Menu
0
Total price
0 €
PRICES include / exclude VAT
>UNE EN 60839-11-2:2015 - Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application guidelines
sklademVydáno: 2015-10-07
UNE EN 60839-11-2:2015 - Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application guidelines

UNE EN 60839-11-2:2015

Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application guidelines

Sistemas electrónicos de alarma y de seguridad. Parte 11-2: Sistemas electrónicos de control de acceso. Guía de aplicación.

Format
Availability
Price and currency
Anglicky PDF
Immediate download
Printable
120.84 €
Anglicky Hardcopy
In stock
120.84 €
Španělsky PDF
Immediate download
Printable
100.70 €
Španělsky Hardcopy
In stock
100.70 €
Označení normy:UNE EN 60839-11-2:2015
Počet stran:67
Vydáno:2015-10-07
Status:Norma
Počet stran (Španělsky):38
DESCRIPTION

UNE EN 60839-11-2:2015

This part of IEC 60839 defines the minimum requirements and guidance for the installation and operation of electronic access control systems (EACS) and/or accessory equipment to meet different levels of protection. This standard includes requirements for planning, installation, commissioning, maintenance and documentation for the application of EACS installed in and around buildings and areas. The equipment functions are defined in the IEC 60839-11-1. When the EACS includes functions relating to hold-up or the detection of intruders, the requirements in standards relating to intrusion and hold-up are also applicable. This standard provides application guidelines intended to assist those responsible for establishing an EACS to ascertain the appropriate design and planning of the EACS, both in terms of levels of protection and levels of performance necessary to provide the degree of access control and protection considered appropriate for each installation. This is achieved by scaling or classifying the features of electronic access control systems related to the security functionality (e.g. recognition, access point actuation, access point monitoring, duress signaling and system self-protection) in line with the known or perceived threat conditions. This standard does not cover the methods and procedures for conducting a risk assessment.

Categories: