Alarm systems - Intrusion systems - Part 3: Control and indicating equipment

see BT117/SG5336/INF * EN procedure to begin July 2005 * Standstill maintained * Superseded by EN 50131-3:2009

Alarmanlagen - Einbruchmeldeanlagen - Teil 3: Melderzentrale

Systèmes d'alarme - Systèmes d'alarme intrusion - Partie 3: Matériel de commande et d'affichage (Centrale d'alarme)

Alarm systems - Intrusion systems -- Part 3: Control and indicating equipment

General Information

Status
Withdrawn
Publication Date
30-Jul-2003
Technical Committee
Drafting Committee
Parallel Committee
Current Stage
9960 - Withdrawal effective - Withdrawal
Start Date
01-Feb-2012
Completion Date
01-Feb-2012

Relations

Technical specification
TS CLC/TS 50131-3:2004
English language
64 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-marec-2004
Alarm systems - Intrusion systems -- Part 3: Control and indicating equipment
Alarm systems - Intrusion systems -- Part 3: Control and indicating equipment
Alarmanlagen - Einbruchmeldeanlagen -- Teil 3: Melderzentrale
Systèmes d'alarme - Systèmes d'alarme intrusion -- Partie 3: Matériel de commande et
d'affichage (Centrale d'alarme)
Ta slovenski standard je istoveten z: CLC/TS 50131-3:2003
ICS:
13.310 Varstvo pred kriminalom Protection against crime
13.320 Alarmni in opozorilni sistemi Alarm and warning systems
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

TECHNICAL SPECIFICATION  CLC/TS 50131-3
SPÉCIFICATION TECHNIQUE
TECHNISCHE SPEZIFIKATION July 2003

ICS 13.310
English version
Alarm systems –
Intrusion systems
Part 3: Control and indicating equipment

Systèmes d’alarme– Alarmanlagen –
Systèmes d’alarme intrusion Einbruchmeldeanlagen
Partie 3: Matériel de commande et Teil 3: Melderzentrale
d’affichage (Centrale d’alarme)

This Technical Specification was approved by CENELEC on 2003-05-19.

CENELEC members are required to announce the existence of this TS in the same way as for an EN and
to make the TS available promptly at national level in an appropriate form. It is permissible to keep
conflicting national standards in force.

CENELEC members are the national electrotechnical committees of Austria, Belgium, Czech Republic,
Denmark, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Lithuania, Luxembourg,
Malta, Netherlands, Norway, Portugal, Slovakia, Spain, Sweden, Switzerland and United Kingdom.

CENELEC
European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung

Central Secretariat: rue de Stassart 35, B - 1050 Brussels

© 2003 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members.

Ref. No. CLC/TS 50131-3:2003 E

Foreword
The text of this Technical Specification was prepared by the Technical Committee CENELEC TC 79,
Alarm systems.
The text of the draft was submitted to the formal vote and was approved by CENELEC as
CLC/TS 50131-3 on 2003-05-19.
The following date was fixed:
– latest date by which the existence of the CLC/TS
has to be announced at national level (doa) 2003-10-30
__________
- 3 - CLC/TS 50131-3:2003
Contents
Page
1 Scope .6
2 Normative references .6
3 Definitions and abbreviations .7
3.1 Definitions.7
3.2 Abbreviations.12
4 Equipment attributes.12
4.1 General.12
4.2 Functionality .12
5 CIE structure.13
6 Security grade.13
7 Environmental requirements .14
7.1 General.14
7.2 Environmental class I: Indoor.14
7.3 Environmental class II: Indoor - General.14
7.4 Environmental class III: Outdoor - Sheltered .14
7.5 Environmental class IV: Outdoor - General.14
7.6 Special condition .14
7.7 Environmental tests.14
8 Functional requirements.14
8.1 Inputs.14
8.2 Operation.15
8.3 Processing .22
8.4 Indication.25
8.5 Notification outputs.28
8.6 Tamper security (detection/protection).29
8.7 Fault .30
8.8 Interconnections.31
8.9 Timing .31
8.10 Event recording .32
8.11 Power supply.33
9 Electrical safety .33
10 Product documentation.34
10.1 Installation and maintenance .34
10.2 Operating instructions .34
11 Marking and labelling.35
12 Tests.35
12.1 Test conditions .35
12.2 Functional tests .36
12.3 Reduced functional test.36
12.4 Functional tests .37
12.5 Access level .48
12.6 Authorization requirements .49

13 Environmental tests.58
13.1 General.58
13.2 Environmental test selection .59

Annexes
Annex A (informative) Interconnection types.64
Annex B (informative) Example of calculation for code variations .66
Annex C (informative) Summary of timing requirements.68

Figures
Figure A.1 – Specific wired interconnections.65
Figure A.2 – Non specific wired interconnections.66
Figure A.3 – Wire-free interconnections.66

Tables
Table 1 - Access level to functions and control .16
Table 2 - Authorization requirements - Access levels 2, 3, and 4 .16
Table 3 – Detection of repeated incorrect authorisation codes .17
Table 4 - Prevention of setting conditions.18
Table 5 - Overriding of prevention of setting conditions .18
Table 6 - Authorisation required to restore conditions.20
Table 7 - Automatic inhibit .20
Table 8 - Manual inhibit .21
Table 9 - Processing of intruder, hold-up, tamper alarm and fault signals/messages .23
Table 10 - Monitoring of processing .24
Table 11– Indication (from Table 4 of EN 50131-1) .26
Table 12 – Additional indication in the CIE or ACE .27
Table 13 - Notification requirements.28
Table 14 - Tamper protection .29
Table 15 - Tamper detection .29
Table 16– Tool dimension for tamper detection .30
Table 17– Removal from mounting .30
Table 18 - Recognition of fault conditions .30
Table 19 - Interconnection confirmation .31
Table 20 - Reduced functional test.37
Table 21 – Functional tests.38
Table 22 – Tests of the processing of hold-up signal or messages .39
Table 23 – Tests of the processing of tamper signal or messages.41
Table 24 – Test of the process monitoring .45
Table 25 – Test of processing of fault signals or messages .46
Table 26 – Test of processing of optional functions (non specified in EN 50131-1) .48

- 5 - CLC/TS 50131-3:2003
Table 27 – Test of the access to the functions and controls .48
Table 28 – Test for disabling user input during incorrect authorization codes .51
Table 29 – Test for generation of tamper during incorrect authorization codes .52
Table 30 – Test of setting procedure.53
Table 31 – Test for unsetting procedure.54
Table 32 – Test of Entry Route Procedure .55
Table 33 – Test of exit route procedure.56
Table 34 – Test of Event Log .57
Table 35 - Environmental test selection .59
Table C.1 - Timing table .69

1 Scope
This Technical Specification specifies the requirements, testing procedures security and environmental
performance criteria for control and indicating equipment (CIE) intended for use in intrusion alarm
system (IAS) and hold-up alarm systems (HAS) installed in buildings.
This Technical Specification specifies the requirements for CIE installed in buildings using specific or
non-specific wired interconnections or wire-free interconnections. These requirements also apply to the
components of a CIE which are normally mounted on the external structure of a building. (EXAMPLE:
Ancillary control equipment).
This Technical Specification specifies performance requirements for CIE but does not include
requirements for design, planning, installation, operation or maintenance.
These requirements apply also to CIE sharing means of detection, interconnection, control,
communication and power supplies with other applications.
Requirements are specified for CIE components where the relevant environment is classified. This
classification describes the environment in which the CIE component may be expected to operate as
designed. When the requirements of the four environmental classes are inadequate, due to the
extreme conditions experienced in certain geographic locations, special national conditions are given in
Annex A of EN 50131-1. General environmental requirements for CIE components are described in
Clause 7.
NOTE In this Technical Specification reference to the term “I&HAS” is used throughout the specification. The term is intended
to include IAS and HAS when such systems are installed separately.
2 Normative references
This Technical Specification incorporates by dated or undated reference, provisions from other
publications. These normative references are cited at the appropriate places in the text and the
publications are listed hereafter. For dated references, subsequent amendments to or revisions of any
of these publications apply to this Technical Specification only when incorporated in it by amendment
or revision. For undated references the latest edition of the publication referred to applies (including
amendments).
Publication Year Title
EN 50130-4 1996 Alarm systems - Electromagnetic compatibility - Product family standard:
Immunity requirements for components of fire, intruder and social alarm
systems
EN 50130-5 1998 Alarm systems - Environmental test methods
EN 50131-1 1997 Alarm systems - Intrusion systems - General requirements
EN 50131-6 1997 Alarm systems - Intrusion systems - Power supplies
EN 60065 2002 Audio, video and similar electronic apparatus – Safety requirements
EN 60529 1991 Specification for degrees of protection provided by enclosures (IP code)
EN 60950 2001 Information technology equipment – Safety – General requirements

- 7 - CLC/TS 50131-3:2003
IEC 60068-1 1988 Environmental testing – Part 1: General and guidance
3 Definitions and abbreviations
For the purposes of this specification, the following definitions and abbreviations apply.
3.1 Definitions
3.1.1
acknowledge
action of a user to accept an indication
3.1.2
action
any deliberate operation or act by the user
3.1.3
active period
period during which an alarm signal is present (See Annex A)
3.1.4
alarm
warning of the presence of a hazard to life, property or the environment
3.1.5
alarm condition
condition of an alarm system, or part thereof, which results from the response of the system to the
presence of a hazard
3.1.6
alarm notification
passing of an alarm condition to warning devices and/or alarm transmission systems
3.1.7
alarm point
one or more detector(s) grouped together for the purpose of indication or processing
3.1.8
alarm receiving centre (ARC)
continuously manned remote centre to which the information concerning the state of one or more
alarm systems is reported
3.1.9
alarm signal
signal generated by a detection device
3.1.10
alarm system
electrical installation which responds to the manual hold-up or automatic detection of the presence of a
hazard
3.1.11
alarm transmission system (ATS)
system used to transfer information between one or more alarm systems and one or more alarm
receiving centres
3.1.12
alternative power source (APS)
power source capable of powering the system for a predetermined time when a prime power source
(PPS) is unavailable
3.1.13
ancillary control equipment (ACE)
equipment used for supplementary control purposes
3.1.14
conditioning
exposure of a specimen to environmental conditions in order to determine the effect of such conditions
on the specimen
3.1.15
control and indicating equipment (CIE)
equipment for receiving, processing, controlling, indicating and initiating the onward transmission of
information
3.1.16
detector
device designed to generate an alarm signal in response to the sensing of an abnormal conditions
indicating the presence of a hazard
3.1.17
entry route facility
means to ignore signals or messages from specified detectors during unsetting for a specified time
period
3.1.18
event recording
storage of events arising from the operation of the I&HAS components
3.1.19
exit route facility
means to ignore signals or messages from specified detectors during setting for a specified period
3.1.20
external power source (EPS)
energy supply external to the IAS which may be non-continuous, used as the prime power source in
type A and type B power supply
3.1.21
fault condition
condition of an alarm system which prevents the system or parts thereof from functioning normally
3.1.22
fault signal or message
information generated due to the presence of a fault
3.1.23
hold-up alarm system (HAS)
alarm system providing the means for a user to deliberately generate a hold-up alarm condition

- 9 - CLC/TS 50131-3:2003
3.1.24
hold-up device
device which when triggered causes a hold-up alarm signal or message to be generated
3.1.25
indication
information (in audible, visual or any other form) provided to assist the user in the operation of an
I&HAS
3.1.26
inhibit
status of a part of an alarm system in which an alarm condition cannot be notified, such status is
cancelled when the CIE is unset (EXAMPLE: intruder alarm, tamper alarm, etc.)
3.1.27
interconnections
means by which signals and/or messages are transmitted between I&HAS components
3.1.28
intruder alarm condition
condition of an alarm system, or part thereof, which results from the response of the I&HAS to the
presence of an intruder
3.1.29
intruder detector
device that generates an alarm condition in response to intrusion or attempted intrusion, or to
deliberate action by the subscriber
3.1.30
intrusion
entry into the protected premises by an unauthorised person(s)
3.1.31
intrusion and hold-up alarm system (I&HAS)
combined intruder and hold-up alarm system
3.1.32
isolation
status of a part of an alarm system in which an alarm condition cannot be notified, such status remains
until deliberately cancelled (EXAMPLE: intruder alarm, tamper alarm, etc)
3.1.33
logical key
code (EXAMPLE: numeric or alphabetic) entered by an authorized user to gain access to restricted
functions or parts of a CIE
3.1.34
message
series of signals routed by a network which includes identification, functional data and the means to
provide its own integrity, immunity and proper reception
3.1.35
monitoring
process of verifying that the interconnections and equipment are functioning correctly

3.1.36
normal condition
state of an I&HAS where no conditions exist which would prevent the setting of the system
3.1.37
notification
passing of alarm, tamper, hold up or fault conditions to warning devices and/or alarm transmission
systems
3.1.38
operating mode
set, unset, setting and unsetting are the four operating modes
3.1.39
override
intervention by a user to permit setting when a fault condition exists
3.1.40
physical key
implement used by an authorised user to gain access to restricted functions or parts of a CIE
(mechanical key, magnetic card, electronic token or similar)
3.1.41
power supply (PS)
device that stores, provides and also modifies or isolates (electrical) power for an alarm system or part
thereof. The two basic parts of a PS are the Power Unit (PU) and the storage device (EXAMPLE:
battery)
3.1.42
power unit (PU)
device that provides and also modifies or isolates (electrical) power for an IAS or part thereof, and for
the storage device if required
3.1.43
prime power source (PPS)
power source used to support the I&HAS or part thereof under normal operating conditions
3.1.44
restore
procedure of cancelling an alarm, tamper, fault or other condition and returning the I&HAS to the
previous condition
3.1.45
set
status of an alarm system or part thereof in which an alarm condition can be notified
3.1.46
signal
variable parameters by which information is conveyed
3.1.47
soak
an attribute of a zone or alarm point such that signals or messages that normally create notifications
are prevented from doing so, but continue to be recorded in the event log. The soak attribute can be
manually or automatically removed

- 11 - CLC/TS 50131-3:2003
3.1.48
stand-by period
defined time for which a power supply shall supply energy to the components of the alarm system in
the event of failure of the EPS
3.1.49
storage device
device which stores energy (EXAMPLE: a battery)
3.1.50
storage failure
inability of a storage device to maintain the output voltage above the minimum value, in the event of a
failure of the EPS
3.1.51
supervised premises
that part of a building in which a hazard may be detected by an alarm system
3.1.52
tamper alarm
alarm generated by tamper detection
3.1.53
tamper condition
condition of an alarm system, resulting from the detection of tampering
3.1.54
tamper detection
detection of deliberate interference with an alarm system or part thereof
3.1.55
tamper protection
methods or means used to protect an alarm system or part thereof against deliberate interference
3.1.56
test condition
condition of an alarm system in which the normal functions are modified for test purposes
3.1.57
triggering
deliberate operation of a hold-up device
3.1.58
unset
status of an IAS or part thereof in which an intruder alarm condition cannot be notified
3.1.59
user
person authorised to operate an alarm system
3.1.60
user input
command generated by a deliberate user action

3.1.61
warning device
device that gives an alarm or an alert
3.1.62
wire-free interconnection
interconnection conveying information between I&HAS components without physical media. The
interconnection may convey information pertaining to two or more applications
3.1.63
zone
an assessed area where abnormal conditions may be detected
3.2 Abbreviations
3.2.1 ACE: Ancillary control equipment
3.2.2 APS: Alternative power source
3.2.3 ARC: Alarm receiving centre
3.2.4 ATE: Alarm transmission equipment
3.2.5 ATS: Alarm transmission system
3.2.6 CIE: Control and indicating equipment
3.2.7 EPS: External power source
3.2.8 HAS: Hold-up alarm systems
3.2.9 IAS: Intrusion alarm system
3.2.10 I&HAS: Intruder and hold-up alarm system
3.2.11 PIN: Personal identity number
3.2.12 PPS: Prime power source
3.2.13 PS: Power supply
3.2.14 PU: Power unit
3.2.15 SD: Storage device
3.2.16 WD: Warning device
4 Equipment attributes
4.1 General
Control and indicating equipment shall include attributes for the detection of input status, processing
the information, notification and indication as appropriate. The detailed requirements for the following
attributes are provided in Clause 8.
4.2 Functionality
Control and indicating equipment shall include the following functions:

- 13 - CLC/TS 50131-3:2003
4.2.1 Inputs
The ability to receive and recognize intrusion, tamper and fault signals or messages. Other signals and
messages can be received and recognized. Such inputs shall not affect any mandatory requirements
of this specification.
4.2.2 Operation
The operation function is to enable the CIE to respond to automatic or manual user instructions
(EXAMPLE: set, unset, inhibit, isolate).
4.2.3 Processing
The processing function is to enable the CIE to process signals and messages from detectors and
hold-up devices, to process tamper and monitoring functions and respond to user instructions.
4.2.4 Outputs
To give information to the user and to provide notification and/or indication of alarm or fault or tamper
conditions.
4.2.5 Tamper security
To enable the CIE to resist tampering using physical means and to provide electrical, electronic or
other means to detect tampering.
4.2.6 Monitoring
To monitor, according to the grade, that the CIE and the interconnections are operating correctly.
In the event of a fault condition being detected, the CIE shall provide an indication and/or notification.

5 CIE structure
The CIE can be distributed in multiple housings or be in a single housing, and may be combined with
other IAS components.
Other applications or functions not specified in this specification may be provided; such applications or
functions shall not affect any requirements given within this specification.
6 Security grade
The CIE requirements shall be divided into four security grades, with grade 1 being the lowest and
grade 4 being the highest.
The requirements for the performance of the CIE will vary depending upon its stated grade and will be
tested according to the grade in the CIE documentation and marking.
Security grades 1 to 4 shall be in accordance with the descriptions in EN 50131-1.

7 Environmental requirements
7.1 General
Environmental classes I to IV shall be in accordance with the description in EN 50131-1.
To ensure the correct application of I&HAS components, the CIE and the ACE shall be suitable for use
in one of the following environmental classes.
7.2 Environmental class I: Indoor
The CIE and ACE shall operate correctly when exposed to environmental influences normally
experienced indoors when the temperature is well maintained. (EXAMPLE: in a residential or
commercial property).
7.3 Environmental class II: Indoor - General
The CIE and ACE shall operate correctly when exposed to environmental influences normally
experienced indoors when the temperature is not well maintained. (EXAMPLE: in corridors, halls or
staircases and where condensation can occur on windows and in unheated storage areas or
warehouses where heating is intermittent).
7.4 Environmental class III: Outdoor - Sheltered
The CIE and ACE shall operate correctly when exposed to environmental influences normally
experienced out of doors when the CIE and the ACE are not fully exposed to the weather.
7.5 Environmental class IV: Outdoor - General
The CIE and ACE shall operate correctly when exposed to environmental influences normally
experienced out of doors when the CIE and the ACE are fully exposed to the weather.
7.6 Special condition
EN 50131-1, Annex A lists those countries with special environmental conditions.
7.7 Environmental tests
Tests and severity levels are specified in Clauses 12 and 13 of this specification. Environmental test
methods are specified in EN 50130-5.
8 Functional requirements
8.1 Inputs
Depending on the grade of the CIE, means shall be provided to receive and process signals or
messages from intruder detectors, hold-up trigger devices and information from user input devices as
specified in the following sub-clauses.
8.1.1 Intruder detection
The CIE shall provide the means to receive and process signals or messages from intruder detectors.
8.1.2 Hold-up device
When a CIE provides hold-up facilities, means shall be provided to receive and process signals or
messages from hold-up devices.

- 15 - CLC/TS 50131-3:2003
8.1.3 Tamper
The CIE shall provide the means to receive and process tamper signals or messages.
8.1.4 Fault
The CIE shall provide the means to receive and process fault signals or messages.
NOTE For the CIE to process internally generated fault conditions it is assumed that the faults have not impaired the ability of
the CIE to carry out this function.
8.1.5 Monitoring (input)
Means shall be provided to verify that the CIE and the interconnections are functioning correctly as
defined in 8.3.3 and 8.8 of this specification. The CIE shall provide the means to receive and process
monitoring signals or messages. These signals or messages shall be processed as tamper or a fault
signals or messages according to Table 9.
NOTE This assumes that an interconnection function is provided (to be specified in EN 50131-5) which generates monitoring
signals or messages.
8.1.6 User input
The CIE shall provide the means to receive and process information from user input devices.
(EXAMPLE: a keypad or switch).
8.1.7 Other
When a CIE receives and processes signals or messages or other information not necessary to meet
the requirements of this Technical Specification (EXAMPLE: technical monitoring), this shall not affect
the ability of the CIE to meet the requirements of this specification.
8.2 Operation
The CIE shall provide the means necessary to enable authorized users to access the functions of the
CIE. Access to these functions shall be restricted, (EXAMPLE: by using a keypad or lock).
8.2.1 Access levels
Up to four access levels shall be provided to the functions of a CIE. The functions and permitted
access levels are specified in.
If the CIE includes security functions additional to those listed in Table 1 the access levels necessary to
operate those functions shall be specified by the manufacturer. Any non-security functions shall be
specified in the manufacturer’s documentation.
- Level 1 access to any person
NOTE 1 As no authorization requirements exist for access level 1, some indications may appear without user intervention
- Level 2 access to any user
- Level 3 access to service personal
- Level 4 access to manufacturer

Table 1 – Access level to functions and control
Function and controls Access levels

1 2 3* 4*
Indications P P P P
Set NP P P NP
Unset NP P P NP
Restore IAS NP P P NP
Verify IAS functions NP P P NP
Interrogate event log NP P P NP
Inhibit/isolate/override NP P P NP
Add/change authorisation codes NP P ** P ** P **
Add/change site specific data NP NP P NP
Change the program NP NP NP P
NP = Not permitted * = Only when authorised by level 2
P = Permitted ** = Only change his own authorisation code, except “master user”
NOTE 2  In all grades, one or more master user may exist.
Access at levels 3 and 4 shall be authorized by access level 2 in one of two ways:

- access remains authorized until manually removed;
- authorization is required each time.
It is permitted to have the access levels sub-divided into a table of rights provided by the manufacturer
to operate the available functions.
Means shall be provided to prevent reading of authorization codes.
NOTE 3  Access level 4 applies when changing the operating programme software without having activated a tamper device
on the CIE or ACE
8.2.2 Authorization
Access to the functions of a CIE (as defined) at levels 2, 3 and 4 shall be restricted by the use of
physical or logical keys as indicated in Table 2. Authorization is not required for access at level 1.
Table 2 – Authorization requirements - Access levels 2, 3, and 4
Minimum variations of keys Grade 1 Grade 2 Grade 3 Grade 4
Logical Key 1 000 10 000 100 000 1 000 000
Physical key 300 3 000 15 000 100 000
The requirements specified in Table 2 shall apply to each user.
Depending on the grade, when a CIE uses logical keys to restrict access, or when the CIE has the
means to detect incorrect physical keys, means shall be provided to detect and record attempts to gain
access by repeated incorrect authorization codes, as specified in Table 3.

- 17 - CLC/TS 50131-3:2003
When the relevant number of incorrect authorization attempts is detected, the user input device(s) at
which the incorrect authorization codes are entered shall be disabled for a minimum of 90 s. Other or
all user input devices may also be disabled.
Tamper shall not be activated when less than 3 incorrect attempts are detected.
Table 3 – Detection of repeated incorrect authorisation codes
Grade 1 Grade 2 Grade 3 Grade 4
Disable user input device(s) Op Op * M M
Maximum number of attempts before user 10 10 10 3
input device(s) initially disabled
Maximum number of further attempts before 10 10 1 1
user input device(s) disabled
Record in event log each time user input Op Op Op M
device(s) disabled
Tamper signal or message Op Op M
Op *
Maximum number of attempts before tamper 21 21 21 7
activated
* For Grade 2 at least one these requirements shall be provided.
8.2.3 Setting procedures
CIE shall provide means for a user, with the appropriate access level, to initiate the setting sequence.
During the setting procedure, if an intrusion alarm condition occurs at one or more of the alarm points
not allocated to an exit route, the CIE shall as a minimum, generate a local indication and/or
notification. The CIE may provide means to set automatically at pre-determined times (time
dependent).
When means are provided to set at pre-determined periods, the CIE shall generate at least one
indication before setting.
8.2.3.1 Prevention of setting
Means shall be provided to prevent the CIE from initiating and/or completing the setting procedure
when one or more of the conditions shown, are present.

Table 4 – Prevention of setting conditions
Prevention of setting conditions Grade 1 Grade 2 Grade 3 Grade 4
*Detector in active condition M M M M
Detector range reduction Op Op M M
Tamper condition M M M M
Interconnection fault M M M M
Alternative power source fault X X M M
Prime power fault X X Op Op
ATE fault M M M M
**ATE and WD faults M M M M
Other IAS component faults Op M M M
* = Detectors on an agreed exit route may be excluded, only during the exit time, and shall prevent the
completion of the setting procedure if still active at the end of the exit period.
** = Faults in all available ATE and WD’s which prevent all notification
X = One or other function shall be provided
8.2.3.2 Overriding of prevention of setting
Means may be provided to enable users, as specified in Table 5, to manually override conditions
preventing setting. Means may be provided to override conditions preventing setting automatically
when setting is time dependent.
Table 5 – Overriding of prevention of setting conditions
Prevention of setting conditions Grade 1 Grade 2 Grade 3 Grade 4
Detector fault Level 2 Level 2 Level 2 Level 2
Interconnection fault Level 2 Level 2 Level 3 Level 3
Alternative power source fault Level 2 Level 2 Level 2 Level 3
Prime power source fault Level 2 Level 2 Level 2 Level 2
ATE fault Level 2 Level 2 Level 3 Level 3
ATE and WD faults Level 2 Level 2 Level 3 Level 3
Other IAS component faults Level 2 Level 2 Level 2 Level 3
* NOTE Level 2, if authorised, can be permitted to override for one arming period
It is permitted at level 2 to override the conditions specified in Table 5 for one set period (EXAMPLE, by
inhibiting).
It is permitted at level 3 to override the conditions specified in Table 5 for more than one set period
(EXAMPLE, by isolating).
8.2.3.3 Logging the overriding of prevention of setting conditions
The overriding of prevention of setting conditions shall be logged as specified in 8.10.

- 19 - CLC/TS 50131-3:2003
8.2.3.4 Exit route facility
Provision of an exit route facility is optional.
When an exit route facility is provided, the CIE shall be provided with means to select the defined
alarm points to be included in the exit route facility.
The CIE may provide the means to indicate that the exit procedure has commenced, in accordance
with Table 11 and Table 12.
8.2.3.5 Set state
When a CIE is in the set state, means shall be provided (EXAMPLE: an output) to indicate that the CIE
is in the set state.
NOTE The intention of the above requirement is to provide a facility to indicate or physically prevent entry into the supervised
area when the IAS is set.
8.2.3.6 Failure to set
Means shall be provided to indicate and/or notify when the CIE fails to set, following the initiation of
setting procedure.
8.2.4 Unsetting procedure
The CIE shall provide means for a user with the appropriate access level, to unset. The CIE may
provide means to unset at pre-determined times.
8.2.4.1 Entry route facility
Provision of an entry route facility is optional.
When the CIE provides an entry route facility, means shall be provided to select the defined alarm
points to be included in the entry route facility. Means shall be provided to indicate that the entry
procedure is running, as specified in Table 11 and Table 12.
8.2.4.2 Entry time
Means shall be provided to limit the time allowed to complete the unsetting procedure to a maximum of
45s, (EXAMPLE: when unsetting is to be initiated from outside the supervised area and completed
from inside the supervised area).
8.2.4.3 Alarm condition occurring during the unsetting procedure
When an alarm condition occurs during the unsetting procedure, the alarm condition shall be indicated
or notified by an internal warning device only. If the system is not unset within the defined period (45 s
maximum) an alarm condition shall be notified immediately.
When remote notification is included in the I&HAS, the alarm condition during the unsetting procedure
shall not be remotely notified until the indicator or warning device has operated for a minimum of 30 s.
NOTE The purpose of the above clause, together with EN 50131-1, subclause 8.3.3.3, is to reduce the risk of transmission of
alarm notification to the ARC if a detector not included in the entry route is accidentally activated during the unsetting
procedure.
8.2.4.4 Entry period exceeded
When the time allowed to complete the unsetting procedure is exceeded, means shall be provided to
notify an alarm condition.
8.2.4.5 Indication
Means shall be provided to indicate when the unsetting procedure has been successfully completed
and the CIE is unset. The means provided shall not allow the indication to operate for more than 30 s.
8.2.5 Restore function
The CIE shall provide means to restore conditions as defined in Table 6:
Table 6 – Authorisation required to restore conditions
Grade 1 Grade 2 Grade 3 Grade 4
Intruder Access level 2 Access level 2 Access level 2 Access level 2
Tamper Access level 2 Access level 2 Access level 3 Access level 3
Fault Access level 2 Access level 2 Access level 2 Access level 2
Hold-up Access level 2 Access level 2 Access level 2 Access level 2

8.2.6 Inhibit function
When an inhibit function is provided, it shall operate in accordance with Table 7 and Table 8. When the
CIE is unset, inhibit conditions shall be cancelled.
Inhibit functions shall be applied to individual alarm, tamper, fault or hold up points.
Table 7 – Automatic inhibit
Automatic inhibit
Intruder Alarm signal or OP (after “n” alarm occurrences in a given SET
message period)
Tamper signal or message OP (after “n” alarm occurrences in a given SET
period)
Fault signal or message OP (after “n” alarm occurrences in a given SET
period)
User interface OP (EXAMPLE: time window, wrong
authorisation code)
Authorisation code OP (after “m” use, for service personal)
Hold up Not permitted
NOTE Values of “n” and “m” shall be provided in the manufacturer’s installation documentation.

- 21 - CLC/TS 50131-3:2003
Table 8 – Manual inhibit
Manual inhibit
Access
Grade 1 Grade 2 Grade 3 Grade 4
level
Intruder alarm 2 Op Op Op Op
signal or
3 Op Op Op Op
message
Tamper signal or 2 Op Op NP NP
message
3 Op Op Op Op
Fault signal or 2 Op
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...