13.310 – Protection against crime – PDF Standards Store ?u= Wed, 06 Nov 2024 01:08:40 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 ?u=/wp-content/uploads/2024/11/cropped-icon-150x150.png 13.310 – Protection against crime – PDF Standards Store ?u= 32 32 ISO/TR 10476:1990 ?u=/product/publishers/iso/iso-tr-104761990/ Wed, 06 Nov 2024 01:08:40 +0000 Doorsets — Assessment of burglar-proofness
Published By Publication Date Number of Pages
ISO 1990-03 7
]]>
The group of experts which has the problem of standardizing reproducible specifikations and tests covering the degree of burglar-proofness considered that the current state of information should be reported. Principles are indicated which may be used in establishing the strength so that htere are no weak points allowing the burglar to enter the dwelling easily. They apply to complete doorset with one or two leaves as supplied on side ready for installation.

]]>
ISO 22448:2010 ?u=/product/publishers/iso/iso-224482010/ Tue, 05 Nov 2024 22:35:33 +0000 Engins de terrassement — Systèmes antivol — Classification et performance
Published By Publication Date Number of Pages
ISO 2010-10 12
]]>
L'ISO 22448:2010 spécifie et classe sur sept niveaux les systèmes qui offrent une protection contre le vol des engins de terrassement définis dans l'ISO 6165 et fournit les critères de performance pour chaque niveau.

Elle donne également des recommandations relatives à la gestion de la documentation critique et des pièces de rechange sensibles pour la protection contre le vol.

Elle ne couvre pas les systèmes de géolocalisation qui surveillent l'emplacement des engins.

]]>
ISO 22341:2021 ?u=/product/publishers/iso/iso-223412021/ Tue, 05 Nov 2024 22:34:55 +0000 Security and resilience — Protective security — Guidelines for crime prevention through environmental design
Published By Publication Date Number of Pages
ISO 2021-01 30
]]>
This document provides guidelines to organizations for establishing the basic elements, strategies and processes for preventing and reducing crime and the fear of crime at a new or existing built environment. It recommends the establishment of countermeasures and actions to treat crime and security risks in an effective and efficient manner by leveraging environmental design.

Within this document, the term "security" is used in a broad manner to include all crime, safety and security-specific applications, so it is applicable to public and private organizations, regardless of type, size or nature.

While this document provides general examples of implementation strategies and best practices, it is not intended to provide an exhaustive listing of detailed design, architectural or physical security crime prevention through environmental design (CPTED) implementation strategies or restrict the potential applications to only those examples provided in this document.

]]>
ISO 18788:2015 ?u=/product/publishers/iso/iso-187882015/ Tue, 05 Nov 2024 22:10:37 +0000 Management system for private security operations — Requirements with guidance for use
Published By Publication Date Number of Pages
ISO 2015-09 110
]]>
ISO 18788:2015 provides a framework for establishing, implementing, operating, monitoring, reviewing, maintaining and improving the management of security operations.

It provides the principles and requirements for a security operations management system (SOMS). ISO 18788:2015 provides a business and risk management framework for organizations conducting or contracting security operations and related activities and functions while demonstrating:

a) conduct of professional security operations to meet the requirements of clients and other stakeholders;

b) accountability to law and respect for human rights;

c) consistency with voluntary commitments to which it subscribes.

ISO 18788:2015 is applicable to any organization that needs to:

a) establish, implement, maintain and improve an SOMS;

b) assess its conformity with its stated security operations management policy;

c) demonstrate its ability to consistently provide services that meet client needs and are in conformance with applicable laws and human rights requirements.

]]>
ISO 16678:2014 ?u=/product/publishers/iso/iso-166782014/ Tue, 05 Nov 2024 21:53:36 +0000 Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade
Published By Publication Date Number of Pages
ISO 2014-07 32
]]>
ISO 16678:2014 describes framework for identification and authentication systems. It provides recommendations and best practice guidance that include:

  • consequences and guidance of
    • management and verification of identifiers,
    • physical expression of identifiers, and
    • participants' due diligence;
  • vetting of all participants within the system;
  • relationship between the unique identifier and possible authentication elements related to it;
  • questions that deal with the identification of the inspector and any authorized access to privileged information about the object; and
  • inspector access history (logs).

Accordingly, ISO 16678:2014 establishes a framework and outlines functional units used to achieve trustworthiness and interoperability of such systems.

It does not specify any specific technical solutions, but instead describes processes, functions, and functional units using a generic model to illustrate what solutions have in common.

Object identification systems can incorporate other functions and features such as supply chain traceability, quality traceability, marketing activities, and others, but these aspects are out of scope of ISO 16678:2014.

]]>
IEC 60839-2-7:1994 ?u=/product/publishers/iec/iec-60839-2-71994/ Tue, 05 Nov 2024 19:07:08 +0000 Alarm systems - Part 2: Requirements for intruder alarm systems - Section 7: Passive glass-break detectors for use in buildings
Published By Publication Date Number of Pages
IEC 1994-12-07 40
]]>
Gives the specific requirements and test methods for passive glass-break detectors using piezoelectric sensors for use in intruder alarm systems installed in buildings.

]]>
IEC 60839-2-3:1987 ?u=/product/publishers/iec/iec-60839-2-31987/ Tue, 05 Nov 2024 19:07:08 +0000 Alarm systems. Part 2: Requirements for intruder alarm systems. Section Three: Requirements for infrared-beam interruption detectors in buildings
Published By Publication Date Number of Pages
IEC 1987-12-30 18
]]>
Specifies requirements and test procedures for infrared beam interruption detectors for use in intruder alarm systems installed in buildings.

]]>
VDI 4475 Part 1:2008 Edition ?u=/product/publishers/din/vdi-4475-part-1/ Tue, 05 Nov 2024 18:04:19 +0000 Sectoral implementation of source tagging - Application fundamental
Published By Publication Date Number of Pages
DIN 2008-03 9
]]>
VDI 4475 Part 1 describes the recommended use of security elements for different types of product and packaging. It explains the optimal placement of tags for all types of merchandise, irrespective of the technology used. The guideline is designed to show ways and means how source tagging of product and packaging can be carried out directly at the manufacturer site. This reduces the retailer's application cost and streamlines processes. Products that have been source-tagged at the manufacturer's site can have the respective security element integrated invisibly within the product or package. This prevents the security element from being tampered with, which can lead to a lower theft rate and thus less inventory shrinkage. The guideline VDI 4475 Part 1 contains notes on the general purpose and use of the guideline series, while the other parts deal with individual groups of merchandise and their possibilities of or suitability for source tagging. The guideline contains instructions on how to categorise high-theft products into product classes, how to categorise products into product groups within product classes, how to introduce the security element into the product or its packaging irrespective of technology, how to categorise source tagging levels, how to assess these levels, and it provides additional advice on possible improvements in packaging. The illustrations and lists of individual products within the product groups (DIY, drugstore, textiles, etc.) are exemplary for all products in the group and can be used correspondingly for those that have not been named

]]>
VDI 4475 Part 3:2008 Edition ?u=/product/publishers/din/vdi-4475-part-3/ Tue, 05 Nov 2024 18:04:19 +0000 Sectoral implementation of source tagging - Application instructions for multimedia and electrical products
Published By Publication Date Number of Pages
DIN 2008-03 6
]]>
On the basis of the instructions and technology categorisations given in guideline VDI 4475 Part 1, this guideline describes the use of source tagging in multimedia products and electronics products. Instructions for use with other product groups can be found in the other parts of this guideline series VDI 4475. Different products have different levels of suitability for source tagging, depending on their nature, packaging and material. Their different suitability for source tagging is listed according to the three technologies EM, AM, and RF (see VDI 4471), and the categories A to D (see VDI 4475 Part 1), along with a recommendation and supplementary remarks.

]]>
VDI 4475 Part 2:2008 Edition ?u=/product/publishers/din/vdi-4475-part-2/ Tue, 05 Nov 2024 18:04:19 +0000 Sectoral implementation of source tagging - Application instructions for building centres
Published By Publication Date Number of Pages
DIN 2008-03 9
]]>
On the basis of the instructions and technology categorisations given in guideline VDI 4475 Part 1, this guideline describes the use of source tagging in DIY retail products (building centre products). Instructions for use with other product groups can be found in the other parts of this guideline series VDI 4475. Different products have different levels of suitability for source tagging, depending on their nature, packaging and material. For qualification, the diverse products for sale in DIY stores and markets have been grouped according to their structural nature in this guideline. The different suitability of each group for source tagging is listed according to the three technologies EM, AM, and RF (see VDI 4471), and the categories A to D (see VDI 4475 Part 1), along with a recommendation and supplementary remarks.

]]>