{"id":380457,"date":"2024-10-20T03:06:57","date_gmt":"2024-10-20T03:06:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-84182021-tc\/"},"modified":"2024-10-26T05:38:48","modified_gmt":"2024-10-26T05:38:48","slug":"bs-84182021-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-84182021-tc\/","title":{"rendered":"BS 8418:2021 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
81<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | Introduction Table 1 \u2014 Key features: Type A vs Type A+ <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 4 System planning 4.1 Threat assessment and risk analysis 4.2 Operational requirement (OR) 4.3 Temporary and\/or portable systems <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 5 System design 5.1 Detection device selection, positioning and configuration 5.2 Camera positioning and configuration <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 5.3 Illumination 5.4 Audio challenge 5.5 Data transmission system 5.6 Fault recognition <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | Table 2 \u2014 Fault recognition and indication 5.7 Video integrity 5.8 Control equipment integrity 5.9 Event log at the supervised premises <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 5.10 Power supplies 5.11 Setting and unsetting <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 5.12 System design proposal (SDP) 6 Installation 6.1 Wiring, cabling and connections 6.2 Tamper detection\/security <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Table 3 \u2014 Tamper detection and indication 6.3 Detection 6.4 Cameras <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 6.5 Control equipment 7 Response plan 8 Inspection, functional testing and commissioning 8.1 General <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 8.2 Checklist 8.3 Handover 8.4 As-fitted document 9 Documentation and records 10 Maintenance 10.1 VSS maintenance agreement and routine visits <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 10.2 VSS company maintenance engineer actions <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | Annex A (informative)\u2002 Risk analysis and threat assessment Annex B (normative)\u2002 Contents of the operational requirements (OR) document <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Annex C (informative)\u2002 Diagrams for positioning detection devices Figure C.1 \u2014 Alignment of long-range and wide-angle detection devices <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | Figure C.2 \u2014 Correctly positioned detection devices near a supervised premises boundary <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Figure C.3 \u2014 An incorrectly adjusted detection device facing an entrance gate, where the detection exceeds the secure area <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | Figure C.4 \u2014 An incorrectly positioned detection device providing a detection area outside the field of view of the camera Figure C.5 \u2014 Example of multiple cameras positioned to view the total detection area <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Annex D (informative)\u2002 Factors affecting the design requirements for a detection-activated VSS <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Annex E (normative)\u2002 Information to be included in the system design proposal (SDP) <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | Annex F (informative)\u2002 Agreed actions to be taken by the RVRC Table F.1 \u2014 RVRC example response to activations <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | Annex G (normative)\u2002 Checklist criteria for the commissioning of a detection-activated VSS Table G.1 \u2014 Template for the commissioning of a detection-activated VSS <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Design, installation, commissioning and maintenance of detector-activated video surveillance systems (VSS). Code of practice<\/b><\/p>\n |