Administrative building Protection of property, records of movement of persons, management of entering into protected areas

1 THE SITUATION

The owner of a 9-floor administrative building rents his building to several companies. Each tenant uses their premises individually and on different days of the week. All tenants use a common entrance door into the building. 

The common door into the building is equipped with a safety lock; every employee in the building has their own key...

Viac info

THE SITUATION

The owner of a 9-floor administrative building rents his building to several companies. Each tenant uses their premises individually and on different days of the week. All tenants use a common entrance door into the building.

The common door into the building is equipped with a safety lock; every employee in the building has their own key. 

During the absence of people in the building, the main door is closed. This is the responsibility of the last person leaving. It is their duty to lock the door to the street when leaving. During the day, the main door is open and practically anyone from the street can enter the building. Entrance into the premises used by tenants on separate floors are likewise not guarded. In the same fashion, using the elevator in the building is in no way restricted.

At a meeting with the owner of the building, the tenants complained about issues related to the building’s lack of security, mainly:

  • Unwanted people coming into the building
  • Risk of robbery in the rented premises of individual companies
  • Possible physical assault of employees working in the building
  • The very use of keys
  • In case of a lost key, the security risk is only possible to eliminate by changing the safety lock and all keys at the same time
  • It is impossible to identify who entered the building and when
  • Absence of compliance with safety regulations
  • Upon leaving the building, the last person would often forget to lock the main door; oftentimes because the person does not know they are the last one leaving the building
  • When it comes to breaking the rules, it is difficult to find out who broke them or did not do what was supposed to be done

After presenting these objections, objectives leading to the improvement of security in the building were determined.

2 OBJECTIVES

  • To prevent unwanted and unwelcome people from entering the building
  • To identify each person entering the building
  • To limit the movement of tenants into a designated area only
  • To use keys only as a secondary means of securing the building

3 SOLUTION

When determining the objectives, it was essential to identify tools that, if employed correctly, would lead to successfully meeting the objectives. As key tools we chose the following:

  • A system for monitoring the movement of persons in the building
  • A system securing the premises of individual companies and the building itself during the absence of tenants
  • A door communicator system for the main door and individual doors on each floor

Based on the analysis of the situation, it was decided that the building would be equipped with the Contal Nova Security System... 

Viac info

SOLUTION

When determining the objectives, it was essential to identify tools that, if employed correctly, would lead to successfully meeting the objectives. As key tools we chose the following:

  • A system for monitoring the movement of persons in the building
  • A system securing the premises of individual companies and the building itself during the absence of tenants
  • A door communicator system for the main door and individual doors on each floor 

Based on the analysis of the situation, it was decided that the building would be equipped with the Contal Nova Security System. Given the nature of the Contal Nova system and experience from similar buildings, the installation of the system was smooth and flawless. The following steps were taken:

1 Choice of appropriate identification cards

Given the security standard of the Contal Nova system, Mifare technology was used for the identification cards. This technology uses the segment reading of encrypted data saved on the identification card.

The division of the building into access (or alarm) zones

(common area and areas used by individual tenants)

The area was divided into seven zones:

  • Common area
  • 6 individual parts of the building in use by tenants

 

3 Employing security elements into individual parts of the building

The main door was equipped with a certified electric self-locking lock with security hardware, then with a card reader and with a camera intercom. The electric lock is operated from the access system or from the door communicator. That means that a person authorized to enter the building will use their own identification card and will enter a code. In a visitor arrives at the building, after ringing the intercom the tenant responsible for their visitor will open the door. The joint combination of a card and a code dramatically increases the level of security of the building in the event of an identification card being lost or stolen.

In the area behind the door, we installed a security system terminal which is used to operate various alarm zones. The entrance door on each floor was equipped with an electrical door lock, a card reader and an intercom. Since there is an elevator in the building, it was also equipped with a card reader so that it can be operated individually. All alarm zones were equipped with motion sensors and sensors for broken glass. All tenants’ employees were given an identification card to use when entering the building and authorized premises.

4 Outlining the rules for using the system

The last employee leaving the building will activate an alarm zone on the terminal and will lock the entrance door with the key. The next morning, the first person entering the building will deactivate the alarm zone and will use their identification card to enter their workplace.

5 Linking the premises to the Alarm Receiving Center

The security system is linked to the Alarm Receiving Center of the Slovak Police.

4 Results

  • Protection of tangible and intangible assets of the company
  • Prevention of unauthorized persons from entering the company
  • Detailed record of movement of people inside the
kia logo
2000px Brother logo v2.svg
doka
Donghee
grafobal
HYZA
inteva
Logo of Plastic Omnium
Mobis
osram
Reutter
TEAM
vac
VAHOSTAV SK 2 COLOR 300dpi
cta

The solutions you will be using

We have the right tools for ensuring the safety of your company.

Jazyková mutácia / Select site language