APPENDIX 1: TECHNICAL SPECIFICATIONS AND

2y ago
86 Views
2 Downloads
626.34 KB
23 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Joao Adcock
Transcription

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & RequirementAPPENDIX 1: TECHNICAL SPECIFICATIONS AND REQUIREMENTINTEGRATED ASSET & SECURITY MANAGEMENT SYSTEMSINCLUDING SECURITY TURNSTILES AND IT’S RELATED SERVICESFOR MIMOS BERHADA. SYSTEM REQUIREMENTFunctional Requirement1. Asset Management Module that capable to perform, at minimum, the following tasks:a. Real-time tracking and locating of assets within MIMOS‟ predefined labs ordepartments or areas within MIMOS premisesb. Real-time visibility of mobile and high value assets with real time tracking,monitoring and security featuresc. Automated asset auditing and stock countd. Automated and real-time reporting of asset movement and locationse. Automated recording of assets taken out through the exit (6) doorsf. Automated alert and notification system on unauthorized asset movement orstatus.2. Security Access Management System must be able to perform multiple functions andintegration of security features in MIMOS which include:a. door access management (biometric and non-biometric readers/controllers),b. Turnstiles (waist-height and full height)c. Other Security barriers (which include boom gates, swing door etc)d. Biometric TMS reader/ time clocking,e. Guard Tour Tracking & Reporting Subsystemf. Intrusion Monitoringg. ID/Badge Printing software to ”Peclin” Printerh. Visitor Management sub-systemi. CCTV Interfacing Sub-system (existing)j. Interfacing with Fire Alarm System (existing)k. Sms alertExisting Door Access Points/Readers and TMS ReadersDoor Access Reader cum arkMalaysia(TPM)111312126BiometricControllerKulim HiTech Park(KHTP)Total091112213101136TMSReadercum1Kulim HiTechPark(KHTP)081920211112TechnologyPark Malaysia(TPM)Total1

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & RequirementRequired Turnstiles Types and LocationTypeLocationQuantity2 lanes bi-directional Main Lobby2waist height1 lane bi-directional4 locations in TPM6Existing CCTV System: 1) DVR Panasonic and 2. NVR Indigo System2. The software should provide user friendly features to provide proper access control,time management system, visitor management system and ID/card managementsystem and unified user interface with GUI that include floor plan and location of doorsand CCTV with proper licenses that link and allow sharing of data between MIMOS atTPM Kuala Lumpur and MIMOS in KHTP, Kulim, Kedah.3. All hardware – computers, readers/controllers and barriers & turnstile readers - mustbe able to communicate via industry standard TCP/IP protocols4. The desired system is shown in architectural diagram below.Security AdminFireAlarmID&PhotoBadgeVisitor Management@ Lobby SMS/EmailalertTMSHR dBESSISMS WorkstationBack up &ReplicationSolutionMIMOS @KHTP Door Access ReadersD Time lmentOCC GUIs GuardTour Access Control Intrusion Video SolutionRedundantserversIntegrated Assets &Security ManagementSystems at MIMOSserver farmIndigo NVRRfIDreadersat exitdoorsAssetsManagementTerminalsRfID AssetReaders inDepts /Labs1,000itemsInlabs/deptsWithactiveRfIDBiometric AttendanceReaders at entry exitpointsDoor AccessTurnstilesProposed MIMOS Integrated Assets & Security Management System Architecture Diagrama. The systems must be able to interface with Corporate Human Resource(CHR) SAP data base for the provision of effective clock in/out data to CHR/Employee Self Service (ESS) Absent & Leave Report2

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & Requirementb. The system must be able to provide visitor management capabilities whichinclude reading input from Malaysians MyKad, and Passport and othersubstitute documents for foreign visitors, issue and retain visitor pass /card atthe turnstilesc. The system must be able to integrate the CCTV surveillance solutions fromPanasonic DVR and Indigo NVR and direct from the desired cameraslocationsd. The system must be able to support future need to “alert” and “report” assetstagged with RID passing through main exit doors.e. The systems must be able to provide single unified user interface formonitoring and control of access, intrusion and CCTV/digital video solutions.f. The systems must be able to provide web based alert solutions for assets andsecurity intrusiong. The system shall have a user friendly features at the System AdministrationWorkstation, Visitor Management Workstation and Operations Control Centre(OCC)5. The Security Management Systems (of the project) is required to replace the presentdoor access management systems but it must be able to use the existing Mifare smartcard IDs, the door access readers cum controllers and the related infrastructure(power, network connection and locking devices)6. To be deployed at both MIMOS TPM and MIMOS KHTP and the system shall bedeployed on a network; it shall be based upon a TCP/IP 10/100/1000 architecture.3

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & RequirementB . SPECIFIC REQUIREMENT1. ASSET MANAGEMENT SYSTEMa. The basic system of asset management module must have an open systemarchitecture, support Oracle and Microsoft SQL Server databases, cover currentinterface standards and support at least the following basic functions:oAsset Tag – Active RFID with smart sensors which will be embedded intoassets and equipment for real time wireless traceability and monitoringoActive Reader – Hardware which will read and relay the received informationfrom the asset tags to the enterprise softwareoCabling and Networking – CAT5E connectivity and networking from ActiveReaders to the Serverb. The basic system for the implementation of asset management is as follows;o Active Readers are mounted in work areas and defined as locations such asFinance Dept, Engineering Lab – MEMS or IT Dept. These readers will scanand receive signals from Active RfID tags embedded in assets andequipment.oWhen mobile assets pass through the defined zones, the Asset Tags willcommunicate with the Active Readers.oThe received signals and data packets will be processed by the ActiveReaders and relayed to the Server for the Enterprise software to process.The logical layer of the software will then determine if certain actions need tobe executed, or if certain rules or logics have been breached so notificationsneed to be sent.oThe full history of the assets movement and location within the building canbe recorded, monitored and filtered according to user‟s requirements.oAt any given time, users may login and perform exercises to:i. Search a particular asset‟s locationii. Summarize the total number of assets in the building, and its respectivelocationiii. Apply rules and triggers so a particular asset is not allowed to leave ormove from a defined areaiv. Apply real time notification via email or SMS to notify stakeholders if acertain breach has occurred.4

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & Requirementc. Specification of Components for Asset taggingi. Asset TagThe Active RfID tag with smart sensors is a high performance wirelesstransceiver device which can be affixed to virtually any asset or equipment(laptops, computers, laboratory / electronic equipment, pallets, inventoryitems, etc.). These devices transmit and receive signals and informationpertaining to the location, status and ID of the tagged asset or equipment.Signals from an Active RFID tag can travel and be detected from much fatherdistances up to 150m in a line of sight situation. In an office environment, itssignal can penetrate through doors, walls and other obstructions such ascubicles and cabinets. This feature allows it to appear „visible‟ in the systemat all times.The general specifications of the Active RFID tags are:o Functional on 2.4Ghz or 433Mhz frequency with embeddedmicroprocessor and firmware, with built in motion sensorso Ultra Low Power architecture with 3 years usage with single CR2032 coinbatteryo Covering at least 150m rangeo Slim fit enough to be applied on or within an asset or equipmentii. Employee Tag (Not for immediate implementation)The Employee Active RfID tag provides convenient, hands free identificationof personnel for access control and people tracking without gettingclose/touching the reader or transponder.Tag signals can travel longer distances than the normal passive/proximityemployee cards for more than just employee tagging, but also security andmovement / access controls.The general specifications of the Active RfID tags are:o Functional on 2.4Ghz or 433Mhz frequency with embeddedmicroprocessor and firmware, with built in motion sensorso Ultra Low Power architecture with 3 years usage with single CR2032 coinbatteryo Ability to be detected from within a bag or pocket, allowing an automatedpresence verification at any door accessiii. Active Tag Reader / SensorThe Active RfID Tag Reader or sensor is a networked transceiver devicewhich can detect signals from the Active RFID tags, and convert them intodata to the application software.The Active RfID Reader will be networked via CaT5E lines to the applicationserver where data will be passed to the application engine for processing andaggregation.The general specifications of the Active RFID reader are:o Functions on 2.4Ghz or 433Mhz RF5

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & RequirementooAbility to read and process hundreds of Active RfID tags simultaneouslyReal time data push to server for software processing and dataaggregationiv. Multi Tier Enterprise Applicationo The central software system to monitor the tagging, tracking andmonitoring of assets within the buildingo Web based software for ease of deployment and usage by respectiveMIMOS userso Open and scalable using basic common software development languages(such as .Net, PHP, Flex and mySQL) for easy customization and futureenhancemento Built in reporting module to ease data aggregation and disseminationo Built notification services and features for integration with email, SMS orother alert systems preferred by MIMOS6

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & Requirement2. SECURITY ACCESS MANAGEMENT SYSTEM2.1 GENERALThe requirement for the Security Access Management Systems:The system must be able to perform multiple functions and integration ofsecurity features in MIMOS which include door access management (biometricand non-biometric), barriers (which include turnstiles, boom gates, swing dooretc), time clocking, intrusion monitoring and guard tour.The systems must be able to interface with Corporate Human Resource (CHR)SAP data base for the provision of effective clock in/out data to CHR/Employee Self Service (ESS) Absent & Leave ReportThe system must be able to provide visitor management capabilities whichinclude reading input from Malaysians MyKad, and Passport and othersubstitute documents for foreign visitors, issue and reads retained visitor passcard at the turnstiles.The system must be able to integrate the CCTV surveillance solutions fromPanasonic DVR and Indigo NVR and direct from the desired cameras locationsThe system must be able to receive “alert” signals and “report” RfiD taggedassets that passed through exit doors.The systems must be able to provide single unified user interface for monitoringand controlling of access, intrusion and CCTV/digital video solutions.The systems must be able to provide web based alert solutions for assets andsecurity intrusionThe system shall have a user friendly GUI features at the Asset ManagementTerminals, System Administration Workstation, Visitor Management Workstationand Operations Control Centre (OCC).i. For the Security Admin Workstation, the software should provide userfriendly features for the registration of new staff and automatic creationand printing of photo ID; deregistration of staff but keeping the staffparticulars, suspension and blacklisting; time zoning and locking planmanagement, plus access management report which include the capabilityto provide the number of people in the building at any time on demandii. The workstation at OCC should be provided with unified view of floor planof access points, CCTV and real time CCTV data and recorded view.iii. The visitor management system should have the feature to issue restrictedor zone visitor card and retain the card in the turnstiles at the end of thevisitiv. For web-based alert, the system must be able to generate and send alertto laptop and hand held devices via sms and emailTo be deployed at both MIMOS TPM and MIMOS KHTP and the system shallbe deployed on a network; it shall be based upon a TCP/IP 10/100/1000architecture.7

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & Requirement2.2 DOOR ACCESSFor the Security Admin Workstation, the software should provide user friendly featuresfor:a. the registration of new staff and send staff information for ID/batch with photoprinting at the printerb. sufficient/customized fields for staff informationc. deregistration of staff but keeping the staff particulars,d. suspension and blacklisting of staff/visitors;e. time zoning and area zoningf. locking plan management,g. linking with the turnstiles and provide access management report and functionto provide the number of people in the building at any timeh. keeping and allowing fast retrieval of an individual (employee or any IDholder) historical access activitiesi. keeping and allowing fast retrieval of access door readers activitiesj. real time report/record of access door performancek. reading/retrieving records of specific door and all doors performance –uptime/down timel. must be able to interface with MIMOS Firealarm system and release all doorswhen fire alarm is triggered or released.2.3 TIME MANAGEMENTThe system must be able to provide at least the following requirements:a. The readers and the software must be able to read finger print/biometric inputsin less than 3 secondsb. The system must be able to identify the first (in) and the last record (out)reading of the day for every employeec. Clock In/Out data must be efficiently sent to CHR ESS Absent and LeaveRecordsd. Easy features/command to read and print historical records for every employeee. Friendly function/button to click on to get the number of people clock in and outfor the day and past days‟ records.2.4 SUB SYSTEMS2.4.1 VISITOR MANAGEMENT SYSTEM (VMS) AND INTEGRATIONThe VMS subsystem must have at least the following features:a. The system must be linked and integrated with turnstiles and access readersb. VMS workstations are equipped with the peripherals to read MyKad and othersubstitutes for foreign visitorsc. The VMS terminal/workstation efficiently issues pass for restricted zones and/orunescorted visitorsd. Workstation records visitors card returned/retained in the turnstilese. Database management of all historical records for blacklist verification andautomatic update for repeat visitorsf. Friendly quick functions to check number of visitors in the building, and dailyrecord on number of visitorsg. Visitor web-based pre-registration function (optional)8

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & Requirement2.4.2 ID/Photo Printing RequirementID/photo badging or card issuing management system with the following function:a. Link ID/badge printing machine to Access Management Workstationb. Print badges by capturing personal information and ID particulars from theaccess management data basec. Have ID/photo database (photos and personal particulars) for reprint ofID/badged. Can capture image from any video camera or scannerse. The software are supported by most of the graphic formats. (E.g. BMO, PEG,Tiff, GIF. etc)2.4.3 DVR/NVR Integration to Security Access Floor PlanThe system must have the following features:a.b.c.d.Click on camera icon for live video display or camera controlEvent triggered video recording and playback by clicking camera iconAutomatic live video pop-up on alarm triggerSearch recorded video for playback2.4.4 Easy To Monitor Graphical User Interface (GUI)The system must be able to provide easy to observe and use GUI for intrusiondetection, access control and CCTV with floor plan and camera and access doorlocations. This will include:a. The capability to give automatic live video window pop up upon alarm activationor clicking the respective camerasb. To display/alert doors that are opened for more than certain time (3 minutes)c. Access control device parameters linked to CCTV cameras3. The basic system of an security access management system must have an opensystem architecture, support Oracle and Microsoft SQL Server databases, covercurrent interface standards and support at least the following basic functions:Freely scalable system solution, i.e. expandability must be guaranteed overthe entire life cycle with full upwards compatibility (life cycle management orLCM) It must be possible to implement the organisational and technicalsecurity requirements in a flexible, modular mannerOpen system architecture, i.e. the use of existing IT infrastructures and ITenvironments must be possible. Oracle and Microsoft SQL Server databasesmust be supported. See also System ArchitectureThe system solution guarantees distributed intelligence with a decentralizedarchitecture to ensure maximum operational reliability and stability.9

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & RequirementThe basic system must include all necessary management, alarm and loggingfunctions.Support of Single Sign On (SSO)Staff data management: Registration and management of staff data, includingphoto. Assignment of access rights and time and attendance (T&A) models.Generation and detailed evaluation of reports and statistics based on definedcriteria.System management : Central configuration and management of peripheraldevices in the system. It must be possible to use the same systemmanagement for both online and standalone components, in other words nonwired access points.Management of mechanical locking systems of 50 componentsLogging : Recording of all events, alarms, instances of access, system errors,security-related user actions, etc. must be guaranteed at all times in bothonline and offline mode.Monitoring and control of various alarm zones in connection with an intruderdetection system.It must be possible to transfer the access rights and T&A data from an activebadge to a transition badge if requiredIt must be possible for remote maintenance to establish a connection betweenheadquarters and a remote branch office over a phone line.10

MIMOS BERHAD(33183-H)APPENDIX 1: Technical Specifications & RequirementGENERAL SYSTEM REQUIREMENT1. System Architecturea. Operating SystemsThe System shall function under the latest/any Windows platform:i. Vista Enterpriseii. Vista Ultimateiii. Vista Businessiv. XP Prov. Windows 2003 Serverb. Server/ClientAny server/client running operating systems listed in 1a above will be capable ofrunning both the Client and Server Software. The server/client shall have astandard 10/100/1000 Ethernet Card.c. Network RequirementsThe system shall be deployed on existing MIMOS network infrastructure; it shallbe based upon a TCP/IP 10/100/1000 architecture.d. System StructureThe System shall consist of 3 sectionsi. Server SoftwareThe Server Software shall consist of the database, communications protocolto the access control hardware, communications protocol to the Clients anda GUI for Server administration. Because of security concerns, the solemethod for accessing the Server shall be the Client. There shall be nobrowser access into the Server. The complete Software database shallreside solely on the PC housing the Server to take advantage of networkback up tools. The complete Server Software and Database shall not residesolely on the access control hardware.The database shall be SQLcompliant. There shall be no 3rd party license fees associated with the SQLdatabase.ii. Client SoftwareThe Client (defined here as the

management, plus access management report which include the capability to provide the number of people in the building at any time on demand ii. The workstation at OCC should be provided with unified view of floor plan of access points, CCTV and rea

Related Documents:

Issue of orders 69 : Publication of misleading information 69 : Attending Committees, etc. 69 : Responsibility 69-71 : APPENDICES : Appendix I : 72-74 Appendix II : 75 Appendix III : 76 Appendix IV-A : 77-78 Appendix IV-B : 79 Appendix VI : 79-80 Appendix VII : 80 Appendix VIII-A : 80-81 Appendix VIII-B : 81-82 Appendix IX : 82-83 Appendix X .

Appendix G Children's Response Log 45 Appendix H Teacher's Journal 46 Appendix I Thought Tree 47 Appendix J Venn Diagram 48 Appendix K Mind Map 49. Appendix L WEB. 50. Appendix M Time Line. 51. Appendix N KWL. 52. Appendix 0 Life Cycle. 53. Appendix P Parent Social Studies Survey (Form B) 54

Appendix H Forklift Operator Daily Checklist Appendix I Office Safety Inspection Appendix J Refusal of Workers Compensation Appendix K Warehouse/Yard Inspection Checklist Appendix L Incident Investigation Report Appendix M Incident Investigation Tips Appendix N Employee Disciplinary Warning Notice Appendix O Hazardous Substance List

Appendix D, Prescribed Form for Bidder's Profile 35 12. Appendix E, Letter of Authorized Person in Charge 36 13. Appendix F, Undertaking 37 14. Appendix G, Form of Technical Proposal 38 15. Appendix H, Form of Financial Proposal 39 16. Appendix I, Form of Performance Security 40 17. Appendix J, Bank Guarantee for Advance Payment 41

Appendix 1 - School Food and Beverage Policy 66 Appendix 2 - Trans Fat Standards (O.Reg. 200/08) 83 Appendix 3 - Calculating Trans Fat 84 Appendix 4 - A-Z Food and Beverage List 86 Appendix 5 - Cafeteria Food Service Provider Checklist 92 Appendix 6 - Caterer Checklist 93 Appendix 7 - School Event Menu Ideas 94

Appendix#10 Pre-Job Briefing and Post-Job Review Attendance Form Appendix#11 Safety Task Assignment (STA) Appendix#12 Physiological Monitoring for Heat Stress Appendix#13 Weekly Hour Usage Report Appendix#14 Project - Training Matrix A or B Appendix#15 Excavation Trench Inspection Form Appendix#16 Inbound Equipment Inspection Form

Appendix E: DD Form 577 for Appointing a Certifying Officer 57 Appendix F: Sample GPC Appointment Letters 58 Appendix G: Formal Reporting Requirements 66 Appendix H: Semi-Annual Surveillance Report Template 70 Appendix I: GPC Thresholds 73 Appendix J: Glossary – Sections I and II 75 Chapter 1: The Government Purchase Card Program 1-1. Purpose a.

Port Side. Appendix D . Appendix D . Page D-3. Changed to below 280 PSI and above 350 PSI. Appendix D . Page D-4. Changed to any fuel leak. Appendix E . Appendix E . Page E-3. Line item 10.C, added will not close completely. Appendix E . Page E-4. Line item 12.A, added grade 5 or better mounting . bolts. Appendix E . Page E-4.