You are on page 1of 53

Security Monitoring

Standards V4.0
This document contains proprietary information, which is sole property of Monitoring & Control Centre
with reference to CCTV Management and Operations Standards. V4.0

MCC
10/12/2015

Monitoring & Control Centre (MCC). All copyrights reserved.


P.O. Box 114421 Abu Dhabi, United Arab Emirates
Security Monitoring Standards V4.0/2015

Security monitoring Standards Distributed by Abu Dhabi Monitoring and Control


Center
Document No. 0002

Version 4.0

Date of First Issue April-2015

Date of Second Issue Dec-2015

This Document is developed by Abu Dhabi Monitoring and control Centre (MCC). The document is
submitted to recipient for their use only. By receiving this document the recipient undertakes full
responsibility not to duplicate the document or disclose in part of, or the whole of, any of the
information contained herein to any third party without prior permission from the MCC.

Page | 1
Security Monitoring Standards V4.0/2015

Record of Changes
Version:4.0
Section Description
6 Coverage Area with the level of Coverage

7.A CCTV Installation Requirements

7.B Cameras/Encoders

7.C Network Switches/Firewall

7.D Video Management System

7.E Servers

7.F Storage Units

7.K Live Monitoring & Control Room Procedures

7.P Pre-approved Manufacturers List

7.Q System Integrator/Contractor Certification

8 Design, Approval and Integration Processes

9 Security System Inspection Requirements

Page | 2
Security Monitoring Standards V4.0/2015

CONTENTS
1. Introduction and Overview ............................................................................................................... 5
2. Abbreviations .................................................................................................................................... 5
3. Scope ................................................................................................................................................. 6
4. Confidentiality ................................................................................................................................... 7
5. Point of Contact ................................................................................................................................ 7
6. Coverage Area with the level of Coverage........................................................................................ 7
A. Hotels/Hotel Apartments/Shopping Malls ................................................................................... 7
B. Commercial & Residential Buildings ............................................................................................. 8
C. Government Department/Public Sector Buildings ....................................................................... 9
D. Mosques, Church & Temple .......................................................................................................... 9
E. Educational Institutions & its transport ..................................................................................... 10
F. Private & Public Hospitals ........................................................................................................... 11
G. Mens, ladies & children clubs, Theme Parks, parks & other recreational areas ....................... 12
H. Liquor Retail Areas ...................................................................................................................... 12
I. Equestrian, Shooting & Golf Clubs .............................................................................................. 13
J. Labor accommodation Camps .................................................................................................... 14
K. Banks, Money Exchanges, Jewelry & other financial institutions............................................... 14
L. Independent multi-level hyper markets, super markets & departmental stores ...................... 15
M. Museum, Stadium and Exhibition Center ................................................................................... 15
N. Petrol filling stations ................................................................................................................... 16
O. Bus/Taxi & all public transport stands ........................................................................................ 16
P. Critical institutions like power plants & refineries...................................................................... 17
Q. Warehouses and open/enclosed Storage Yards ......................................................................... 17
R. Individual Shops .......................................................................................................................... 18
S. Commercial Transport ................................................................................................................ 18
7. Technical Requirements.................................................................................................................. 18
A. CCTV Installation Requirements ................................................................................................. 18
B. Cameras/Encoders* .................................................................................................................... 20
C. Network Switches/Firewall ......................................................................................................... 21
D. Video Management System ........................................................................................................ 22
E. Servers......................................................................................................................................... 24
F. Storage Units ............................................................................................................................... 25
G. Alarm Logs................................................................................................................................... 27
H. Availability & Maintenance ......................................................................................................... 27
I. Power .......................................................................................................................................... 28
J. Lighting ........................................................................................................................................ 29
K. Live Monitoring & Control Room Procedures ............................................................................. 29
L. Documentation ........................................................................................................................... 31
M. 2D Maps (CCTV Layout Drawing) ................................................................................................ 31
N. Training ....................................................................................................................................... 32
O. Signage ........................................................................................................................................ 32
P. Pre-approved Manufacturers List ............................................................................................... 32
Q. System Integrator/Contractor Certification................................................................................ 32
8. Design, Approval and Integration Processes .................................................................................. 33

Page | 3
Security Monitoring Standards V4.0/2015

9. Security System Inspection Requirements ..................................................................................... 35


A. Requirements .............................................................................................................................. 35
B. Severity Level .............................................................................................................................. 36
10. Appendix A: Questionnaire/Information ........................................................................................ 37
A. Client General Information ......................................................................................................... 37
B. Client System Integrator Information ......................................................................................... 38
C. Client Current CCTV System Information (if any) ....................................................................... 38
D. Client Enhanced/New CCTV System Information ....................................................................... 39
E. Client Enhanced/New CCTV System Camera information (For all cameras) .............................. 40
F. Camera Details Table (On each floor CCTV layout drawing)....................................................... 41
G. Project Work Plan ....................................................................................................................... 41
H. Confidentiality Undertaking (Non-Disclosure Agreement) ......................................................... 42
1. Checklists/Register Logs templates ................................................................................................ 44
A. Control room visitors Log ............................................................................................................ 44
B. CCTV Incident Log ....................................................................................................................... 45
C. CCTV Maintenance Log / Fault Reports Log................................................................................ 46
D. Viewing Log of CCTV Images ....................................................................................................... 46
E. Issued Copy of Image Log............................................................................................................ 48
F. Daily CCTV System Check Log ..................................................................................................... 49
G. CCTV, Control room auditing checklist ....................................................................................... 50
H. Details of Control room auditing ................................................................................................ 52

Page | 4
Security Monitoring Standards V4.0/2015

1. Introduction and Overview

General
In order to increase the security and safety of UAE, Monitoring & Control Center (here by The
Source) has decided to request all Hotels, Hotel Apartments, Shopping Malls, Commercial & Residential
Buildings, Government Department/Public Sector Buildings, Mosques/church/temple, Educational
Institutions and its Transport, Private and Public Hospitals, Mens; Ladies & Childrens Clubs, Theme
Parks, Parks and other Recreational areas, Liquor retail areas, Restaurants, Equestrian; Shooting & Golf
Clubs, Labor Accommodations & cities, Independent multi-level Hypermarkets, Supermarkets and
departmental stores, Banks; Money Exchanges; Jewelry and other Financial Institutions, Museum;
Stadiums and Exhibition Centers, Petrol filling stations, Bus/Taxi and public transport stands, Critical
Institutions like Power plants & refineries and Warehouses & open/enclosed storage yards (hereby The
Client) in the Emirates of Abu Dhabi to enhance their CCTV systems in order to meet the hereby
described operational and technical requirements and to integrate them with the existing systems (as
defined by The Source).

2. Abbreviations

Term Description
B&W Black & White
CCAC CCTV, Control room Auditing Checklist
CCSI Current CCTV System Information
CCTV Closed Circuit Television
CDT Camera Details Table
CGI Client General Information
CIL CCTV Incident Log
CML CCTV Maintenance/Fault Log
CSCL CCTV System Check Log
CVL Control room visitors Log
DCA Details of Control room auditing
GPS Global Positioning System
HD High-Definition
HTTPS Hypertext Transfer Protocol Secure
ICD Interface Control Document
ICIL Issued Copy of Image Log
IGMP Internet Group Management Protocol
Term Description

Page | 5
Security Monitoring Standards V4.0/2015

LPR License Plate Recognition


MCC Monitoring & Control Center
MTU Maximum Transmission Unit
NAS Network-attached Storage
NCCI Enhanced/New CCTV System Camera information
NCSI Enhanced/New CCTV System Information
NDA Non-Disclosure Agreement
NTP Network Time Protocol
OA Open Architecture
PIM Protocol-Independent Multicast
POP Point Of Presence
PWP Project Work Plan
RAID Redundant Array of Inexpensive Disks
RTP Real-time Transport Protocol
SAN Storage Area Network
SII System Integrator Information
SL Severity Level
SM Sparse Mode
SMS Security Monitoring Standards
UDP User Datagram Protocol
UTM Universal Transverse Mercator
VLC Viewing Log of CCTV Images
VMS Video Management System
WGS World Geodetic System

3. Scope

The purpose of this document is to define the requirements from the Client to enhance their CCTV
systems, so they will be able to integrate them with Source systems. This document provides the
following information:

Operational Concepts and Client Cameras Coverage


General and Technical Requirements
Availability and Maintenance of the system.
Design, Approval and Integration Processes
Security System Inspection requirements

Page | 6
Security Monitoring Standards V4.0/2015

4. Confidentiality

Client is kindly requested hereby, to keep this process and its related information restricted, and not to
use, in any case or mean the information/designs/plans to any other purpose rather than the
enhancement/design of their CCTV systems and to meet the Source requirements.

5. Point of Contact

During the design and implementation process the Source, through their appointed authorized auditing
consultant will answer Client questions and will review and approve the Client designs. Client can clarify
the enquiries related to their CCTV System integration with the Source system to the following contact
number 02 405 8888 and email servicedesk@admcc.ae.

6. Coverage Area with the level of Coverage.

The Source is requesting all the below mentioned Clients to have fixed video coverage of following
areas as per the appropriate coverage level mentioned.

A. Hotels/Hotel Apartments/Shopping Malls

All entrances and exits indoor and outdoor. (Identification Level)


Front desk/ Reception desk. (Identification Level)
Full coverage of Lobby/entrance hall and Client service area such as kitchen (75% of coverage
inside the kitchen), kitchen entrance door, laundry, housekeeping, etc. (Recognition Level)
Full coverage of Client indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of Elevators, lobbies, inside elevators, escalators, access staircases. (Recognition
Level)
Full coverage of all floor corridors, public open areas which is inclusive of all shop entrances,
ATM areas, loading areas. (Recognition Level)
Full coverage of Emergency Doors/Exits (Identification Level)
Full coverage of liquor retail selling area, Point of Sale, parking areas, liquor storage room, liquor
warehouses inside and outside, loading/unloading areas, entrances/exits of liquor warehouses.
(Recognition Level)
Full coverage of Server/Equipment room and CCTV Monitoring room. (Identification Level)

Page | 7
Security Monitoring Standards V4.0/2015
Full coverage of Open Coffee shop/Fast food dining areas/phone booth, kids playing area.
(Recognition Level)
Coverage at entrances of entertainment areas, such as spa/gym/swimming pool/ cinema/ play &
game area/ball rooms/pre-function areas, etc. (Recognition Level)
Coverage at entrances of restaurants (Full coverage required if restaurant is located in an open
area)/dining area/bars, etc. (Recognition Level)
Coverage at entrances of Public toilets. (Detection Level)
Coverage at entrances of Conference Center/ meeting rooms/Client business center.
(Recognition Level)
Coverage at entrances of Communication room/Etisalat room/IT room/HVAC/transformers
rooms/Electrical room. (Recognition Level)
Coverage at entrances of Bank/Exchange/Jewellery/ Mosque. (Recognition Level)
General View of Swimming Pool water area/ kids pool area (Provision only).
Full coverage of adjacent parking/entrance lay-bay to client premises. (Recognition Level)
Dedicated coverage at all entry/exit areas rear and front of each individual Villa/Chalet.
(Identification Level)
Dedicated coverage of Pathway/Side way of each individual Villa/Chalet. (Recognition Level)
Full coverage of common pathway for Villa/Chalet area. (Recognition Level)
Full coverage of common parking area for Villa/Chalet area. (Recognition Level)
Full coverage of reception to Villa/Chalet area. (Identification Level)
Full coverage of perimeter to Villa/Chalet area. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

B. Commercial & Residential Buildings

Main entrances and exits indoor and outdoor. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area (Recognition Level)
Front desk/ Reception desk. (Identification Level)
Emergency Doors/Exits (Identification Level)

Page | 8
Security Monitoring Standards V4.0/2015
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

C. Government Department/Public Sector Buildings

Main entrances and exits indoor and outdoor. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area (Recognition Level)
Front desk/ Reception desk/Counters. (Identification Level)
Emergency Doors/Exits (Identification Level)
Full coverage of service areas/entrances/exits (Recognition Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Coverage of Kitchen/Pantrys (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

D. Mosques, Church & Temple

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of main Lobby /entrance hall (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Emergency Doors/Exits (Identification Level)

Page | 9
Security Monitoring Standards V4.0/2015
Coverage at entrances of Public toilets. (Detection Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

E. Educational Institutions & its transport

Student Pick-up & Drop-off (Vehicle Number Plate, type and color of vehicle, passenger and
overview of surrounding area). (Recognition Level)
Landscape. (Detection Level)
Main Entrance & Lobby/Reception Lobbies/ waiting area. (Identification Level)
Front desk/ Reception desk/Counters. (Identification Level)
Cashier. (Identification Level)
Access points to all Institution buildings. (Recognition Level)
Elevator lobbies in BOH, FOH and Car park where entry & exit from building is possible.
(Recognition Level)
Circulation corridors on all floors. (Recognition Level)
Emergency exits on all Institution buildings where entry & exit from building is possible.
(Identification Level)
Staircase on all floors. (Recognition Level)
All canteen entries. (Recognition Level)
Kitchen entry/exits. (Recognition Level)
Canteen Dining Area. (Recognition Level)
Food delivery and storage areas entry / exits/Cashier. (Recognition Level)
Chemical Labs. (Recognition Level)
Auditoriums / Ground / Play areas / Sports Hall / Swimming Pool. (Recognition Level)
Entrances to Janitor room/ Toilets / Stores. (Recognition Level)
Monitoring Room. (Recognition Level)

Page | 10
Security Monitoring Standards V4.0/2015
Corridors leading to Bathroom/Wash rooms. (Recognition Level)
Full coverage inside the transport. (Recognition Level)
Acknowledgment alarm to make sure all passengers has left from transport
Cameras inside the transport must be equipped with audio inputs and GPS

F. Private & Public Hospitals

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area (Recognition Level)
Front desk/ Reception desk/Counters. (Identification Level)
Full coverage of all corridors. (Recognition Level)
Entrance of casualty. (Identification Level)
Emergency Doors/Exits (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Full coverage of patients/customer waiting area. (Recognition Level)
Full coverage of Clinic entrances/laboratory entrances/exits (Identification Level)
Full coverage of Operation theatre entrance & exits/ ICU entrances & exits/ In-patient ward
entrances & exits (Identification Level)
Full coverage of nursing station reception/visitor reception (Identification Level)
Full coverage of In-patient wards corridors. (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of kitchen/pantry. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

Page | 11
Security Monitoring Standards V4.0/2015
G. Mens, ladies & children clubs, Theme Parks, parks & other recreational areas

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall/ waiting area (Recognition Level)
Front desk/ Reception desk/Counters. (Identification Level)
Emergency Doors/Exits (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of all outdoor walkway. (Recognition Level)
Coverage of ticket counters. (Recognition Level)
Entrance to all indoor & outdoor game areas. (Recognition Level)
Full coverage of refreshment area. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Coverage at entrances of Public toilets. (Detection Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

H. Liquor Retail Areas

Full coverage of Liquor retail selling area (Recognition Level)


Full coverage of Point of Sales (Identification Level)
All entrances and exits - indoor and outdoor. (Identification Level)
Full coverage of Liquor storage rooms (Recognition Level)
Full coverage of Liquor warehouses inside and outside (Recognition Level)
Full coverage of Loading/unloading areas (Recognition Level)
Entrances/Exits of liquor warehouses (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)

Page | 12
Security Monitoring Standards V4.0/2015
I. Equestrian, Shooting & Golf Clubs

All entrances and exits - indoor and outdoor. (Identification Level)


Front desk/ Reception desk/Counters. (Identification Level)
Full coverage of Lobby/entrance hall/waiting area and Client service area such as kitchen (75%
of coverage inside the kitchen), kitchen entrance door, laundry, housekeeping, etc.
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Emergency Doors/Exits (Identification Level)
Full coverage of all floor corridors, public open areas which is inclusive of all shop entrances,
ATM areas, loading areas. (Recognition Level)
Coverage at entrances of Communication room/Etisalat room/IT room/HVAC/transformers
rooms/Electrical room. (Recognition Level)
Full coverage of Open Coffee Shop/Fast food dining areas/phone booth. (Recognition Level)
Kids playing area. (Recognition Level)
Coverage at entrances of entertainment areas, such as spa/gym/swimming pool/ cinema/ play &
game area etc. (Recognition Level)
Coverage at entrances of restaurants (Full coverage required if restaurant is located in an open
area)/dining area/bars, etc. (Recognition Level)
Coverage at entrances of Public toilets. (Detection Level)
Coverage at all facilities such as Equestrian Club, Golf Club, Rugby club, shooting areas.
(Recognition Level)
Coverage at entrances of Conference Center/ meeting rooms/Client business center.
(Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

Page | 13
Security Monitoring Standards V4.0/2015
J. Labor accommodation Camps

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall/waiting area (Recognition Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Full coverage of Perimeter (Detection Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of kitchen/pantry. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Coverage at entrances of Public toilets. (Detection Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

K. Banks, Money Exchanges, Jewelry & other financial institutions

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of cash counters (Identification Level)
Full coverage of perimeter area (Detection Level)
Full coverage of reception & customer waiting area. (Identification Level)
Full coverage of service area. (Recognition Level)
Full coverage of locker/safe rooms. (Identification Level)
Emergency Doors/Exits (Identification Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Full coverage of ATM counters (Identification Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

Page | 14
Security Monitoring Standards V4.0/2015
L. Independent multi-level hyper markets, super markets & departmental stores

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Emergency Doors/Exits (Identification Level)
Full coverage of point of sales. (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of ATM counters. (Identification Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

M. Museum, Stadium and Exhibition Center

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of perimeter area. (Detection Level)
Full coverage of main Lobby/Reception lobby/entrance hall/waiting area (Recognition Level)
Front desk/ Reception desk/Counters. (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Full coverage of ticket counters. (Recognition Level)
Emergency Doors/Exits (Identification Level)
Full coverage of exhibition/public areas/stands/corridors (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Coverage at entrances of Public toilets. (Detection Level)

Page | 15
Security Monitoring Standards V4.0/2015
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

N. Petrol filling stations

Full coverage of petrol filling bay/ Vehicle service and washing areas. (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

O. Bus/Taxi & all public transport stands

Entry and Exit of station. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall (Recognition Level)
Front desk/ Reception desk. (Identification Level)
Emergency Doors/Exits (Identification Level)
Full coverage of Bus/Taxi bay. (Recognition Level)
Full coverage of ticket counter & passenger waiting area. (Recognition Level)
Full coverage of Bus service & petrol filling area. (Recognition Level)
Full coverage of corridors & service areas. (Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Coverage at entrances of Public toilets. (Detection Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

Page | 16
Security Monitoring Standards V4.0/2015
P. Critical institutions like power plants & refineries

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of main Lobby/Reception lobby/entrance hall/waiting area (Recognition Level)
Front desk/ Reception desk. (Identification Level)
Emergency Doors/Exits (Identification Level)
Full coverage of Elevators, Elevator lobbies, inside elevators, escalators, access staircases.
(Recognition Level)
Full coverage of indoor & outdoor parking passages areas. (Recognition Level)
Full coverage of reception & service areas. (Identification Level)
Full coverage of production & storage areas. (Recognition Level)
Full coverage of perimeter. (Detection Level)
Full coverage of loading/unloading docks & bays. (Recognition Level)
Coverage at entrances of Utility rooms like Communication room/Etisalat room/IT
room/HVAC/transformers rooms/Electrical room. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

Q. Warehouses and open/enclosed Storage Yards

All entrances and exits - indoor and outdoor. (Identification Level)


Full coverage of loading/unloading docks & bays. (Recognition Level)
General coverage of storage areas (Detection Level)
Optional general coverage with thermal technology for volatile/inflammable materials storage
areas. (Recognition Level)
Main point of entry & exit for all vehicles (Guest & Service vehicles) to Client premises shall be
covered by dedicated full HD cameras (Vehicle Number Plate, type and color of vehicle, driver,
passenger and overview of surrounding area). (Identification Level)

Page | 17
Security Monitoring Standards V4.0/2015
R. Individual Shops
All entrances and exits - indoor and outdoor. (Identification Level)
Emergency Doors/Exits (Identification Level)
Full coverage of point of sales. (Recognition Level)
Full coverage of perimeter. (Detection Level)
Full coverage of nearby parking areas. (Recognition Level)
S. Commercial Transport
a) Camera Coverage Requirement

Full Coverage of the drivers cabin. (Identification Level)

Full coverage of goods entry doors. (Identification Level)

b) System Requirements

GPS system has to fixed for all commercial transport.

S Surveillance Body Approximate Face Camera Type


No. Objective Representation Linear Resolution Width recommended for
coverage

1 Identification 120% 250 pixels/m 40 Full HD Camera with


pixels WDR above 120db

2 Recognition 50% 100 pixels/m 17 HD / Mega-pixel


pixels cameras

3 Detection 10% 20 pixels/m 3 pixels 4 CIF cameras

7. Technical Requirements

The Source is requesting Client to meet all the technical requirements mentioned below while designing
and implementing the security system.

A. CCTV Installation Requirements

The security systems design shall enable the security of the building to be monitored only in the Security

Page | 18
Security Monitoring Standards V4.0/2015
Control Room and must have capability to integrate with third party systems in future such as BMS,
Access Control, etc.

The system shall be designed, engineered, furnished, delivered, installed and tested to ensure it is fully
operating and free of engineering, installation, system operation and Original Equipment Manufacturer
(OEM) defects that provide a "turnkey" solution. The Integrator must also be certified in installing and
supporting the system equipment from which they are manufactured and supplied from. The system
must support three types of recordings: motion, continuous and video analytic recording.

Routine performance checks of the security system shall be the responsibility of the respective Client. A
maintenance register shall be maintained to register all security equipment failure, with details on date
& time of failure, type of failure, action taken, date of rectification, etc. All failures and intentional
stoppage of the security system shall be reported to the Source/ authorized auditing consultant in
writing.

Cameras shall be installed in protective enclosures at locations and heights not easily accessible.
Enclosures shall be rated to prevent ingress of dust, dirt, moisture and the likes that could affect the
operation of the camera. Vandal proof housings shall be used for cameras installed at heights accessible
to people. Outdoor camera enclosures shall be minimum IP66 rated with sun shroud. CCTV equipments
shall be installed in lockable racks/cabinets in secure risers/rooms.

Equipments installed outdoor, shall be rated for use in extreme UAE weather conditions. Properly rated
outdoor enclosure shall be provided to house field power and transmission equipments. Outdoor
enclosure shall be designed with sun shade and suitable cooling mechanism.

Camera shall satisfy the recommended observation criteria defined for that camera location. Selection
of camera location shall also consider factors such as lighting conditions, seasonal foliage obstructions,
temporary or permanent man made obstructions; etc.

All the cables used for CCTV system including copper, fiber and power cables shall be properly pulled,
terminated, patched and labelled as per structured cabling standards.

Client should create a dedicated administrator login credentials in all Security monitoring system
components including cameras, servers, VMS, domain and network switches

Page | 19
Security Monitoring Standards V4.0/2015
Approval from the Source/authorized auditing consultant is required for system design, CCTV layout
drawings and material submittals before implementation phase.

B. Cameras/Encoders*

IP Cameras/Encoders shall be compliant with H.264 base encoding profile.


IP Cameras/Encoders shall be capable of multi-streams with its native resolution & FPS.
Live streams of IP Cameras/Encoders would be in native resolution/25-30 frames per second
and the recording streams would be as per the requirements mentioned under storage units
section.
Each camera/encoder channel must be configurable with single dedicated IP address.
IP cameras/encoders must support security features like HTTPS and 802.1x standards.
The encoder/IP camera shall be able to automatically start streaming according to last known
configuration when it is restarted/reset/rebooted.
Cameras must support resolution from 4CIF to Full HD.
Full HD quality day/night cameras with WDR above 120db and with backlight compensation
should be required for the main areas as mentioned with identification level of coverage.
I-Frame rate shall be at least one I-Frame once in every 1-4 seconds.
FPS shall be selectable from 12 - 30 frames per second to allow proper video analytics of the
stream.
Camera/Encoder streams shall be streamed as Transport RTP/UDP.
Cameras/Encoders/VMS must support multicast streaming and the multicast addresses will be
defined by the Source.
IP cameras/Encoders shall not require having a heartbeat sent to video management system.
IP cameras/Encoders must support stamping on the live stream with camera location ID, date
and time.
IP cameras/Encoders shall be synchronized to GPS time (NTP or similar based).
All the cameras shall be configured with unique name based on the location of coverage and
camera names should not be repeated.

Page | 20
Security Monitoring Standards V4.0/2015
All outdoor cameras shall be equipped with IR illuminators (capable to deliver color video image
in low light condition as well) and field of view shall have appropriate background light to have
clear picture quality during night.

Dedicated cameras at main point of entry & exit for all vehicles (Guest & Service vehicles) shall
be capable of capturing the video images in following conditions
o Day time
o Twilight
o Night time
o Low Beam Head light
o High Beam Head light
o Headlights off (with Ambient lighting)

* Encoders can be used for existing analog system by taking approval from the Source/ authorized

auditing consultant and should meet all the above technical requirements.

C. Network Switches/Firewall

Cameras/Encoders/VMS IP addressing shall be compatible with Source provided IP scheme and


based on the Source/authorized auditing consultant provided scopes.
If the Client uses the Multicast routing, that routing shall be based on PIM-SM and IGMP
snooping should be enabled in all edge switches.
Core Level switches (Layer 3) must be redundant in nature with two physical core switches
(preferred one is a stackable solution (redundant stack cables) or a VSS enabled to effectively
use the entire bandwidth) with dual uplinks from each edge switches.
Each individual Core Switch shall be equipped with dual power supplies and dual supervisor
engines.
Dual network uplinks from the edge/distribution level to core level, between distribution
level/core levels shall configured with Link aggregation/port channel to effectively use the entire
bandwidth.

Page | 21
Security Monitoring Standards V4.0/2015
Security systems would be installed in a dedicated network (network switches must be
dedicated only for CCTV components).
The network switches must be capable to configure the MTU size and the same shall be
configured according to the Source requirement which is 1300.
There should be four-core single mode fiber connectivity from equipment rack dedicated for
integration to the Etisalat POP room.
Connectivity to Sources premises will be provided by Firewall.
The Client responsibility is to purchase the Firewall according to list provided by the Source.
The Firewall connection to the sites Network is 1 GB copper wire.
Apart from the connectivity of Client network to Source network; there should not be any kind
of network connectivity to any remote/public networks. All the activities not limited to
monitoring/maintenance/updates/renewal/activation/trouble-shooting would be done
onsite/offline.
The Firewall shall be defined as a default gateway for the VMS. In case this is unfeasible, VMS
shall have a route defined to Source datacenter via above mentioned firewall.
The requested firewalls brands and models will be listed by the Source.

D. Video Management System

The VMS must support failsafe mode and by failsafe, the CCTV system must be equipped with
fail over servers and in case if any recording server fails then VMS must be capable for
automatic switch over of configuration from failed recording server to standby/failover
recording server. Once the failed recording server comes online then the configuration should
switch back over automatically. All these switch over must be without any loss in live monitoring
and recording of cameras associated to that particular recording server.
VMS shall open platform and support ONVIF.
VMS must support Multicast streaming and external connection by a defined ICD (Interface
Control Document).
VMS must allow connection to other systems threw an IP based WAN or LAN.
The VMS shall support providing a list of connected cameras to an external interface.

Page | 22
Security Monitoring Standards V4.0/2015
The system shall support RTSP streaming, RTP transmission, parallel REAL TIME transition and
transition of recorded replay.
The VMS shall have the ability to stream in REAL TIME the video of selected cameras/a group of
cameras/the whole cameras configured to VMS.
The VMS shall have the ability to stream RECORDED channels of selected cameras/a group of
cameras/the whole cameras configured to VMS.
The system shall allow selection of the required cameras to be transmitted based on the camera
ID (Name, Identification.)
The system shall allow selection of the required cameras to be transmitted based on a defined
time period (from [date], [hour], [min], to from [date], [hour], [min])
The system shall include the video metadata of the cameras in the video transmission:
o Location
o Time stamp
o Other recorded information
The Local CCTV system shall be synchronized to GPS time (NTP or similar based).
The broadcast process shall maintain the native cameras performance in domains of resolution,
frame rate, colored / B&W).
The VMS vendors support for at least 5 years from the system commissioning, or, upgrading the
system to the latest supported VMS version by the vendor.
The VMS system vendor shall use a standard tool for replay of the video, or shall provide the
replay tool with its ICD.
The Vendor/Client shall supply the ICD, and Source will determine whether it complies with the
OA. It if complies, Source will approve it.
The VMS shall support standard compression format H.264/MPEG-4 for the broadcast video or
lossless conversion to a standard compression format.
The VMS should stream the video, in real time and recorded, in a standard non encrypted
RTP/UDP protocol.
Minimum 5000+ camera models from different vendors shall be integrated and tested.
The switch over of video streams (from failed recording server to fail-over server) during the
failover instance & rebuilding of fail-over period recorded video data (if required) would

Page | 23
Security Monitoring Standards V4.0/2015
complete within 30 seconds without any kind of interference on the accessibility of live and
recording from the client workstation.
The VMS would not have any bottle-neck on system performance while recording and pushing
the video streams to the storage device.
The VMS would not limit any stream profiles in the available compression generated by the
camera.
The VMS operator client would not face any kind of latency/freezing in the sequence monitoring
of the camera streams.
The VMS would provide time selection/highlighting in the motion detection period of playback.
The VMS servers shall have separate dual aggregated network uplinks for camera and storage
networks.
System would support replications/clustering for the core database; if the system architecture is
based on central database structure.
System would not have any single point of failure for any hardware/software components.
System would have the capability of integrated built-in modules for additional features like LPR
and video analytics capabilities.

The VMS shall be capable to export/send the system logs to any centralized log server through
the network via snmp traps/equivalent mechanism.
Installation references in the areas mentioned under MCC security monitoring standards
coverage requirements
Availability of local technical support.
E. Servers

The servers must be equipped with dual processors, dual power supplies and minimum
10/1Gbps dual communication Uplinks to network without any single point of failure.
The servers designed must support failsafe by providing redundant/fail over servers for
recording and management.
The CPU load of servers must not exceed an average of 70%.
Video server(s) should be able to process incoming streams with ease with 25% scaling capacity
for future requirements.

Page | 24
Security Monitoring Standards V4.0/2015
Hostname assigned to each recording/failover recording servers shall be unique (should not
repeat) by incorporating the client establishment name.
There shall be redundant domain servers for client security monitoring system with more than
100 cameras.

F. Storage Units

The storage units must be equipped with dual Controllers, dual power supplies and dual
network uplinks to NAS/SAN switches without any single point of failure.
The recording system should be a unified NAS/SAN with minimum RAID 5 or above configured.
The Client is required to record on their Storage Units all the Client channels (Cameras) for a
period of days as mentioned in below mentioned table as follows:-
Educational Institutions:-
Motion based recording by considering 50% motion with following conditions:-
o During Motion detected period all cameras record in native resolution at 12fps, h.264
codec at 30% compression.
o During non-motion period all cameras record in native resolution at 3fps, h.264 codec at
30% compression.
All Other Clients:-
o Continuous in native resolution/12 fps, H.264 codec @ 30% compression.
The hard disks required for recording must be enterprise level one with minimum 7200 rpm.
If the storage system is Block Level/File level system (SAN/NAS) the following points should be
implemented mandatorily.
o High availability should be provided from the controller/head unit to all its attached
JBODs.
o All the JBODs should be configured individually.
o Consider one hot spare hard disk in each JBOD.
If the storage system is virtualized storage then a similar unit itself should be considered as hot
spare to the system.
Sharing of storage LUN/drive/locations across different servers are not acceptable. Dedicated
LUN/drive/locations shall be available to recording/failover servers.

Page | 25
Security Monitoring Standards V4.0/2015
Maximum size of single storage LUN/drive/locations shall be limited to 20TB or as per the
recommendation from VMS manufacturer.
Client Name Retention Period
Hotels/ Hotel Apartments/Shopping Malls
Commercial Buildings
Banks, Money Exchanges, Jewellery & other financial institutions
Independent multi-level hyper markets, super markets & departmental
stores
Mens, Ladies & Children Clubs & Spa
Gas Stations/petrol filling stations
Warehouses & open/enclosed storage yards
Private & Public Hospitals 180
Airports & Ports
Labor Accommodation Camps
Bus/Taxi & all public transport stands
Museums and Exhibition Centres
Critical institutions like Refineries & Power Plants
Factories
Clinics
Liquor Retails Areas
Government Department/Public Sector Buildings
Stadiums
90
Sports Clubs (Equestrian, Shooting & Golf Clubs)
University/Colleges/Schools
Individual Shops
30
Grocery

Video servers and storage should be installed inside a dedicated lockable rack (hereafter CCTV
Rack) with tamper-monitoring switch.
CCTV Racks should be placed in a separate lockable, well ventilated room. If CCTV Rack is placed
in Monitoring Room, it has to be partitioned and proper cooling should be provided.

Page | 26
Security Monitoring Standards V4.0/2015
For storage smaller than 50 TB, room must have Air Conditioning Unit and well ventilated and
for systems with more than 100 TB Storage, room must have Close Control Unit (CCU) cooling.

G. Alarm Logs

The System is required to keep a detailed log file and to send alerts in the following events:
Whenever the system dedicated cabinet for integration is opened (by means of a
system cabinet tampering switch- an HW switch that indicate whenever the cabinet
is Opened or Closed)
Loss of system communication
Loss of camera signal
System power down

The system logs should be available in a single log file for a period 90 days during Source inspection.

H. Availability & Maintenance

The Client CCTV system and its integration with the Source systems should be available 24/7.In any
case of problem; it should be fixed within one hour during day time, and three hours during
evenings and weekends.

The Client CCTV system needs to assure vendor/manufacturer availability to support it for a period
of 5 years (from the system installation).

In case of a major system malfunction or in case the Client is unable to operate the system for
longer than the above mentioned time, the Clients security manager is required to report this, in
writing, to the Source/ authorized auditing consultant.

In case Client requires any maintenance/configuration changes on CCTV system, the Client should
inform the Source/ authorized auditing consultant and take prior approval by sending the detailed
work schedule with task description.

Page | 27
Security Monitoring Standards V4.0/2015
Respective Client shall have either trained in-house maintenance staffs or have a formal
maintenance contract with companies (Local UAE companies) specialized in security systems
maintenance. The maintenance contract shall include both on-call and preventive maintenance. A
clearly defined preventive maintenance schedule shall be followed and maintenance reports and
logs shall be maintained at all times.

Routine performance checks of the security system shall be the responsibility of the Client. A
maintenance register shall be maintained to register all security equipment failure, with details on
date & time of failure, type of failure, action taken, date of rectification, etc. All failures and
intentional stoppage of the security system shall be reported to Source/ authorized auditing
consultant in writing.

During the maintenance period if any failure happened for the storage system; the faulty Hard disks
should be under the safe custody of Client. Hard disks would be taken out only with the written
approval from the Source/ authorized auditing consultant and after proper formatting procedures.

Maintenance report, contract and register shall be made available to the Source/ authorized
auditing consultant.

Quarterly maintenance shall include the following as minimum:

Inspection and confirmation on correct operation of all CCTV equipments including


time synchronization of various security equipments, recording and storage
Periodic full system tests to evaluate performance and configuration
Inspection of field devices and cleaning of cameras, illuminators, etc.
Rectification and/or reporting of site conditions that may affect the original intended
performance or purpose of the camera.

I. Power

CCTV equipments including cameras shall be on essential supply with UPS backup of minimum 30
minutes. 30 minutes backup is based on the condition that UPS is backed up Emergency power
supply/ generator and the same will start within 10 minutes of the mains failure. If UPS is not
backed up with Emergency power supply/ generator and for locations where the generator start up

Page | 28
Security Monitoring Standards V4.0/2015
cannot be guaranteed or with no generator, a UPS with minimum 4 hours backup shall be
provided.Power distribution for cameras shall be from secured locations (security risers &
equipment rooms). If power outlets and power supplies are required near field devices, they shall be
mounted in fully enclosed enclosures at heights not accessible to general public. External exposed
wall mounted power outlets and/or power supplies are not acceptable. Cameras lightings shall be
on UPS power.

J. Lighting

Well maintained balanced lighting shall be available at areas within the cameras field of view.
Following site conditions shall be the key elements that drive the selection of camera, location and
type additional illumination.

Backlighting
Glare caused by excessive bright light falling on camera lens
Poor level of lighting or no lighting

The lighting in the cameras field of view shall enable the camera to give acceptable picture under all
environmental and working conditions. The maximum to minimum illumination ratio available in the
cameras field of view shall be better than 4:1. Cameras sensitivity and spectral response shall match
the lighting source spectrum. Additional lighting shall be considered where camera picture quality is
impaired due to the existing lighting conditions. The selection and positioning of visible or non-
visible lighting shall meet the safety requirements that prevent damage to eye. Light source shall be
away from the camera and near to the object or area that is monitored by the camera.

K. Live Monitoring & Control Room Procedures

The control room procedures would be implemented and maintained as following requirements.
Security Control room with dedicated personnel shall be used for live monitoring of cameras (24 X
7); the operators will be trained for the daily operations and event response. Control room shall be
operational to monitor the Client security System. The control room shall be ergonomically designed
and shall be located in a secure area. Live monitoring of the Client security system is limited inside

Page | 29
Security Monitoring Standards V4.0/2015
the dedicated control room; any extension of live monitoring would take prior approval from the
Source/ authorized auditing consultant.

The following display pattern is recommended:

Multiplexed view of max four cameras if 15 Monitor is used


Multiplexed view of max nine cameras if 17 21 Monitor are used
Multiplex view of max sixteen cameras if 25- 32Monitors are used.
Minimum one monitor is recommended for selective viewing of individual cameras.

The system which comprise of more than 300 cameras shall have display system with 48 55
minimum 6 to 12nos of full HD display monitors with capability to display a selected camera/view
layout from any operator client to any monitor of display system

Live monitoring shall be real time, 24 X 7 operational display system and of high resolution. The
resolution of the monitors shall exceed the highest resolution camera used. The number of monitors
in the control room will depend on the number of cameras.

Access control system and log book must be maintained to record visits to Control Room. The
control room shall be ergonomically designed and shall be located in a secure area (should not be
shared with reception, lobbies, etc). Monitoring Stations (LCDs, PCs, PTZ joysticks, KVM switches,
etc.) should be properly mounted / installed. Camera should be installed inside monitoring room to
monitor activity inside.

Dedicated security personnel with Police clearance shall be appointed for live monitoring of
cameras. Security operators shall not be allowed to play back recorded images; only head of
Client/security can have this privilege and should be logged in log book.

Exporting to any media, taking photos/Screenshot is prohibited inside control room. Mobiles with
cameras are not allowed inside control room. All control room activities must be logged in log book
and should be available during inspection from Source/ authorized auditing consultant. Exporting of
video to external media should be only performed by head of Client/security if requested and
approved by concerned Law enforcement agencies in writing. The operators shall be trained for the
daily operations and event response.

Page | 30
Security Monitoring Standards V4.0/2015
Third party visitors are not allowed inside the control room/equipment room; any visitor including
the system supplier/integrator would be accompanied by authorized representative from Client and
would log the purpose and details of the visit. All the entries to the control room/equipment room
would take prior approval from the concerned head of Client/security.

All the datas related with Client security system should keep confidential and it is prohibited to
transmit any data including IP details electronically via email to any parties including vendors. Any
data related to Client security system must be kept in PC/hard disc which does not have any
connectivity to remote/public network.

L. Documentation

The Client shall maintain a copy of the following documents and shall be made available to Source/
authorized auditing consultant on request.
Maintenance contract
Trade license
As Built Drawings
Maintenance /Operational Manuals
List of people/offices having access to live and recorded video
Control Room/Equipment room register
Risk assessment report.

Control room shall have laminated site plan with camera icons and identification numbers.
M. 2D Maps (CCTV Layout Drawing)

The Client is requested to submit the AS-Built CCTV Layout drawings/2D maps as per the
requirements mentioned by the Source/authorized auditing consultant upon commissioning the
system.

The main preparation procedures includes as follows:-

Scaling the drawings.


Preparation of Layers.

Page | 31
Security Monitoring Standards V4.0/2015
Preparation of camera description table.
Cleaning the drawings with standardized formats of blocks, frame/layout, font/text,
walls/lines & hatches.
Anchoring the drawing in which the drawings has to be positioned as per UTM Coordinates
UTM WGS 84.

N. Training

Operators shall be trained for normal day to day operation of the CCTV system and for event
response. All maintenance staff, in-house or contracted shall be formally trained on the system
installed at the facility. At least two representatives from The Client shall be trained to perform
system health check, review video recording, etc.

The Client shall maintain all operator and maintenance staff credentials including qualifications,
training certificates, past employment history, etc.

O. Signage

Advisory CCTV signage shall be installed in locations that make people entering the facility aware
that a CCTV system is in operation. The signage shall clearly state CCTV Cameras in operation in
both English and Arabic with a picture/icon of a camera.

P. Pre-approved Manufacturers List

For Servers, Storage, Cameras/Encoders, network components & monitoring equipments should be
from reputed and reliable brands from the industry and the equipments shall be
engineered/manufactured from US, UK, Canada and European region.
Material submittal for all equipments would be submitted to the Source/ authorized auditing
consultant and the relevant approvals would be taken before the implementation.

Q. System Integrator/Contractor Certification

Client shall ensure the appointed System integrator/Contractor for the implementation of Security
Monitoring System shall have valid certification from MCC.

Page | 32
Security Monitoring Standards V4.0/2015

8. Design, Approval and Integration Processes

Client is requested to complete and submit to the Source/authorized auditing consultant a full
detailed technical submittal of their system to obtain the approvals before the project
implementation.

This technical submittal would include:

Client name and address.

Client security manager and his contact information.


Client point of contact (POC) for enhancing and integrating the Client CCTV system
to the Source system.
Type and description of the Client system in terms of hardware, software
configuration and alarms integration.
Detailed Bill of Materials of the system.
Compliance statement as per this publication.
Camera Layout Drawings showing camera coverage of areas with camera details
table (as per the format mentioned in the section Appendix-A on each floor
layout). Field of View should be highlighted clearly.
Schematic Diagram of CCTV system with integration cabinet to Source system &
UPS distribution, including actual model/part numbers of equipments, and
Connection of Alarms.
Storage calculation screen shot from manufacturer.
Technical data sheets of equipments included in the design.
Softcopy of Schematic and Camera Layouts.
Project Organization Chart with CV's of Project Implementation & Maintenance
team.
Detailed work schedule (Design, Delivery, Implementation & Completion) proposed
for the project with step by step description of each task.
Details of all personnel engaged for integration/implementation shall provide the details
with the Name, Designation, Company Name and Telephone Number.
Trade License copy of CCTV Installer /Integrator.

Page | 33
Security Monitoring Standards V4.0/2015
Full detailed list of current Client cameras, their type and installed location.
Information of Client CCTV system in the attached spreadsheets as per the section
Appendix A.
Copy of Confidentiality Undertaking (Non-Disclosure agreement) signed between
the Client and their System Integrator in Integrators letter head as per the format
mentioned under the section Appendix A.
Undertaking letter from the client that all the products proposed would not
discontinued for minimum 5 years from date of system acceptance and all the
proposed models are latest available in the market during implementation.
Undertaking letter from the client on compliance of the coverage requirements as
per Section-6 of this Security Monitoring Standards.
Undertaking letter to source stating the client would submit the detailed technical
submittal as per Section-8 of this Security Monitoring Standards before awarding
the project for execution.
Undertaking letter stating the client would inform/request source for detailed
auditing/inspection of the system upon completing the implementation.

The Client is also required to describe its work plan to implement the CCTV system, by listing the
major milestones and their due dates.

After receiving the Client design and implementation plans, the Source/authorized auditing
consultant will approve the design and the implementation work plans. Refurbished or 2nd hand
systems will not be approved. Authorized representative from the client would be present for all the
meetings of client with the Source/authorized auditing consultant.
For the integration of Client CCTV system to the Source system; dedicated integration cabinet with
Firewall and fiber connectivity would be provided by the Client as per the requirements mentioned
in the section Network switches/Firewall.

Page | 34
Security Monitoring Standards V4.0/2015

9. Security System Inspection Requirements

The Client would comply with the following points upon receiving inspection schedule from the
Source/ authorized auditing consultant.

A. Requirements

The Client are requested to provide access for the Source/ authorized auditing consultant
personnel to CCTV equipments rooms, Control rooms and Security systems equipments to carry
out inspection and to check the compliance with specification requirements.
Authorized personnel from the Client would acknowledge the Inspection report issued by the
Source/ authorized auditing consultant at the end of Inspection.
Security system would be inspected and categorized as follows on the level of risk severity.
o Severity Level 5 Extreme Risk
o Severity Level 4 High Risk
o Severity Level 3 Medium Risk
o Severity Level 2 Low Risk
o Severity Level 1 No Risk
All the snags mentioned in the Inspection report should rectify on or before the deadline issued
by the Source/ authorized auditing consultant.
The Client would inform the Source in writing; upon rectification of all above mentioned
Inspection snags.
The Client would inform the Source in writing for all Security System maintenances, shutdowns,
power failures, network outages, video losses, HDD failures..etc.
Validity of any approval issued would be expired; if the client is failed to submit the requested
documents/rectification or remarks within the time period mentioned during the inspection.

Page | 35
Security Monitoring Standards V4.0/2015
B. Severity Level

Document Reference: MCC/SMS/SL-v0.0


Severity Risk
Conditions
Level Condition
System in shut-down condition.
Video Loss for more than 10% of cameras.
Video quality/positioning/focussing of Cameras are not as per the
requirements for more than 10% of cameras.

Level-5 Extreme Risk Recording system is not functioning and continous recording as per the
requirements are not available in the system.
Sufficient recording capacity is not available in the system.
Coverage as per the requirements are not available.
Appropriate action is not taken for the inspection remarks mentioned
from last 2 inspections.
Video Loss for more than 5%. of cameras.
Video quality/positioning/focusing of Cameras are not as per the
requirements for more than 5% of cameras.
Continuous recording as per the requirements is not available in the
system.
Level-4 High Risk
Telephone/PABX and security screening equipments are not installed
as per the requirements.
Valid Maintenance contract is not available for the security system.
Appropriate action is not taken for the inspection remarks mentioned
from last 1 inspection.
Video Loss for more than 3% of cameras.
Video quality/positioning/focusing of Cameras are not as per the
requirements.
Video quality/positioning/focusing of Cameras are not as per the
Level-3 Medium Risk requirements.
Alarm logs are not configured as per the requirements.
Appropriate spare equipments are not available on site.
Connectivity requirements to the Source are not ready as per the
specifications.
Cameras are not cleaned as per the environmental conditions.
Level-2 Low Risk
Control Room log register book is not available during inspection.

Level-1 No Risk Security systems are working/operational as per the


standards/requirements.

Page | 36
Security Monitoring Standards V4.0/2015

10.Appendix A: Questionnaire/Information

This section provides a questionnaire for the Client concerning information on the current and
enhanced CCTV system.

This questionnaire will serve as a guideline for the preparation of the implementation plan to
upgrade the current system/design new system as accurately as possible.

A. Client General Information

Document Reference: MCC/SMS/CGI-v0.0


Required Information Client Reply
Client name:
Client star category:
Client Address:

Client Phone Number:

Client Manager:
Client Head of Security Name:

Client Head of Security Phone:

Client Head of Security Mobile:


Client Head of Security email id:
Client CCTV System implementation PM Name

Client CCTV System implementation PM Phone:


Client CCTV System implementation PM Mobile:

Client CCTV System implementation PM email id:

Page | 37
Security Monitoring Standards V4.0/2015
B. Client System Integrator Information

Document Reference: MCC/SMS/SII-v0.0


Required Information Client Reply
Integrator name:
Integrator Address with location:

Integrator Phone Number:

Integrator CCTV System implementation PM Name

Integrator CCTV System implementation PM Phone:

Integrator CCTV System implementation PM Mobile:


Integrator CCTV System implementation PM email id:

C. Client Current CCTV System Information (if any)

Document Reference: MCC/SMS/CCSI-v0.0


Required Information Client Reply
Current CCTV System Name:
Current CCTV System Manufacturer:
Current CCTV System UAE Representative:
Current CCTV System Vendor Name:
Current CCTV System Vendor Address:
Current CCTV System Vendor Phone:
Current CCTV System Vendor POC Name:
Current CCTV System Vendor POC Cell:
Current CCTV System Vendor POC email id:
Current CCTV System Type (Analog/Digital/Hybrid)
Current CCTV System Video Format
(Proprietary/MPEG2/H264/)
Does the current CCTV System use Video
Encoders/Transcoders and from which type and
model:
Does the current CCTV System cameras/VMS are
ONVIF supported:
Does the current CCTV System use network Switch
and from which type and model:

Page | 38
Security Monitoring Standards V4.0/2015

Required Information Client Reply


Does the current CCTV System use network
Firewall and from which type and model:
Is the current CCTV System supported by a
UPS/Power Generator? Please describe type and
capacity:
How many Operators' screens - and from which type
and model - are allocated for Security personnel to
view video in the current CCTV System?
Describe other system components and software
features of the current Client CCTV System:

D. Client Enhanced/New CCTV System Information

Document Reference: MCC/SMS/NCSI-v0.0


Required Information Client Reply
CCTV Camera
brand/model/resolution/firmware/origin/Quantity
CCTV VMS brand/model/version/origin
CCTV Servers brand/model/origin

CCTV Workstations brand/model/origin


CCTV Storage brand/model/origin/Usable capacity
CCTV Network switches brand/model/origin

CCTV Firewall brand/model/origin


CCTV video display system brand/model/origin
CCTV UPS brand/model/origin/capacity

CCTV Structured cabling brand/model/origin

Define Enhanced System Network Communication


Line bandwidth:

Does enhanced/new system hard disks used for


storage system is enterprise level with minimum
7200 RPM?

Does enhanced/new system have fully redundant


network design without any single point of failure
with multicast routing supported?

Page | 39
Security Monitoring Standards V4.0/2015

Required Information Client Reply

Does enhanced/new system have dual


communication uplinks for servers/storage system
without any single point of failure?
Does enhanced/new system integration cabinet
include a tampering switch and alert mechanism that
alerts each time the system cabinet is opened?
Does the minimum 4 core single mode fiber
connectivity from the system integration cabinet to
Etisalat POP room available?
Is enhanced/new system supported with UPS/Power
Generator?
Describe other system components and software
features of the enhanced/new Client CCTV System:

E. Client Enhanced/New CCTV System Camera information (For all cameras)

Document Reference: MCC/SMS/NCCI-v0.0


Camera Unique Bandwidth and
Coverage Area(Location) Type(FC/PTZ) FPS
ID Video Resolution

Page | 40
Security Monitoring Standards V4.0/2015
F. Camera Details Table (On each floor CCTV layout drawing)

Document Reference: MCC/SMS/CDT-v0.0


Camera Details Lens Details
Camera Coverage Purpose Coverage(in CCD Focal
Type Mounting F.O.V
ID Area(Location) (Source/Client) meters) size Length
H=
V=

G. Project Work Plan

Document Reference: MCC/SMS/PWP-v0.0


Milestone Due Date Status Comments
Current CCTV System Description
Choosing a Vendor to enhance the
current CCTV System
Design of the enhanced CCTV system
Design Approval
Hardware and Software procurement
Installation of new cameras
Installation of new system cabinets,
network and its head end equipments.
Testing & Commissioning of the system
Preliminary Inspections and approvals
Integration with Source system and final
tests.

Page | 41
Security Monitoring Standards V4.0/2015
H. Confidentiality Undertaking (Non-Disclosure Agreement)

Document Reference: MCC/SMS/NDA-v0.0

Ref. No.:
Date:

CONFIDENTIALITY UNDERTAKING

Company Name (hereinafter Undersigned), hereby makes the following undertaking regarding
matters of confidentiality and nondisclosure under its agreement (hereinafter Contract) with the
Name of Client (hereinafter Client) with respect to the installation of CCTV Systems (hereinafter
Project) for which the Contract was signed between the Client and the Undersigned.

For purposes of this Confidentiality Undertaking Confidential Information means all


development, marketing, financial, proprietary, organizational, management,
administrative, technical and other information (including, without limitation, all technical
information, photographs, films agreements, reports, files, books, logs, charts, records,
studies, surveys, schedules, specifications, processes, plans, maps, statistical information
and customer data/lists) which is not generally available in the public domain. The term
Confidential Information also includes all reports, memoranda, notes, documents and
other media containing confidential information, as well as any copies and extracts of
Confidential information and any computer-generated studies and data containing
Confidential Information.

The undersigned undertakes to keep secret and not divulge to third parties, without the
written consent of the Monitoring & Control Centre (Source), the following:

a. Any
and all Confidential Information in connection with the Project that is furnished or
disclosed to the Undersigned by, or acquired by the Undersigned directly or indirectly
from any inputs including but not limited to the Client and/or Source or their officers,
agents and contractors;

b. Any
and all Confidential Information regarding the Undersigneds role, duties and
obligations under the Contract; and

c. Any
and all Confidential Information relating to the Undersigneds findings, opinions,
photographs, films, recommendations, work product and deliverables under the
Contract.

Page | 42
Security Monitoring Standards V4.0/2015
The Undersigned undertakes to use its best efforts to prevent the unauthorized use, disclosure
or availability of any Confidential Information which it receives in connection with the Project
and/or Contract. Such efforts shall include, among other things, securing writings, documents
and other media containing such Confidential Information in a safe or locked file cabinet or the
equivalent.

Upon termination of the Contract, the Undersigned shall either return to the Client or, if
requested by the Client, destroy all copies of any media or materials containing Confidential
Information. Upon request, the Undersigned agrees to certify it has completed such action.

The Undersigned acknowledges and agrees that the unauthorized use or disclosure of any
Confidential Information by the Undersigned in violation of this Confidentiality Undertaking will
cause substantial damage to the Client and /or Source. In the event of any violation of this
undertaking, the Undersigned will be subject to all penalties stipulated in the UAEs law. The
Undersigned shall notify Client and/or Source immediately and cooperate with them at their
requests, upon discovery of any loss or compromise of Confidential Information related to the
Project and/or Contract.

Now withstanding paragraph 2 above, the Undersigned shall be entitled to disclose Confidential
Information to any of its directors, employees, agents, sub-contractors and professional advisers
as are required in the course of their duties to receive and consider the same for the purpose of
the Contract. The Undersigned shall procure that all such persons are bound by written
agreement to the duties of confidentiality and non-disclosure as set forth herein.

No reference to the Project or the Contract may be made in any advertisement, brochure,
circular or other promotional document issued by or on behalf of Undersigned or any of its
affiliates, which is intended to interest or attract potential customers, unless Source has
previously received and approved in writing a copy of all such references.

The provisions of this Confidentiality Undertaking shall survive the expiration or termination of
the Contract for an unlimited period of time.

__________________________
The Undersigned

Name:
Designation:
Date:

Page | 43
Security Monitoring Standards V4.0/2015

1. Checklists/Register Logs templates

A. Control room visitors Log

Document Reference: MCC/SMS/CVL-v0.0


Date Arrival Departure Surname Init. Organization Position Signature Signed
In By

Page | 44
Security Monitoring Standards V4.0/2015
B. CCTV Incident Log

Document Reference: MCC/SMS/CIL-v0.0


Date: Time: Location:

Incident Type:

Recording Number: Live Incident Recording: YES/NO

Name of Person Reporting: Employer:

Description of Incident:

Response to Incident:

If Police required, time requested: Time of Police arrival:

Name(s) of attending Police Officer(s): Registered Number(s):

If medical assistance required, time Time of medical assistance arrival:


requested:

Name(s) of attending Medical Officer(s):

Name of Monitoring Room Officer: Signature:

Page | 45
Security Monitoring Standards V4.0/2015
C. CCTV Maintenance Log / Fault Reports Log

Document Reference: MCC/SMS/CML-v0.0


Date: Time: Engineer:

Reason: Regular Maintenance / Call Out

Maintenance Details:

Outcome:

D. Viewing Log of CCTV Images

Document Reference: MCC/SMS/VLC-v0.0


Date of Viewing Time of Viewing Camera Identifier Operator

Page | 46
Security Monitoring Standards V4.0/2015

Name(s) of Person Viewing Organizational Details

Reason For Viewing

Outcome If Any

Page | 47
Security Monitoring Standards V4.0/2015
E. Issued Copy of Image Log

Document Reference: MCC/SMS/ICIL-v0.0


Reason for Provision: Legal Proceedings/Subject Access/Other
Date of Creation Time of Operator Camera Identifier
Creation

Crime/Incident No
Police Officer/Third
Party Name

Contact Details

Signature of Third Date of Signature of Manager


Party Destruction or
Return

Page | 48
Security Monitoring Standards V4.0/2015
F. Daily CCTV System Check Log

Document Reference: MCC/SMS/CSCL-v0.0


Date Time Operator Date/Time Cameras &
Stamp Checked Recording Quality
Checked

Page | 49
Security Monitoring Standards V4.0/2015
G. CCTV, Control room auditing checklist

Document Reference: MCC/SMS/CCAC-v0.0

CCTV & Control room auditing checklist Yes No violation N/A

Has the camera location been chosen designed with consideration to maximizing
visibility
All security investigations from CCTV being reported to Source
Has the site been chosen with consideration to protecting the camera structure and
ensuring it will last without undue maintenance necessary to the structure and
surrounding site
Cameras are focused
Has (CCTV) been installed as per the coverage area requirements
Field of View is adjusted to meet operational requirements
Camera lens and housing viewing window are clear from dust and debris
Camera pan/tilt/zoom is working properly
Camera signal is free from interference
Camera vision is being recorded
Camera vision is being recorded for the period as per the requirements.
Storage system is working properly
All security incidents footage being saved and kept in appropriate location for
safeguard of the information in accordance with Source standards
All security incidents footage being communicated with Source
Are critical files under lock and key to limited access
In addition to CCTV, are there sound-monitoring systems to locate and listen to
sounds when the facilities are supposed to be unused?
Can all external doors be locked on command from a single security station?
Can all internal doors be locked on command?
Are there personnel assigned to watch the CCTV at all times?
Person monitoring the CCTV, is that his/her sole function?
Are external walls and windows of control room proof against easy access by a
saboteur?
Is there a system of signatures to control room access to documents, and data?
Is security documentation updated promptly when procedures or equipment are
changed or newly Implemented?
Is there a specific person or group assigned to review periodic reports on everyone
who has access badges for control room?
Are communications lines protected against external access (e.g., through manholes
adjacent to the building?
Have ID markings been removed from power rooms, communications closets, etc. to
reduce ease of locating critical resources?
Are there metal detectors in use for checking visitors to the control room?
Are internal doors in the control room fitted with self-closing mechanism?

Page | 50
Security Monitoring Standards V4.0/2015

CCTV & Control room auditing checklist Yes No violation N/A

Is there a prominent notice announcing outside control room AUTHORIZED


PERSONNEL ONLY-- OPERATORS MAY NOT ADMIT VISITORS WITHOUT
AUTHORIZATION.
Are operator and maintenance manuals stored neatly in an assigned place in the
control room?
Are control room operator trained to refuse access to the control room to
unauthorized visitors no matter how high their apparent or claimed rank within the
organization?
Are control room operator trained to phone for help if an unauthorized visitor (say,
the CEO) demands admittance despite the posted restrictions?
Is there a liaison program with local law enforcement agencies?
Do personnel know how to handle and report telephone bomb threats?
Are there intercom systems between the control room and other areas within the
building?
Are hinges of control room doors on the inside only (inaccessible from outside)?
Are control room doorframes solidly installed in the walls?
Are there astragals (protectors on the control room door edge) to preclude tampering
with the latches?
Are there first aid stations clearly marked and readily accessed in the control room?
After hours personnels, get periodically unannounced visits from manager to ensure
that they are doing their job properly? Not committing criminal breach?
Are there sufficient numbers of security filing cabinets to properly secure sensitive
documents in control room?
Are all control room keys systematically stored in a secure wall cabinet?
Is there a policy that control room keys and will not be marked with information that
identifies the facility to which they belong?
Are Camera positions and numbers marked on control room
Operator maps. To ensure camera numbers are marked on the actual camera
Pole/support/structure to give a point of reference for security officers on the ground
when communicating with the control room.

Page | 51
Security Monitoring Standards V4.0/2015
H. Details of Control room auditing

Document Reference: MCC/SMS/DCA-v0.0

General Site Information

Premises

Address

Telephone/email
Contact name

CCTV Control Room Details

Size of CCTV operator team in total


Day: Night:
Number of operators and
supervisors day/ night shift

Operators employed directly by site


or through third party contractor?
Local: Remote:
Sites monitored

Location of control room

Total number of cameras

Security incidents detected by the


CCTV communicated to Source?

Violations

ASSESSOR
SIGNATURE

PRINT NAME

Date(s) of site visit(s)

Page | 52

You might also like