news and insight laptop
 

Security Systems Guidance

 
Form 102
(Members Only)
Summary of changes between TS 50131-2-6:2004 and EN 50131-2-6:2008 – a guide (July 2010)

This guide describes, clause by clause, the changes introduced when TS 50131-2-6, opening Members only magnetic contacts, was converted to a standard and became BS EN 50131-2-6 in 2008. This guide has now been archived and can be requested by contacting the Technical team.

Form 104 
(Members Only)
Scenarios related to BS 8243:2010 Clause 6.4.5 – guidance (September 2010)

Under the PD 6662: 2010 scheme, BS 8243 replaces DD 243 to give requirements for confirmation Members only of intruder alarms. This guide helps with understanding of how systems work when using the method of unsetting described in Clause 6.4.5 (i.e. using a fob). The guide uses diagrams instead of words to describe a variety of possible events to show how the system should respond. For installers this guide will help to answer user questions and for manufacturers it will assist with equipment testing. This guide has now been archived and can be requested by contacting the Technical team.

Form 107
(Members Only)
Summary of changes to EN 50131-3 from TS 50131-3:2003 TO EN 50131-3:2009 – a guide
 

This guide describes, clause by clause, the changes introduced when TS 50131-3:2003 was Members only converted to EN 50131-3:2009. (November 2012)

Form 175

Industry agreement on the implementation of additional communication requirements between ATE and CIE (June 2012)

PD6662:2004 introduced requirements for exchange of additional information between CIE & ATE.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

Form 179

A guide to DD CLC/TS 50131-3:2003 part 3: control & indicating equipment (June 2012)
 

This guideline can be used by manufacturers to self certify their products to conform to the technical specification.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

Form 180

Interpretation of BS EN 50131-6:1998 alarm systems – intrusion systems (June 2012)
 

part 6 : Power Supplies – industry guideline

This document has been prepared to give guidance on the interpretation of some of the clauses in the standard that have been open to misinterpretation or that need further clarification.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

BS EN 50131-5-3:2005 interpretation guide (February 2006) 
 

This guide has now been archived and can be requested by contacting the Technical team.

Form 234

An industry guide to installation of IP-based secure signalling systems for intruder and hold up alarm systems (May 2008)
 

Guide drawn up to assist all parties in the design and installation of IP-based secure signalling systems. It is intended to be used in conjunction with PD6662.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

A guide to Hold Up Alarms (HUA) intervention using call back (Issue 3 - September 2020)

A guide to the correct use of using call back for users Hold Up Alarms (HUA) or Personal Attack (PA) systems.

Form 249

A guide to the CP249 interconnection protocol for use in I&HAS part 1: specification (Issue 2 – April 2011)
 

This open protocol specification permits manufacturers to develop Intruder and Hold-up Alarm System (I&HAS) products with genuinely inter-connectability by a 4-wire bus to simplify installation, whilst providing the functionality to comply with current and future standards.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

Form 251

An industry guide to Universal SPT Interface (February 2009)

 

A definition of an improved interface between alarm control panels and communication devices.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

Form 252

Guide to identifying end of line resistor configurations in magnetic contacts (January 2009)
 

Guide drawn up by BSIA manufacturers for installers for colour coding. The document gives guidelines that define a common framework to identify popular end of line resistor configurations as used in magnetic contacts whose resistors are embedded in the product at the point of manufacture.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

Form 280

Interpretation of EN50131-6:2008 Alarm systems Part 6 : Power supplies (December 2009)
 

This document has been prepared to take account of changes from the TS to the EN version of the standard. Form 180 (Guide to the TS version) is still available.

This publication has now been archived. If you would like to receive a copy please email the Technical Team.

Form 282

Intruder Alarm User Handbook & Logbook for Security Systems installed to European Standards
 

Handbook containing guidance on the management of a security system. It is based on the requirements of the European Standards. This booklet replaced previous publication 282 – Intruder Alarm Users' Handbook and Logbook and should be used for all new installations.

Email our team for more info on how to order!

 

 

Form 343

 

 

Form 354

 

 

 

 

 

Form 356

 

Manufacturers of safety and security systems: Cybersecurity code of practice

 


Security Fog Systems Installation, Commissioning and Maintenance: code of practice

This code of practice is intended to support the design, installation, commissioning, operation and maintenance of security fog systems (SFS) consisting of one or more security fog devices (SFD) conforming to EN 50131-8 and to ensure, as far as is practical, that such security fog systems (SFS), when installed, are focussed on mitigating the risks present while also satisfying the operational requirements for which they have been applied



Requirements for using a voice assistant as a non I&HAS interface

This document has been produced by the BSIA to recognise the increased use of voice assistants being employed to interact with IAS and offers solutions based on risk as to how they can be deployed in the confidence that the customer (or user) has agreed to, and is aware of, the risk and their ongoing role in how the risk is being mitigated.