then VMS must be capable for automatic switch over of configuration from failed recording server to standby/failover recording server. Once the failed recording server comes online then the configuration should switch back over automatically. All these switch over must be without any loss in live monitoring and recording of cameras associated to that particular recording server.
VMS shall open platform and support ONVIF.
VMS must support Multicast streaming and external connection by a defined ICD (Interface Control Document).
VMS must allow connection to other systems threw an IP based WAN or LAN.
The VMS shall support providing a list of connected cameras to an external interface.
Page | 22
Security Monitoring Standards – V4.0/2015
The system shall support RTSP streaming, RTP transmission, parallel REAL TIME transition and transition of recorded replay.
The VMS shall have the ability to stream in REAL TIME the video of selected cameras/a group of cameras/the whole cameras configured to VMS .
The VMS shall have the ability to stream RECORDED channels of selected cameras/a group of cameras/the whole cameras configured to VMS.
The system shall allow selection of the required cameras to be transmitted based on the camera ID (Name, Identification….)
The system shall allow selection of the required cameras to be transmitted based on a defined time period (from [date], [hour], [min], to from [date], [hour], [min])
The system shall include the video metadata of the camer as in the video transmission: o
Location
o
Time stamp
o
Other recorded information
The Local CCTV system shall be synchronized to GPS time (NTP or similar based).
The broadcast process shall maintain the native cameras performance in domains of resolution, frame rate, colored / B&W).
The VMS vendors support for at least 5 years from the system commissioning, or, upgrading the system to the latest supported VMS version by the vendor.
The VMS system vendor shall use a standard tool for replay of the video, or shall provide the replay tool with its ICD.
The Vendor/Client shall supply the ICD, and Source will determine whether it complies with the OA. It if complies, Source will approve it.
The VMS shall support standard compression format H.264/MPEG-4 for the broadcast video or lossless conversion to a standard compression format.
The VMS should stream the video, in real time and recorded, in a standard non encrypted RTP/UDP protocol.
Minimum 5000+ camera models from different vendors shall be integrated and te sted.
The switch over of video streams (from failed recording server to fail-over server) during the failover instance & rebuilding of fail-over period recorded video data (if required) would
Page | 23
Security Monitoring Standards – V4.0/2015 complete within 30 seconds without any kind of interference on the accessibility of live and recording from the client workstation.
The VMS would not have any bottle-neck on system performance while recording and pushing the video streams to the storage device.
The VMS would not limit any stream profiles in the available compression generated by the camera.
The VMS operator client would not face any kind of latency/freezing in the sequence monitoring of the camera streams.
The VMS would provide time selection/highlighting in the motion detection period of playback.
The VMS servers shall have separate dual aggregated network uplinks for camera and storage networks.
System would support replications/clustering for the core database; if the system architecture is based on central database structure.
System would not have any single point of failure for any hardware/software components.
System would have the capability of integrated built-in modules for additional features like LPR and video analytics capabilities.
The VMS shall be capable to export/send the system logs to any centralized log server through the network via snmp traps/equivalent mechanism.
Installation references in the areas mentioned under MCC security monitoring standards coverage requirements
Availability of local technical support.
E. Servers
The servers must be equipped with dual processors, dual power supplies and minimum 10/1Gbps dual communication Uplinks to network without any single point of failure.
The servers designed must support failsafe by providing redundant/fail over servers for recording and management.
The CPU load of servers must not exceed an average of 70%.
Video server(s) should be able to process incoming streams with ease with 25% scaling capacity for future requirements.
Page | 24
Security Monitoring Standards – V4.0/2015
Hostname assigned to each recording/failover recording servers shall be unique (should not repeat) by incorporating the client establishment name.
There shall be redundant domain servers for client security monitoring system with more than 100 cameras.
F. Storage Units
The storage units must be equipped with dual Controllers, dual power supplies and dual network uplinks to NAS/SAN switches without any single point of failure.
The recording system should be a unified NAS/SAN with minimum RAID 5 or above configured.
The Client is required to record on their Storage Units all the Client channels (Cameras) for a period of days as mentioned in below mentioned table as follows:-
Educational Institutions:Motion based recording by considering 50% motion with following conditions:o
During Motion detected period all cameras record in native resolution at 12fps, h.264 codec at 30% compression.
o
During non-motion period all cameras record in native resolution at 3fps, h.264 codec at 30% compression.
All Other Clients:o
Continuous in native resolution/12 fps, H.264 codec @ 30% compression.
The hard disks required for recording must be e nterprise level one with minimum 7200 rpm.
If the storage system is Block Level/File level system (SAN/NAS) the following points should be implemented mandatorily. o
High availability should be provided from the controller/head unit to all its attached JBOD’s.
o
All the JBOD’s should be configured individually.
o
Consider one hot spare hard disk in e ach JBOD.
If the storage system is virtualized storage then a similar unit itself should be considered as hot spare to the system.
Sharing of storage LUN/drive/locations across different servers are not acceptable. Dedicated LUN/drive/locations shall be available to rec ording/failover servers.
Page | 25
Security Monitoring Standards – V4.0/2015
Maximum size of single storage LUN/drive/locations shall be limited to 20TB or as per the recommendation from VMS manufacturer.
Client Name
Retention Period
Hotels/ Hotel Apartments/Shopping Malls Commercial Buildings Banks, Money Exchanges, Jewellery & other financial institutions Independent multi-level hyper markets, super markets & departmental stores Men’s, Ladies & Children Clubs & Spa Gas Stations/petrol filling stations Warehouses & open/enclosed storage yards Private & Public Hospitals
180
Airports & Ports Labor Accommodation Camps Bus/Taxi & all public transport stands Museums and Exhibition Centre’s Critical institutions like Refineries & Power Plants Factories Clinics Liquor Retails Areas Government Department/Public Sector Buildings Stadiums 90 Sports Clubs (Equestrian, Shooting & Golf Clubs) University/Colleges/Schools Individual Shops 30 Grocery
Video servers and storage should be installed inside a dedicated lockable rack (hereafter CCTV Rack) with tamper-monitoring switch.
CCTV Racks should be placed in a separate lockable, well ventilated room. If CCTV Rack is placed in Monitoring Room, it has to be partitioned and proper cooling should be provided.
Page | 26
Security Monitoring Standards – V4.0/2015
For storage smaller than 50 TB, room must have Air Conditioning Unit and well ventilated and for systems with more than 100 TB Storage, room must have Close Control Unit (CCU) cooling.
G. Alarm Logs The System is required to keep a detailed log file and to se nd alerts in the following events:
Whenever the system dedicated cabinet for integration is opened (by means of a system cabinet tampering switch- an HW switch that indicate whenever the cabinet is Opened or Closed)
Loss of system communication
Loss of camera signal
System power down
The system logs should be available in a single log file for a period 90 days during Source inspection.
H. Availability & Maintenance The Client CCTV system and its integration with the Source systems should be available 24/7.In any case of problem; it should be fixed within one hour during day time, and three hours during evenings and weekends. The Client CCTV system needs to assure vendor/manufacturer availability to support it for a period of 5 years (from the system installation). In case of a major system malfunction or in case the Client is unable to operate the system for longer than the above mentioned time, the Client’s security manager is required to report this, in writing, to the Source/ authorized auditing consultant. In case Client requires any maintenance/configuration changes on CCTV system, the Client should inform the Source/ authorized auditing consultant and take prior approval by sending the detailed work schedule with task description.
Page | 27
Security Monitoring Standards – V4.0/2015 Respective Client shall have either trained in-house maintenance staffs or have a formal maintenance contract with companies (Local UAE companies) specialized in security systems maintenance. The maintenance contract shall include both on-call and preventive maintenance. A clearly defined preventive maintenance schedule shall be followed and maintenance reports and logs shall be maintained at all times. Routine performance checks of the security system shall be the responsibility of the Client. A maintenance register shall be maintained to register all security equipment failure, with details on date & time of failure, type of failure, action taken, date of rectification, etc. All failures and intentional stoppage of the security system shall be reported to Source/ authorized auditing consultant in writing. During the maintenance period if any failure happened for the storage system; the faulty Hard disks should be under the safe custody of Client. Hard disks would be taken out only with the written approval from the Source/ authorized auditing consultant and after proper formatting procedures. Maintenance report, contract and register shall be made available to the Source/ authorized auditing consultant. Quarterly maintenance shall include the following as minimum:
Inspection and confirmation on correct operation of all CCTV equipments including time synchronization of various security equipments, recording and storage
Periodic full system tests to evaluate performance and configuration
Inspection of field devices and cleaning of cameras, illuminators, etc.
Rectification and/or reporting of site conditions that may affect the original intended performance or purpose of the camera.
I.
Power
CCTV equipment’s including cameras shall be on essential supply with UPS backup of mini mum 30 minutes. 30 minutes backup is based on the condition that UPS is backed up Emergency power supply/ generator and the same will start within 10 minutes of the mains failure. If UPS is not backed up with Emergency power supply/ generator and for locations where the generator start up
Page | 28
Security Monitoring Standards – V4.0/2015 cannot be guaranteed or with no generator, a UPS with minimum 4 hours backup shall be provided.Power distribution for cameras shall be from secured locations (security risers & equipment rooms). If power outlets and power supplies are required near field devices, they shall be mounted in fully enclosed enclosures at heights not accessible to general public. External exposed wall mounted power outlets and/or power supplies are not acceptable. Cameras lightings shall be on UPS power.
J.
Lighting
Well maintained balanced lighting shall be available at areas within the camera’s field of view. Following site conditions shall be the key elements that drive the selection of camera, location and type additional illumination.
• Backlighting • Glare caused by excessive bright light falling on camera lens • Poor level of lighting or no lighting
The lighting in the cameras field of view shall enable the camera to give acceptable picture under all environmental and working conditions. The maximum to minimum illumination ratio available in the cameras field of view shall be better than 4:1. Cameras sensitivity and spectral response shall match the lighting source spectrum. Additional lighting shall be considered where camera picture quality is impaired due to the existing lighting conditions. The selection and positioning of visible or nonvisible lighting shall meet the safety requirements that prevent damage to eye. Light source shall be away from the camera and near to the object or area that is monitored by the camera.
K. Live Monitoring & Control Room Procedures The control room procedures would be implemented and maintained as following requirements. Security Control room with dedicated personnel shall be used for live monitoring of cameras (24 X 7); the operators will be trained for the daily operations and event response. Control room shall be operational to monitor the Client security System. The control room shall be ergonomically designed and shall be located in a secure area. Live monitoring of the Client security system is limited inside
Page | 29
Security Monitoring Standards – V4.0/2015 the dedicated control room; any extension of live monitoring would take prior approval from the Source/ authorized auditing consultant. The following display pattern is recommended:
Multiplexed view of max four cameras if 15” Monitor is used
Multiplexed view of max nine cameras if 17” – 21” Monitor are used
Multiplex view of max sixteen cameras if 25”- 32“Monitors are used.
Minimum one monitor is recommended for selective viewing of individual cameras.
The system which comprise of more than 300 cameras shall have display system with 48 – 55” minimum 6 to 12nos of full HD display monitors with capability to display a selected camera/view layout from any operator client to any monitor of display system Live monitoring shall be real time, 24 X 7 operational display system and of high resolution. The resolution of the monitors shall exceed the highest resolution camera used. The number of monitors in the control room will depend on the number of cameras. Access control system and log book must be maintained to record visits to Control Room. The control room shall be ergonomically designed and shall be located in a secure area (should not be shared with reception, lobbies, etc). Monitoring Stations (LCDs, PCs, PTZ joysticks, KVM switches, etc.) should be properly mounted / installed. Camera should be installed inside monitoring room to monitor activity inside. Dedicated security personnel with Police clearance shall be appointed for live monitoring of cameras. Security operators shall not be allowed to play back recorded images; only head of Client/security can have this privilege and should be logged in log book. Exporting to any media, taking photos/Screenshot is prohibited inside control room. Mobiles with cameras are not allowed inside control room. All control room activities must be logged in log book and should be available during inspection from Source/ authorized auditing consultant. Exporting of video to external media should be only performed by head of Client/security if requested and approved by concerned Law enforcement agencies in writing. The operators shall be trained for the daily operations and event response.
Page | 30
Security Monitoring Standards – V4.0/2015 Third party visitors are not allowed inside the control room/equipment room; any visitor including the system supplier/integrator would be accompanied by authorized representative from Client and would log the purpose and details of the visit. All the entries to the control room/equipment room would take prior approval from the concerned head of Client/security. All the data’s related with Client security system should keep confidential and it is prohibited to transmit any data including IP details electronically via email to any parties including vendors. Any data related to Client security system must be kept in PC/hard disc which does not have any connectivity to remote/public network.
L. Documentation The Client shall maintain a copy of the following documents and shall be made available to Source/ authorized auditing consultant on request.
Maintenance contract
Trade license
As Built Drawings
Maintenance /Operational Manuals
List of people/offices having access to live and recorded video
Control Room/Equipment room register
Risk assessment report.
Control room shall have laminated site plan with camera icons and identification numbers.
M. 2D Maps (CCTV Layout Drawing) The Client is requested to submit the AS-Built CCTV Layout drawings/2D maps as per the requirements mentioned by the Source/authorized auditing consultant upon commissioning the system. The main preparation procedures includes as follows:
Scaling the drawings.
Preparation of Layers.
Page | 31
Security Monitoring Standards – V4.0/2015
Preparation of camera description table.
Cleaning the drawings with standardized formats of blocks, frame/layout, font/text, walls/lines & hatches.
Anchoring the drawing in which the drawings has to be positioned as per UTM Coordinates UTM WGS 84.
N. Training Operators shall be trained for normal day to day operation of the CCTV system and for event response. All maintenance staff, in-house or contracted shall be formally trained on the system installed at the facility. At least two representatives from The Client shall be trained to perform system health check, review video recording, etc. The Client shall maintain all operator and maintenance staff credentials including qualifications, training certificates, past employment history, etc.
O. Signage Advisory CCTV signage shall be installed in locations that make people entering the facility aware that a CCTV system is in operation. The signage s hall clearly state “CCTV Cameras in operation” in both English and Arabic with a picture/icon of a camera.
P. Pre-approved Manufacturers List For Servers, Storage, Cameras/Encoders, network components & monitoring equipments should be from
reputed
and
reliable
brands
from
the
industry and
the
equipments
shall
be
engineered/manufactured from US, UK, C anada and European region. Material submittal for all equipments would be submitted to the Source/ authorized auditing consultant and the relevant approvals would be taken before the implementation.
Q. System Integrator/Contractor Certification Client shall ensure the appointed System integrator/Contractor for the implementation of Security Monitoring System shall have valid certification from MCC.
Page | 32
Security Monitoring Standards – V4.0/2015 8. Design, Approval and Integration Processes Client is requested to complete and submit to the Source/authorized auditing consultant a full detailed technical submittal of their system to obtain the approvals before the project implementation. This technical submittal would include:
Client name and address.
Client security manager and his contact information.
Client point of contact (POC) for enhancing and integrating the Client CCTV system to the Source system.
Type
and
description
of
the
Client
system
in
terms
of
hardware,
software
configuration and alarms integration.
Detailed Bill of Materials of the system.
Compliance statement as per this publication.
Camera Layout Drawings showing camera coverage of areas with camera details table (as per the format mentioned in the section Appendix-A on each floor layout). Field of View should be highlighted clearly.
Schematic Diagram of CCTV system with integration cabinet to Source system & UPS
distribution,
including
actual
model/part
numbers
of
equipments,
and
Connection of Alarms.
Storage calculation screen shot from manufacturer.
Technical data sheets of equipment’s included in the design.
Softcopy of Schematic and Camera Layouts.
Project Organization Chart with CV's of Project Implementation & Maintenance team.
Detailed work schedule (Design, Delivery, Implementation & Completion) proposed for the project with step by step description of each task.
Details of all personnel engaged for integration/implementation shall provide the details with the Name, Designation, Company Name and Telephone Number.
Trade License copy of CCTV Installer /Integrator.
Page | 33
Security Monitoring Standards – V4.0/2015
Full detailed list of current Client cameras, their type and installed location.
Information of Client CCTV system in the attached spreadsheets as per the section Appendix A.
Copy of Confidentiality Undertaking (Non-Disclosure agreement) signed between the Client and their System Integrator in Integrator’s letter head as per the format mentioned under the section Appendix A.
Undertaking letter from the client that all the products proposed would not discontinued for minimum 5 years from date of system acceptance and all the proposed models are latest available in the market during implementation.
Undertaking letter from the client on compliance of the coverage requirements as per Section-6 of this Security Monitoring Standards.
Undertaking letter to source stating the client would submit the detailed technical submittal as per Section-8 of this Security Monitoring Standards before awarding the project for execution.
Undertaking letter stating the client would inform/request source for detailed auditing/inspection of the system upon completing the implementation.
The Client is also required to describe its work plan to implement the CCTV system, by listing the major milestones and their due dates. After receiving the Client design and implementation plans, the Source/authorized auditing consultant will approve the design and the implementation work plans. Refurbished or 2 nd hand systems will not be approved. Authorized representative from the client would be present for all the meetings of client with the Source/ authorized auditing consultant. For the integration of Client CCTV system to the Source system; dedicated integration cabinet with Firewall and fiber connectivity would be provided by the Client as per the requirements mentioned in the section Network switches/Firewall.
Page | 34
Security Monitoring Standards – V4.0/2015 9. Security System Inspection Requirements The Client would comply with the following points upon receiving inspection schedule from the Source/ authorized auditing consultant.
A. Requirements
The Client are requested to provide access for the Source/ authorized auditing consultant personnel to CCTV equipments rooms, Control rooms and Security systems equipments to carry out inspection and to check the compliance with spe cification requirements.
Authorized personnel from the Client would acknowledge the Inspection report issued by the Source/ authorized auditing consultant at the end of Inspection.
Security system would be inspected and categorized as follows on the level of risk sever ity. o
Severity Level 5 – Extreme Risk
o
Severity Level 4 – High Risk
o
Severity Level 3 – Medium Risk
o
Severity Level 2 – Low Risk
o
Severity Level 1 – No Risk
All the snags mentioned in the Inspection report should rectify on or before the deadline issued by the Source/ authorized auditing consultant.
The Client would inform the Source in writing; upon rectification of all above mentioned Inspection snags.
The Client would inform the Source in writing for all Security System maintenances, shutdowns, power failures, network outages, video losses, HDD failures..etc.
Validity of any approval issued would be expired; if the client is failed to submit the requested documents/rectification or remarks within the time period mentioned during the inspection.
Page | 35
Security Monitoring Standards – V4.0/2015 B. Severity Level Document Reference: MCC/SMS/SL-v0.0
Severity Level
Risk Condition
Conditions System in shut-down condition. Video Loss for more than 10% o f cameras. Video quality/positioning/focussing of Cameras are not as per the requirements for more than 10% of cameras.
Level-5
Extreme Risk
Recording system is not functioning and continous recording as per the requirements are not available in the system. Sufficient recording capacity is not available in the system. Coverage as per the requirements are not available. Appropriate action is not taken for the inspection remarks mentioned from last 2 inspections. Video Loss for more than 5%. of cameras. Video quality/positioning/focusing of Cameras are not as per the requirements for more than 5% of cameras.
Level-4
High Risk
Continuous recording as per the requirements is not available in the system. Telephone/PABX and security screening equipments are not installed as per the requirements. Valid Maintenance contract is not available for the security system. Appropriate action is not taken for the inspection remarks mentioned from last 1 inspection. Video Loss for more than 3% of cameras. Video quality/positioning/focusing of Cameras are not as per the requirements.
Level-3
Medium Risk
Video quality/positioning/focusing of Cameras are not as per the requirements. Alarm logs are not configured as per the requirements. Appropriate spare equipments are not available on site. Connectivity requirements to the Source are not ready as per the specifications.
Level-2
Low Risk
Level-1
No Risk
Cameras are not cleaned as per the environmental conditions. Control Room log register book is not available during inspection. Security systems are working/operational as per the standards/requirements.
Page | 36
Security Monitoring Standards – V4.0/2015 10.Appendix A: Questionnaire/Information This section provides a questionnaire for the Client concerning information on the current and enhanced CCTV system.
This questionnaire will serve as a guideline for the preparation of the implementation plan to upgrade the current system/design new system as accurately as possible.
A. Client General Information Document Reference: MCC/SMS/CGI-v0.0 Required Information
Client Reply
Client name: Client star category: Client Address: Client Phone Number: Client Manager: Client Head of Security Name: Client Head of Security Phone: Client Head of Security Mobile: Client Head of Security email id: Client CCTV System implementation PM Name Client CCTV System implementation PM Phone: Client CCTV System implementation PM Mobile: Client CCTV System implementation PM email id:
Page | 37
Security Monitoring Standards – V4.0/2015 B. Client System Integrator Information Document Reference: MCC/SMS/SII-v0.0 Required Information
Client Reply
Integrator name: Integrator Address with location: Integrator Phone Number: Integrator CCTV System implementation PM Name Integrator CCTV System implementation PM Phone: Integrator CCTV System implementation PM Mobile: Integrator CCTV System implementation PM em ail id:
C. Client Current CCTV System Information (if any) Document Reference: MCC/SMS/CCSI-v0.0 Required Information
Client Reply
Current CCTV System Name: Current CCTV System Manufacturer: Current CCTV System UAE Representative: Current CCTV System Vendor Name: Current CCTV System Vendor Address: Current CCTV System Vendor Phone: Current CCTV System Vendor POC Name: Current CCTV System Vendor POC Cell: Current CCTV System Vendor POC email id: Current CCTV System Type (Analog/Digital/Hybrid) Current CCTV System Video Format (Proprietary/MPEG2/H264/…) Does the current CCTV System use Video Encoders/Transcoders and from which type and model: Does the current CCTV System cameras/VMS are ONVIF supported: Does the current CCTV System use network Switch and from which type and model:
Page | 38
Security Monitoring Standards – V4.0/2015 Required Information
Client Reply
Does the current CCTV System use network Firewall and from which type and model: Is the current CCTV System supported by a UPS/Power Generator? Please describe type and capacity: How many Operators' screens - and from which type and model - are allocated for Se curity personnel to view video in the current CCTV System? Describe other system components and software features of the current Client CCTV System:
D. Client Enhanced/New CCTV System Information Document Reference: MCC/SMS/NCSI-v0.0 Required Information
Client Reply
CCTV Camera brand/model/resolution/firmware/origin/Quantity CCTV VMS brand/model/version/origin CCTV Servers brand/model/origin CCTV Workstations brand/model/origin CCTV Storage brand/model/origin/Usable capacity CCTV Network switches brand/model/origin CCTV Firewall brand/model/origin CCTV video display system brand/model/origin CCTV UPS brand/model/origin/capacity CCTV Structured cabling brand/model/origin Define Enhanced System Network Communication Line bandwidth: Does enhanced/new system hard disks used for storage system is enterprise level with minimum 7200 RPM? Does enhanced/new system have fully redundant network design without any single point of failure with multicast routing supported?
Page | 39
Security Monitoring Standards – V4.0/2015 Required Information
Client Reply
Does enhanced/new system have dual communication uplinks for servers/storage system without any single point of failure? Does enhanced/new system integration cabinet include a tampering switch and alert mechanism that alerts each time the system cabinet is opened? Does the minimum 4 core single mode fiber connectivity from the system integration cabinet to Etisalat POP room available? Is enhanced/new system supported with UPS/Power Generator? Describe other system components and software features of the enhanced/new Client CCTV System:
E. Client Enhanced/New CCTV System Camera information (For all cameras) Document Reference: MCC/SMS/NCCI-v0.0 Camera Unique ID
Coverage Area(Location)
Type(FC/PTZ)
Bandwidth and Video Resolution
FPS
Page | 40
Security Monitoring Standards – V4.0/2015 F. Camera Details Table (On each floor CCTV layout drawing) Document Reference: MCC/SMS/CDT-v0.0 Camera Details Camera ID
Coverage Area(Location)
Type
Mounting
Lens Details Purpose (Source/Client)
Coverage(in meters)
CCD size
Focal Length
F.O.V H= V=
G. Project Work Plan Document Reference: MCC/SMS/PWP-v0.0 Milestone
Due Date
Status
Comments
Current CCTV System Description Choosing a Vendor to enhance the current CCTV System Design of the enhanced CCTV system Design Approval Hardware and Software procurement Installation of new cameras Installation of new system cabinets, network and its head end equipments. Testing & Commissioning of the system Preliminary Inspections and approvals Integration with Source system and final tests.
Page | 41
Security Monitoring Standards – V4.0/2015 H. Confidentiality Undertaking (Non-Disclosure Agreement) Document Reference: MCC/SMS/NDA-v0.0 Ref. No.: Date:
CONFIDENTIALITY UNDERTAKING Company Name (hereinafter “Undersigned”), hereby makes the following undertaking regarding matters of confidentiality and nondisclosure under its agreement (hereinafter “Contract”) with the Name of Client (hereinafter “Client”) with respect to the installation of CCTV Systems (hereinafter “Project”) for which the Contract was signed between the Client and the Undersigned.
For purposes of this Confidentiality Undertaking “Confidential Information” means all development, marketing, financial, proprietary, organizational, management, administrative, technical and other information (including, without limitation, all technical information, photographs, films agreements, reports, files, books, logs, charts, records, studies, surveys, schedules, specifications, processes, plans, maps, statistical information and customer data/lists) which is not generally available in the public domain. The term “Confidential Information” also includes all reports, memoranda, notes, documents and other media containing confidential information, as well as any copies and extracts of Confidential information and any computer-generated studies and data containing Confidential Information. The undersigned undertakes to keep secret and not divulge to third parties, without the written consent of the Monitoring & Co ntrol Centre (Source), the following: a.
Any and all Confidential Information in connection with the Project that is furnished or disclosed to the Undersigned by, or acquired by the Undersigned directly or indirectly from any inputs including but not limited to the Client and/or Source or their officers, agents and contractors;
b.
Any and all Confidential Information regarding the Undersigned’s role, duties and obligations under the Contract; and
c.
Any and all Confidential Information relating to the Undersigned’s findings, opinions, photographs, films, recommendations, work product and deliverables under the Contract.
Page | 42
Security Monitoring Standards – V4.0/2015 The Undersigned undertakes to use its best efforts to prevent the unauthorized use, disclosure or availability of any Confidential Information which it receives in connection with the Project and/or Contract. Such efforts shall include, among other things, securing writings, documents and other media containing such Confidential Information in a safe or locked file cabinet or the equivalent. Upon termination of the Contract, the Undersigned shall either return to the Client or, if requested by the Client, destroy all copies of any media or materials containing Confidential Information. Upon request, the Undersigned agrees to ce rtify it has completed such action. The Undersigned acknowledges and agrees that the unauthorized use or disclosure of any Confidential Information by the Undersigned in violation of this Confidentiality Undertaking will cause substantial damage to the Client and /or Source. In the event of any violation of this undertaking, the Undersigned will be subject to all penalties stipulated in the UAE’s law. The Undersigned shall notify Client and/or Source immediately and cooperate with them at their requests, upon discovery of any loss or compromise of Confidential Information related to the Project and/or Contract. Now withstanding paragraph 2 above, the Undersigned shall be entitled to disclose Confidential Information to any of its directors, employees, agents, sub-contractors and professional advisers as are required in the course of their duties to receive and consider the same for the purpose of the Contract. The Undersigned shall procure that all such persons are bound by written agreement to the duties of confidentiality and non-disclosure as set forth herein. No reference to the Project or the Contract may be made in any advertisement, brochure, circular or other promotional document issued by or on behalf of Undersigned or any of its affiliates, which is intended to interest or attract potential customers, unless Source has previously received and approved in writing a copy of all such r eferences. The provisions of this Confidentiality Undertaking shall survive the expiration or termination of the Contract for an unlimited period of time.
__________________________ The Undersigned Name: Designation: Date:
Page | 43
Security Monitoring Standards – V4.0/2015 1. Checklists/Register Logs templates A. Control room visitors Log Document Reference: MCC/SMS/CVL-v0.0 Date
Arrival
Departure
Surname
Init.
Organization
Position
Signature
Signed In By
Page | 44
Security Monitoring Standards – V4.0/2015 B. CCTV Incident Log Document Reference: MCC/SMS/CIL-v0.0 Date:
Time:
Location:
Incident Type: Recording Number:
Live Incident Recording: YES/NO
Name of Person Reporting:
Employer:
Description of Incident:
Response to Incident:
If Police required, time requested:
Time of Police arrival:
Name(s) of attending Police Officer(s):
Registered Number(s):
If medical assistance required, time
Time of medical assistance arrival:
requested: Name(s) of attending Medical Officer(s):
Name of Monitoring Room Officer:
Signature:
Page | 45
Security Monitoring Standards – V4.0/2015 C. CCTV Maintenance Log / Fault Reports Log Document Reference: MCC/SMS/CML-v0.0 Date:
Time:
Engineer:
Reason: Regular Maintenance / Call Out
Maintenance Details:
Outcome:
D. Viewing Log of CCTV Images Document Reference: MCC/SMS/VLC-v0.0 Date of Viewing
Time of Viewing
Camera Identifier
Operator
Page | 46
Security Monitoring Standards – V4.0/2015 Name(s) of Person Viewing
Organizational Details
Reason For Viewing
Outcome If Any
Page | 47
Security Monitoring Standards – V4.0/2015 E. Issued Copy of Image Log Document Reference: MCC/SMS/ICIL-v0.0 Reason for Provision: Legal Proceedings/Subject Access/Other Date of Creation Time of Operator
Camera Identifier
Creation
Crime/Incident No Police Officer/Third Party Name
Contact Details Signature of Third
Date of
Party
Destruction or
Signature of Manager
Return
Page | 48
Security Monitoring Standards – V4.0/2015 F. Daily CCTV System Check Log Document Reference: MCC/SMS/CSCL-v0.0 Date
Time
Operator
Date/Time
Cameras &
Stamp Checked
Recording Quality Checked
Page | 49
Security Monitoring Standards – V4.0/2015 G. CCTV, Control room auditing checklist Document Reference: MCC/SMS/CCAC-v0.0
CCTV & Control room auditing checklist
Yes
No
violation
Has the camera location been chosen designed with consideration to maximizing visibility All security investigations from CCTV being reported to Source Has the site been chosen with consideration to protecting the camera structure and ensuring it will last without undue maintenance necessary to the structure and surrounding site Cameras are focused Has (CCTV) been installed as per the coverage area requirements Field of View is adjusted to meet operational requirements Camera lens and housing viewing window are clear from dust and debris Camera pan/tilt/zoom is working properly Camera signal is free from interference Camera vision is being recorded Camera vision is being recorded for the period as per the requirements. Storage system is working properly All security incidents footage being saved and kept in appropriate location for safeguard of the information in accordance with Source standards All security incidents footage being communicated with Source Are critical files under lock and key to limited access In addition to CCTV, are there sound-monitoring systems to locate and listen to sounds when the facilities are supposed to be unused? Can all external doors be locked on command from a single security station? Can all internal doors be locked on command? Are there personnel assigned to watch the CCTV at all times? Person monitoring the CCTV, is that his/her sole function? Are external walls and windows of control room proof against easy access by a saboteur? Is there a system of signatures to control room access to documents, and data? Is security documentation updated promptly when procedures or equipment are changed or newly Implemented? Is there a specific person or group assigned to review periodic reports on everyone who has access badges for control room? Are communications lines protected against external access (e.g., through manholes adjacent to the building? Have ID markings been removed from power rooms, communications closets, etc. to reduce ease of locating critical resources? Are there metal detectors in use for checking v isitors to the control room? Are internal doors in the control room fitted with self-c losing mechanism?
Page | 50
N/A
Security Monitoring Standards – V4.0/2015 CCTV & Control room auditing checklist
Yes
No
violation
Is there a prominent notice announcing outside control room AUTHORIZED PERSONNEL ONLY-- OPERATORS MAY NOT ADMIT VISITORS WITHOUT AUTHORIZATION. Are operator and maintenance manuals stored neatly in an assigned place in the control room? Are control room operator trained to refuse access to the control room to unauthorized visitors no matter how high their apparent or claimed rank within the organization? Are control room operator trained to phone for help if an unauthorized visitor (say, the CEO) demands admittance despite the posted restrictions? Is there a liaison program with local law enforcement agencies? Do personnel know how to handle and report telephone bomb threats? Are there intercom systems between the control room and other areas within the building? Are hinges of control room doors on the inside only (inaccessible from outside)? Are control room doorframes solidly installed in the walls? Are there astragals (protectors on the control room door edge) to preclude tampering with the latches? Are there first aid stations clearly marked a nd readily accessed in the control room? After hours personnel’s, get periodically unannounced visits from manager to ensure that they are doing their job properly? Not committing criminal breach? Are there sufficient numbers of security filing cabinets to p roperly secure sensitive documents in control room? Are all control room keys systematically stored in a secure wall cabinet? Is there a policy that control room keys and will not be marked with information that identifies the facility to which they belong? Are Camera positions and numbers marked on control room Operator maps. To ensure camera numbers are marked on the actual camera Pole/support/structure to give a point of reference for security officers on the ground when communicating with the control room.
Page | 51
N/A