![]() |
中标分类
行业分类
ICS分类
最新标准
|
登录注册 |
您的位置: 标准明细 |
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. In accordance with the requirements of MOHURD Notice on printing and distributing the development and revision plan of engineering construction standards and specifications in 2015 (JIAN BIAO [2014] No. 189), this standard is jointly revised based on GB 50348-2004 Technical code for engineering of security and protection system, which was developed by the drafting team through extensive investigation, careful summarization of practical experience, reference to relevant international standards and foreign advanced standards and on the basis of widely solicited opinions, by First Research Institute of the Ministry of Public Security of PRC, Science and Technology Informatization Bureau of the Ministry of Public Security of PRC and other relevant organization. The standard includes 12 clauses with the main contents as following: general provisions, terms, basic requirements, planning, engineering construction planning, engineering design, engineering construction, construction supervision, engineering inspection, engineering acceptance, system operation and maintenance as well as consultation service. Main technical contents revised in this standard are as follows: 1. On the basis of the previous edition, the following content is added: risk protection planning, system configuration planning, personnel protection planning, physical protection design as well as engineering construction procedures, supervision, operation & maintenance and consultation service; 2. The design of security engineering for high and general risk objects in previous edition is deleted, and the content of the standard is targeted to the general requirements of security engineering construction and system operation and maintenance. The provisions printed in bold type in this standard are compulsory and must be enforced strictly. The Ministry of Housing and Urban-Rural Development of the People's Republic of China is in charge of the administration of this standard and the explanation of the compulsory provisions; First Research Institute of the Ministry of Public Security of PRC is responsible for the explanation of specific technical contents. The relevant revisions and supplements, whenever necessary, can be posted or passed on to the First Research Institute of the Ministry of Public Security of PRC (Address: No.1, South Road, Capital Gymnasium, Haidian District, Beijing; postal code: 100048; Tel: 0086-(0)10-68773938; Fax: 010-68773960; Email: tc100sjl @ 263 net) for future reference. Technical standard for security engineering 1 General provisions 1.0.1 This standard is developed with a view to regulating security engineering construction procedure as well as engineering design, construction, supervision, inspection, acceptance, operation, maintenance and consultation services, improve the security engineering construction quality and system operation and maintenance level, protect personal and property safety and social safety and maintain social stability. 1.0.2 The standard is applicable to construction and system operation and maintenance of the security engineering of constructed, extended and renovated buildings (structures). 1.0.3 The construction of security engineering shall be incorporated in the overall planning of the engineering construction and, according to the use function, security management requirements, construction investment, etc., simultaneously implemented and independently inspected for acceptance. 1.0.4 The construction of security engineering shall organically combine personnel protection, physical protection and electronic security so as to construct comprehensive prevention and control system meeting security management requirements and possessing corresponding risk prevention capabilities through scientific and reasonable planning, design, construction, operation and maintenance. 1.0.5 Security system shall be of security, reliability, maintainability and extendibility, with advanced technology and economic applicability. 1.0.6 Security engineering involving special fields like national security and state secrets shall be constructed by making strict the security access mechanism and selecting safety-controlled products and equipment and professional design, construction and service teams meeting the requirements according to relevant management requirements. 1.0.7 Construction of security engineering must comply with relevant national laws and regulations. 1.0.8 The construction of security engineering shall comply with those specified in both this standard and current relevant standards of the nation. 2 Terms 2.0.1 security preventing and delaying intrusion, theft, robbery, destruction, explosion, violent attack and the like by comprehensively using multiple means like personnel protection, physical protection, electronic security, etc. 2.0.2 personnel protection security management behaviors like organized prevention and disposal performed by personnel with corresponding quality 2.0.3 physical protection physical protection means for delaying or preventing risk events from occurring by making use of building (structure), screen, appliance, equipment or combination thereof 2.0.4 electronic security protection means for improving the detection, delay and response capabilities by making use of technologies like sensing, communication, computer, information processing and control as well as biometric feature recognition 2.0.5 security system protection system with a view to achieving security by comprehensively using technologies such as physical protection, electronic protection, etc. 2.0.6 security engineering construction projects implemented with a view to establishing security system 2.0.7 physical protection system physical system with a view to realizing security by comprehensively using natural barrier, artificial barrier, and appliances and equipment like anti-theft lock/cabinet 2.0.8 electronic protection system system with a view to realizing security by using various electronic equipment, which usually includes subsystems for intrusion and hold-up alarm, video surveillance, access control, security management in parking lots, anti-explosion security inspection, guard tour, building intercom, etc. 2.0.9 intrusion and hold-up alarm system (I&HAS) electronic system detecting unauthorized access or attempt of unauthorized access into protected area using sensor technology and electronic information technology and, when emergent alarm device is triggered by user, sending out and processing alarm information 2.0.10 video surveillance system (VSS) electronic system that uses video technology to detect and monitor the surveillance area and to display and record in real time the onsite video images 2.0.11 access control system (ACS) electronic system recognizing objects going through entrance and controlling the open/close of entrance actuator through customized symbol recognition, (or) biological feature and other mode 2.0.12 security management system in parking lots electronic system for realizing comprehensive management of registration and supervision of personnel and vehicles going in/out of parking lots as well as of the security of personnel and vehicles in parking lots 2.0.13 anti-explosion security inspection system electronic system for detecting explosives, weapons and/or other prohibited goods carried by personnel and vehicles or carried secretly in articles and/or alarming 2.0.14 guard tour system electronic system that manages and controls the inspection routes, mode and processes of patrol personnel 2.0.15 building intercom system electronic system that confirms visitors via (visual) intercom mode so as to control and manage the visitors at the entrance of building (complex), also known as visitor intercom system 2.0.16 security management platform (SMP) combination of hardware and software integrating the subsystems of the security system and related information systems and therefore organically linking physical protection system, electronic protection system and personnel protection resource, centralized processing, sharing and applying information, comprehensively studying and judging risk events, commanding and dispatching event handling, as well as uniformly managing, operating and maintaining system and equipment 2.0.17 protected object object which shall be protected for it is faced with risks, including unit, building (structure) as well as parts, areas and specific object inside and outside of them 2.0.18 high risk protected object key units that determined in accordance with laws for security defense and key objects for preventing terrorist attacks 2.0.19 defensing object object which threats the protected object and for which defense is needed 2.0.20 risk potential security hazard existing in the protected object itself and the possible threats the protected object may suffer, including intrusion, theft, robbery, destruction, explosion, violent attack and the like 2.0.21 risk assessment process confirming the risks that shall be defended for security system through risk identification, risk analysis and risk appraisal 2.0.22 level of risk magnitude of a single risk or combination of risks that exist in and around the protected object and poses a threat to its security, expressed as a combination of consequences and possibilities 2.0.23 level of protection level of precaution measures taken to guarantee the security of the protected object 2.0.24 security grade ability level of security systems and equipment to counter different attacks 2.0.25 detection perception of explicit risk event and/or implicit risk event 2.0.26 delay extending or (and) postponing the progress of a risk event 2.0.27 response action taken to address the occurrence of a risk event 2.0.28 false alarm alarm sent out in response to an undesigned event 2.0.29 leakage alarm condition in which no alarm response is given to the designed alarm event 2.0.30 perimeter area boundary of a protected object 2.0.31 zone part of protection area where intrusion and hold-up alarm system (I&HAS) may detect intrusion or where the emergency alarm device is manually triggered 2.0.32 surveillance area site space range corresponding to the image taken by the video capture device of the video surveillance system (VSS) 2.0.33 controlled area/protected area spatial area enclosed by physical boundaries and corresponding to one or more access control points of the access control system 2.0.34 longitudinal-depth protection protection measures for setting up successive lines of defense from outside to inside, or vice versa, for the whole protected area according to the environmental conditions where the protected object is located in and the security management requirements, which is divided into overall longitudinal-depth protection and partial longitudinal-depth protection 2.0.35 balanced protection security protection level of each part of the security system basically being the same, without obvious weak link 2.0.36 surveillance center central control room that receives and processes security system information, handles alarm events, and manages and controls system equipment and which is usually divided into guard area and equipment area 2.0.37 system operation process conducting safety activities like alarm event handling, video surveillance and access control through security system 2.0.38 system maintenance maintenance activities conducted to ensure the normal operation of the security system and continuously exert the security effectiveness 2.0.39 system effectiveness evaluation process of analysis and evaluation on the extent to which the security system meets the expected effectiveness 3 Basic requirements 3.0.1 Full life cycle management and overall planning shall be conducted for security engineering construction and system operation maintenance. The engineering construction and system operation and maintenance shall be carried out by following the engineering construction procedure and requirements and in a planned and step-by-step way by determining the goal of each stage. 3.0.2 The security engineering construction shall follow the following principles: 1 Technical protection, physical protection and personnel protection shall be combined and detection, delay and response shall be coordinated; 2 The protection level of the protected object shall be suitable for the risk level; 3 The security level of the system and equipment shall be suitable for the defensing object and its means of attack; 4 Longitudinal-depth, balance and anti-damage requirements for the protection shall be met; 5 Security and reliability requirements of the system shall be met; 6 Electro-magnetic compatibility and environmental adaptability requirements of the system shall be met; 7 Real-time performance and original integrity requirements of the system shall be met; 8 Compatibility, expandability and maintainability requirements of the system shall be met. 9 Economy and suitability requirements of the system shall be met. 3.0.3 Risk protection planning, system configuration planning and personnel protection planning shall be carried out for security engineering construction. A safe, controllable, open and shared security system shall be constructed by determining the risks that need to be defensed through risk assessment, taken into account the personnel protection capability, and reasonably selecting physical protection and electronic security. 3.0.4 Equipment and materials used in security engineering must meet national laws and current relevant standards of the nation and shall be subjected to test or certification. 3.0.5 In stages like construction, preliminary acceptance and commissioning, supervision organization should be hired to carry out engineering supervision. 3.0.6 Security engineering for high risk protected object shall be subject to engineering inspection. The engineering inspection shall be carried out by an inspection agency with security engineering inspection qualification and the inspection capability within the authorized scope of qualification. 3.0.7 Security engineering, after being completed, shall be subject to independent or special acceptance. 3.0.8 The development (using) organization of security system shall establish guarantee system and long-term mechanism for system operation and maintenance, guaranteeing the normal operation of security system and continuously exerting the security effectiveness. 3.0.9 During the operation of security system, the development (using) organization should carry out risk assessment and system effectiveness evaluation combining with the security demand and system usage condition. 3.0.10 Professional consultation service mechanism should be introduced in within the full life cycle of security engineering construction and system operation and maintenance. 4 Planning 4.1 Risk protection planning 4.1.1 For security engineering construction, the protected object and its security requirements shall be determined, and the following shall be met: 1 The determination of protected object shall take into account protected unit, protected position and/or area and protected target; protection target is classified into articles, personnel and system and/or equipment and/or parts to be protected; 2 The security demands of the protected object shall be analyzed and determined according to the demands of public security prevention and terrorism prevention. 4.1.2 For the security engineering construction, the specific risks need to be defensed shall be determined according to the security demands of the protected object through risk assessment, with at least the following covered: 1 Identification shall be carried out for various types of risks that may pose a threat to the protected object by combining the current internal and external environmental conditions and security capability; 2 Analysis shall be carried out on the possibility of the occurrence of the identified risks and the severity of the consequences ( including losses and adverse influence); 3 The risk analysis results shall be compared with the pre-set risk criteria to conduct risk assessment and determine the level of various risks; 4 The risks need to be defensed through security engineering shall be determined according to the risk assessment results by combining the risk tolerance of the security engineering development (using) organization. 4.1.3 The security engineering construction shall target to the risks needing to be defensed and, according to the principle of longitudinal-depth protection and balanced protection, taking into account the personnel protection capability, coordinating and configuring the equipment and facilities for physical protection and electronic protection, protect the protected objects in aspects of unit, position and/or area and target and shall meet the following requirements: 1 The perimeter protection shall meet the following requirements: 1) Protection measures like physical protection and/or intrusion detection and/or video surveillance shall be reasonably selected according to the field environment and security management requirements; 2) The defense capability of different physical protection measures for different risks shall be considered; 3) The detection capability of different intrusion detection devices for different intrusion behaviors such as overtaking, crossing and digging and for the personnel protection response capability after intrusion detection and alarm; 4) The surveillance effect of video surveillance equipment for perimeter environment shall be considered; at least the activities of the personnel in the perimeter environment shall be seen clearly. 2 The entrance/exit protection shall meet the following requirements: 1) Protection measures like physical protection and/or access control and/or intrusion detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements; 2) The defense capability of different physical protection measures for different risks shall be considered; 3) The different identification technology types and the capability of preventing illegal intrusion (forcibly entering, tailgating, opening with technology, etc.) of the access control shall be considered; 4) The detection capability of different intrusion detection devices for different intrusion behaviors such as overtaking and crossing and for the personnel protection response capability after intrusion detection and alarm; 5) The surveillance effect of the video surveillance equipment on the entrance/exit shall be considered; generally, the facial features of the personnel and the license plate number of vehicles going in/out shall be clearly distinguished. 3 The channel and public area protection shall meet the following requirements: 1) Video surveillance shall be selected, with the surveillance effect being such that the conditions of personnel, articles and vehicles passing through shall be clearly seen and that the facial features of the personnel and the license plate number of vehicles at important points shall be clearly distinguished; 2) Intrusion detection and/or physical protection measures may be selected for channels and public areas around the high risk protected object. 4 The protection of important areas and positions such as surveillance center, financial room, water/electric/gas/heating equipment room shall meet the following requirements: 1) Protection measures like physical protection and/or access control and/or intrusion detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements; 2) Security doors and/or security windows shall be adopted for physical protection, other protection measures shall take into account the equipment type selected and its capability of preventing illegal intrusion, response time after alarming as well as the surveillance effect of video surveillance. 5 The protected target protection shall meet the following requirements: 1) Protection measures like physical protection and/or area intrusion detection and/or displacement detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements; 2) The corresponding physical protection measures shall be taken according to the specific conditions of different protected targets and the risks to be prevented; 3) Means of area intrusion detection, displacement detection and the like may be taken to detect and alarm in real time the conditions that a fixed target is approached or moved, with the personnel protection response capability after alarm considered; 4) Where video surveillance is adopted for protection, ensure that the protected target is continuously within the scope of monitoring, and the surveillance effect on the protected target and its area shall be considered. At the very least, it shall be able to see the protected target and the activities of personnel in the area. When the protected target is confidential or has privacy protection requirements, video surveillance shall meet the relevant provisions for confidentiality and privacy protection. 6 For personnel-intensive, large-flow entrances/exits, channels and other places, in addition to security protection measures, measures for personnel evacuation and guidance and express pass shall also be considered. 4.1.4 Where the protected object is determined to be a key target that shall be protected from terrorist attacks, protection measures shall be strengthened according to the specific demand for terrorist attack prevention, and the following requirements shall be met: 1 The perimeter protection shall take into account the joint arrangement of physical protection devices and electronic protection devices; 2 The protection of the entrances/exits and channels shall take into account the arrangement of anti-explosion security inspection equipment, passage gate, vehicle retention device, safety buffers or isolation zones; 3 Personnel-intensive public area protection shall consider the full coverage of video surveillance and the configuration of explosive disposal facilities and defense facilities; 4 The protection of important areas and positions such as surveillance center and water/electric/gas/heating equipment room shall consider the joint arrangement of physical protection devices and electronic protection devices; 5 The application of video image intelligent analysis technique and the special requirements of information storage time shall be considered; 6 The defense and countermeasures against unmanned aerial vehicle shall be considered; 7 Consideration shall be given to strengthening security system and its critical equipment security measures and redundancy measures. 4.2 System configuration planning 4.2.1 The security system configuration planning shall follow the principle of safe, controllable, open and sharing, taking uniform steps to consider subsystem composition, information resources, integration/networking mode, transport network, security management platform (SMP), information sharing application mode, storage management mode, system power supply, interface protocol, intelligent application, system operation and maintenance, system security and the like. 4.2.2 Subsystems of the security system shall be determined according to field investigation, risk protection planning and front-end defense organization condition and shall meet the following requirements: 1 Physical protection system, electronic protection system and security management platform (SMP) shall be designed, selected and arranged comprehensively; 2 Physical protection systems like artificial barrier and protective device (equipment) shall be designed, selected and arranged comprehensively according to field natural conditions, physical space and the like and by reasonably using natural barrier; 3 Electronic protection systems like intrusion and hold-up alarm system (I&HAS), video surveillance system (VSS), access control system (ACS), security management system in parking lots, anti-explosion security inspection system, guard tour system and building intercom system as well as units of subsystems including front-end, transmission, information processing/control/management and display/record shall be designed, selected and arranged comprehensively. 4.2.3 Various integrated and/or networked information resources shall be determined according to the demand of integrated management over security subsystems. 4.2.4 The following system integration networking methods shall be reasonably selected according to the actual needs of sharing and exchanging information resources as well as the complexity of the systems: 1 Simple linkage method realized by signal driving between different subsystem equipment; 2 Subsystem linkage method realized by communication between different subsystem management software; 3 Integrated method of controlling and managing in a centralized way the security subsystems and other subsystems through security management platform (SMP); 4 Cascading mode of large-scale and cross-regional security systems realized through the interconnection of multi-level security management platforms; 5 Comprehensive application mode of integrating and networking security system with other business systems according to the demands of security management. 4.2.5 Dedicated transmission network should be adopted for the security system, for which dedicated line mode or public transport network-based virtual private network (VPN) mode may be adopted. The transmission network should adopt a star/tree transmission network topology with the surveillance center as the tandem/core point (root node). The communication link of system transmission shall meet the needs of the system for information transmission, exchange and sharing. When the wired transmission is not available, a wireless transmission method with corresponding security measures may be adopted. 4.2.6 The specific functions of security management platform (SMP) shall be reasonably planned according to the actual demands for integration, networking and management of security system, with the relevant provisions in 6.4.1 of this standard met. 4.2.7 Client-side and/or branch platform shall be arranged according to the actual demands for information sharing application of security system. The planning and design of client-side and/or branch platform shall be carried out based on the system private transmission networks. Security management platform (SMP) may also realize information exchange and sharing through perimeter security isolation measures and security system and/or other business system constructed on the basis of other network environment. 4.2.8 Data storage management mode shall be reasonably planned according to the actual demands for information storage and management of security system. 4.2.9 Main power supply, standby power supply as well as the power supply mode and supporting measures shall be reasonably selected according to spatial distribution characteristics, power supply conditions and security assurance demands of security system and its equipment. 4.2.10 Various interfaces of system as well as information transmission, exchange and control protocols shall be planned and designed in an overall way according to specific requirements of security system, equipment interconnection and information sharing application. 4.2.11 Intelligent module design for security management platform (SMP) shall be carried out according to the actual demands of users on security system information and data deepening application, or intelligent application systems, including video intelligent analysis system, big data analysis system, etc., shall be separately planned and designed outside the security management platform (SMP). 4.2.12 The operation and maintenance module of security management platform (SMP) shall be designed according to the scale and complexity of the equipment the security system connects, or operation and maintenance platform (operation and maintenance system) shall be separately planned and designed outside the security management platform (SMP) so as to guarantee the normal operation of security system, equipment and network. 4.2.13 Integrated planning shall be made for the security policies of security system, and appropriate access equipment measures, data security measures, transmission network security measures as well as security isolation measures at perimeter of different networks shall be selected according to the relevant requirements of information security. 4.3 Personnel protection planning 4.3.1 Security engineering development (using) organization shall carry out personnel protection planning according to the principle of combination of personnel protection, physical protection and electronic security as well as coordination between detection, delay and response, comprehensively considering the capability of physical protection and electronic security as well as the demands of system normal operation and emergency disposal. 4.3.2 Security engineering development (using) organization shall reasonably arrange security personnel, system operation and maintenance personnel and other personnel as well as necessary equipment, facilities and outfits for protection and defense. 4.3.3 The number and location of personal, equipment, facilities and outfits shall meet the requirements of security system on operation, emergency response, site disposal and expected risk resistance. 4.3.4 The security management system shall be established and improved, and business process shall be optimized by combining the operation requirements of security system. 4.3.5 Emergency response plans shall be made separately targeted to various emergencies, and drilling shall be carried out periodically. The emergency response plan shall cover at least the events in question, personnel and division of labor, procedures and measures for disposal, use of equipment (facilities or outfits), target protection and personnel evacuation plan. 4.3.6 Technology and skills training mechanisms shall be established to ensure that personnel are competent for the corresponding posts. 5 Engineering construction procedure 5.1 General requirements 5.1.1 The construction procedure of security engineering shall be divided into several main stages including project approval, engineering design, engineering construction, engineering preliminary acceptance and commissioning, engineering inspection, acceptance and handover as well as system operation and maintenance. 5.1.2 The security engineering construction management shall be carried out in accordance with those specified in GB/T 50326 The code of construction project management. 5.2 Project approval 5.2.1 During the project approval of security engineering, project proposal shall be developed, putting forward the actual demands of security as well as project construction planning. 5.2.2 The feasibility study report shall be prepared after the approval of project proposal. The feasibility study report shall analyze, demonstrate and comprehensively evaluate the technical feasibility and economic rationality, be capable of providing investment decision-making basis for the security engineering construction, and it includes design descriptions, design drawings, main equipment lists, and project cost (investment) estimations. 5.3 Project design 5.3.1 Before the preliminary design of security engineering, the development organization shall organize to compile the design assignment according to the approved feasibility study report. The design assignment shall, in accordance with relevant national laws and regulations, standards and specifications as well as management application demands, make clear the engineering construction purpose and content, protected object and defensing object, security demand, risks to be defensed by the security engineering and functional requirements of security system. 5.3.2 The development organization shall determine the design organization in accordance with relevant laws and regulations. 5.3.3 Design organization shall, jointly with relevant organizations, carry out field investigation and prepare field investigation report which shall be confirmed by parties participated in the investigation. 5.3.4 The design organization shall, according to the design assignment, design contract and field investigation report, carry out preliminary design work and put forward the specific implementation scheme for achieving the project construction goal and meeting the security management requirements. The preliminary design documents shall include design descriptions, preliminary design drawings, main equipment and material lists as well as engineering estimates. 5.3.5 After the preliminary design of security engineering is completed, the project management organization shall organize experts to review the preliminary design scheme and provide review comments. 5.3.6 After the review on preliminary design scheme of security engineering is passed and confirmed by the project management organization, the design organization shall design the construction drawing according to the preliminary design scheme and review comments. 5.3.7 The construction drawing design documents shall meet the needs for procurement of equipment and materials as well as manufacture and construction of non-standard equipment. The construction drawing design documents shall include design descriptions, construction drawing design drawings, equipment material lists as well as engineering estimates. 5.3.8 After the construction drawing design is completed, the development organization shall, in accordance with policies and regulations, report the relevant data to the construction administration department for review. The data that shall be provided by the design organization to the review organization include documents and attachments that are served as the investigation and design basis and approved by relevant government departments, full set of construction drawings and other deliverables. 5.4 Engineering construction 5.4.1 After the construction drawing review is passed, the development organization shall determine the construction organization in accordance with relevant laws and regulations. 5.4.2 The detailed design shall, based on the construction drawing design documents which pass the review, review, check and revise the construction drawing design content, express in a quantified and accurate way the design contents as well as requirements of equipment, materials and processes, and detail the special requirements for construction party and construction operations. 5.4.3 Construction drawing design organization shall cooperate with the detailed design organization in understanding the system conditions and requirements and review the design drawings of the detailed design organization. 5.4.4 After the detailed design is completed, it shall be reviewed by the project management organization. After the review is passed, the detailed design organization shall submit all the detailed design documents. 5.4.5 Before the engineering construction, the design organization shall carry out design disclosure for construction organization and supervision organization. 5.4.6 During engineering construction, the construction organization shall order according to the technical index specified in detailed design document and construct according to construction content and construction process therein. 5.4.7 Pipeline laying, equipment installation, system debugging, etc. in the security engineering shall be implemented according to those specified in clause 7 of this standard. 5.4.8 During the engineering construction, the development organization may entrust the supervision organization with corresponding capability to supervise and manage the engineering construction. The engineering supervision shall be implemented in accordance with clause 8 of this standard. 5.5 Engineering preliminary acceptance and commissioning 5.5.1 The construction organization shall carry out technical training for related personnel in accordance with the engineering contract requirements. The training outline, course arrangement and training scheme shall be submitted to the project management organization for review and approval. 5.5.2 Should the engineering quality and system functional performance meet the requirements of engineering contract and design documents upon the self-inspection of construction organization, the project management organization, design organization and construction organization shall jointly carry out preliminary acceptance for the engineering, producing the preliminary acceptance report. 5.5.3 After the preliminary acceptance is passed and item rectification and re-inspection is completed, security system shall be put into commissioning for at least 30d. During the commissioning, construction organization shall cooperate with the project management organization in establishing management system for system operation and maintenance. 5.5.4 Should the system meet the requirements of the contract and design documents upon the commissioning, the project management organization shall issue a commissioning report according to the system operation condition and commissioning record during the commissioning. 5.6 Engineering inspection, acceptance and handover 5.6.1 After the security engineering is constructed and, upon the commissioning, meets the requirements of engineering contract and design documents, the construction organization shall prepare the completion report. 5.6.2 The construction organization shall prepare the completion documents according to detailed design drawings, drawing review records as well as documents for design change, engineering alternation and others. The completion documents shall be complete, accurate, true, signed and sealed, and consistent with the construction content. 5.6.3 For high risk protected objects and security engineering that shall be subject to engineering inspection in accordance with the requirements of relevant laws and regulations, engineering contract, etc., the inspection agency shall inspect the engineering quality and issue inspection report before engineering completion acceptance. The basis and procedure for the engineering inspection as well as inspection items, requirements and methods shall be as specified in clause 9 of this standard. Foreword i 1 General provisions 2 Terms 3 Basic requirements 4 Planning 4.1 Risk protection planning 4.2 System configuration planning 4.3 Personnel protection planning 5 Engineering construction procedure 5.1 General requirements 5.2 Project approval 5.3 Project design 5.4 Engineering construction 5.5 Engineering preliminary acceptance and commissioning 5.6 Engineering inspection, acceptance and handover 5.7 System operation and maintenance 6 Engineering design 6.1 General requirements 6.2 Field investigation 6.3 Physical protection design 6.4 Electronical protection design 6.5 Integration and networking design 6.6 Safety design 6.7 EMC design 6.8 Reliability design 6.9 Maintainability design 6.10 Environmental adaptation design 6.11 Lightning protection and grounding design 6.12 Power supply design 6.13 Signal transmission design 6.14 Surveillance center design 7 Engineering construction 7.1 Construction preparation 7.2 Engineering construction 7.3 System debugging 8 Engineering supervision 8.1 General requirements 8.2 Construction preparation supervision 8.3 Engineering construction supervision 8.4 System debugging supervision 8.5 Engineering preliminary acceptance and system commissioning supervision 9 Engineering inspection 9.1 General requirements 9.2 System architecture inspection 9.3 Physical protection inspection 9.4 Electronic security inspection 9.5 Security, electromagnetic compatibility, lightning protection and grounding inspection 9.6 Inspection for power supply and signal transmission 9.7 Surveillance center and equipment installation inspection 10 Engineering acceptance 10.1 Organization of acceptance 10.2 Construction acceptance 10.3 Technical acceptance 10.4 Information review 10.5 Acceptance conclusion 11 System operation and maintenance 11.1 General requirements 11.2 System operation 11.3 System maintenance 12 Consultation service 12.1 General requirements 12.2 Consultation contents Explanation of wording in this standard List of quoted standards 1 总 则 1.0.1 为了规范安全防范工程建设程序以及工程的设计、施工、监理、检验、验收、运行、维护和咨询服务,提高安全防范工程建设质量和系统运行、维护水平,保护人身安全和财产安全,维护社会安全稳定,制定本标准。 1.0.2 本标准适用于新建、改建和扩建的建(构)筑物的安全防范工程的建设以及系统运行与维护。 1.0.3 安全防范工程的建设应纳入工程建设的总体规划,根据其使用功能、安全防范管理要求和建设投资等因素,进行同步实施和独立验收。 1.0.4 安全防范工程的建设应将人力防范(人防)、实体防范(物防)、电子防范(技防)等手段有机结合,通过科学合理的规划、设计、施工、运行及维护,构建满足安全防范管理要求、具有相应风险防范能力的综合防控体系。 1.0.5 安全防范系统均应具有安全性、可靠性、可维护性和可扩展性,做到技术先进、经济适用。 1.0.6 在涉及国家安全、国家秘密的特殊领域开展安全防范工程建设,应按照相关管理要求,严格安全准入机制,选用安全可控的产品设备和符合要求的专业设计、施工和服务队伍。 1.0.7 安全防范工程的建设必须符合国家有关法律、法规的规定。 1.0.8 安全防范工程的建设除应符合本标准外,尚应符合国家现行有关标准的规定。 2 术 语 2.0.1 安全防范 security 综合运用人力防范、实体防范、电子防范等多种手段,预防、延迟、阻止入侵、盗窃、抢劫、破坏、爆炸、暴力袭击等事件的发生。 2.0.2 人力防范personnel protection 具有相应素质的人员有组织的防范、处置等安全管理行为,简称人防。 2.0.3 实体防范physical protection 利用建(构)筑物、屏障、器具、设备或其组合,延迟或阻止风险事件发生的实体防护手段,又称物防。 2.0.4电子防范 electronic security 利用传感、通信、计算机、信息处理及其控制、生物特征识别等技术,提高探测、延迟、反应能力的防护手段,又称技防。 2.0.5安全防范系统 security system 以安全为目的,综合运用实体防护、电子防护等技术构成的防范系统。 2.0.6安全防范工程 security engineering 为建立安全防范系统而实施的建设项目。 2.0.7 实体防护系统physical protection system 以安全防范为目的,综合利用天然屏障、人工屏障及防盗锁、柜等器具、设备构成的实体系统。 2.0.8 电子防护系统 electronic protection system 以安全防范为目的,利用各种电子设备构成的系统。通常包括入侵和紧急报警、视频监控、出入口控制、停车库(场)安全管理、防爆安全检查、电子巡查、楼寓对讲等子系统。 2.0.9 入侵和紧急报警系统 intrusion and hold-up alarm system(I&HAS) 利用传感器技术和电子信息技术探测非法进入或试图非法进入设防区域的行为,和由用户主动触发紧急报警装置发出报警信息、处理报警信息的电子系统。 2.0.10视频监控系统 video surveillance system(VSS) 利用视频技术探测、监视监控区域并实时显示、记录现场视频图像的电子系统。 2.0.11 出入口控制系统 access control system(ACS) 利用自定义符识别和(或)生物特征等模式识别技术对出入口目标进行识别,并控制出入口执行机构启闭的电子系统。 2.0.12 停车库(场)安全管理系统 security management system in parking lots 对人员和车辆进、出停车库(场)进行登录、监控以及人员和车辆在库(场)内的安全实现综合管理的电子系统。 2.0.13 防爆安全检查系统 anti-explosion security inspection system 对人员和车辆携带、物品夹带的爆炸物、武器和(或)其他违禁品进行探测和(或)报警的电子系统。 2.0.14 电子巡查系统 guard tour system 对巡查人员的巡查路线、方式及过程进行管理和控制的电子系统。 2.0.15楼寓对讲系统 building intercom system 采用(可视)对讲方式确认访客,对建筑物(群)出入口进行访客控制与管理的电子系统,又称访客对讲系统。 2.0.16 安全防范管理平台 security management platform(SMP) 对安全防范系统的各子系统及相关信息系统进行集成,实现实体防护系统、电子防护系统和人力防范资源的有机联动、信息的集中处理与共享应用、风险事件的综合研判、事件处置的指挥调度、系统和设备的统一管理与运行维护等功能的硬件和软件组合。 2.0.17保护对象protected object 由于面临风险而需对其进行保护的对象,包括单位、建(构)筑物及其内外的部位、区域以及具体目标。 2.0.18高风险保护对象high risk protected object 依法确定的治安保卫重点单位和防范恐怖袭击重点目标。 2.0.19 防范对象defensing object 需要防范的、对保护对象构成威胁的对象。 2.0.20 风险 risk 保护对象自身存在的安全隐患及其所面临的可能遭受入侵、盗窃、抢劫、破坏、爆炸、暴力袭击等行为的威胁。 2.0.21风险评估 risk assessment 通过风险识别、风险分析、风险评价,确认安全防范系统需要防范的风险的过程。 2.0.22 风险等级level of risk 存在于保护对象本身及其周围的、对其安全构成威胁的单一风险或组合风险的大小,以后果和可能性的组合来表达。 2.0.23 防护级别level of protection 为保障保护对象的安全所采取的防范措施的水平。 2.0.24 安全等级 security grade 安全防范系统、设备所具有的对抗不同攻击的能力水平。 2.0.25 探测detection 对显性风险事件和(或)隐性风险事件的感知。 2.0.26 延迟delay 延长或(和)推迟风险事件发生的进程。 2.0.27反应 response 为应对风险事件的发生所采取的行动。 2.0.28误报警 false alarm 对未设计的事件做出响应而发出的报警。 2.0.29 漏报警leakage alarm 对设计的报警事件未做出报警响应。 2.0.30 周界perimeter 保护对象的区域边界。 2.0.31 防区 zone 在防护区域内,入侵和紧急报警系统可以探测到入侵或人为触发紧急报警装置的区域。 2.0.32 监控区域 surveillance area 视频监控系统的视频采集装置摄取的图像所对应的现场空间范围。 2.0.33 受控区 controlled area/protected area 出入口控制系统的一个或多个出入口控制点所对应的、由物理边界封闭的空间区域。 2.0.34 纵深防护longitudinal-depth protection 根据保护对象所处的环境条件和安全防范管理要求,对整个防范区域实施由外到里或由里到外层层设防的防护措施。纵深防护分为整体纵深防护和局部纵深防护两种类型。 2.0.35均衡防护 balanced protection 安全防范系统各部分的安全防护水平基本一致,无明显薄弱环节。 2.0.36 监控中心 surveillance center 接收处理安全防范系统信息、处置报警事件、管理控制系统设备的中央控制室,通常划分为值守区和设备区。 2.0.37 系统运行 system operation 利用安全防范系统开展报警事件处置、视频监控、出入控制等安全防范活动的过程。 2.0.38 系统维护 system maintenance 保障安全防范系统正常运行并持续发挥安全防范效能而开展的维修保养活动。 2.0.39系统效能评估 system effectiveness evaluation 对安全防范系统满足预期效能程度的分析评价过程。 3 基本规定 3.0.1 安全防范工程建设与系统运行维护应进行全生命周期管理,统筹规划。应遵循工程建设程序与要求,确定各阶段目标,有计划、有步骤地开展工程建设、系统运行与维护。 3.0.2 安全防范工程的建设应遵循下列原则: 1 人防、物防、技防相结合,探测、延迟、反应相协调; 2 保护对象的防护级别与风险等级相适应; 3 系统和设备的安全等级与防范对象及其攻击手段相适应; 4 满足防护的纵深性、均衡性、抗易损性要求; 5 满足系统的安全性、可靠性要求; 6 满足系统的电磁兼容性、环境适应性要求; 7 满足系统的实时性和原始完整性要求; 8 满足系统的兼容性、可扩展性、可维护性要求; 9 满足系统的经济性、适用性要求。 3.0.3 安全防范工程建设应进行风险防范规划、系统架构规划和人力防范规划。应通过风险评估明确需要防范的风险,统筹考虑人力防范能力,合理选择物防和技防措施,构建安全可控、开放共享的安全防范系统。 3.0.4 安全防范工程中使用的设备、材料必须符合国家法规和现行相关标准的要求,并经检测或认证合格。 3.0.5 安全防范工程施工、初验与试运行等阶段宜聘请监理机构进行工程监理。 3.0.6 高风险保护对象的安全防范工程应进行工程检验。工程检验应由具有安全防范工程检验资质且检验能力在资质能力授权范围内的检验机构实施。 3.0.7 安全防范工程竣工后,应进行独立验收或专项验收。 3.0.8 安全防范系统建设(使用)单位应建立系统运行与维护的保障体系和长效机制,保障安全防范系统正常运行,并持续发挥安全防范效能。 3.0.9 安全防范系统运行过程中,建设(使用)单位宜结合安全防范需求和系统使用情况,进行风险评估和系统效能评估。 3.0.10 安全防范工程建设与系统运行维护全生命周期内宜引入专业咨询服务机制。 4 规 划 4.1 风险防范规划 4.1.1 安全防范工程建设应明确保护对象及其安全需求,并应符合下列规定: 1 保护对象的确定应考虑保护单位、保护部位和(或)区域、保护目标三个层次;保护目标分为需要保护的物品目标、人员目标以及系统和(或)设备和(或)部件等; 2 保护对象的安全需求应根据治安防范和反恐防范的需求进行分析和确定。 4.1.2 安全防范工程建设应根据保护对象的安全需求,通过风险评估确定需要防范的具体风险,至少应包括下列内容: 1 应结合当前的内外部环境条件和安全防范能力,针对可能对保护对象安全构成威胁的各类风险进行识别; 2 应对识别出的各种风险发生的可能性和造成后果(包括损失和不良影响)的严重性进行分析; 3 应将风险分析结果与预先设定的风险准则相比较,进行风险评价,确定各种风险的等级; 4 应根据风险评价结果,结合安全防范工程建设(使用)单位对风险的承受度和容忍度,对需要通过安全防范工程进行防范的风险进行确认。 4.1.3 安全防范工程建设应针对需要防范的风险,按照纵深防护和均衡防护的原则,统筹考虑人力防范能力,协调配置实体防护和(或)电子防护设备、设施,对保护对象从单位、部位和(或)区域、目标三个层面进行防护,且应符合下列规定: 1 周界的防护应符合下列规定: 1)应根据现场环境和安全防范管理要求,合理选择实体防护和(或)入侵探测和(或)视频监控等防护措施; 2)应考虑不同的实体防护措施对不同风险的防御能力; 3)应考虑不同的入侵探测设备对翻越、穿越、挖洞等不同入侵行为的探测能力以及入侵探测报警后的人防响应能力; 4)应考虑视频监控设备对周界环境的监视效果,至少应能看清周界环境中人员的活动情况。 2 出入口的防护应符合下列规定: 1)应根据现场环境和安全防范管理要求,合理选择实体防护和(或)出入口控制和(或)入侵探测和(或)视频监控等防护措施; 2)应考虑不同的实体防护措施对不同风险的防御能力; 3)应考虑出入口控制的不同识读技术类型及其防御非法入侵(强行闯入、尾随进入、技术开启等)的能力; 4)应考虑不同的入侵探测设备对翻越、穿越等不同入侵行为的探测能力,以及入侵探测报警后的人防响应能力; 5)应考虑视频监控设备对出入口的监视效果,通常应能清晰辨别出入人员的面部特征和出入车辆的号牌。 3 通道和公共区域的防护应符合下列规定: 1)应选择视频监控,监视效果应能看清监控区域内人员、物品、车辆的通行状况;重要点位宜清晰辨别人员的面部特征和车辆的号牌; 2)高风险保护对象周边的通道和公共区域,可选择入侵探测和(或)实体防护措施。 4 监控中心、财务室、水电气热设备机房等重要区域、部位的防护应符合下列规定: 1)应根据现场环境和安全防范管理要求,合理选择实体防护和(或)出入口控制和(或)入侵探测和(或)视频监控等防护措施; 2)实体防护应选择防盗门和(或)防盗窗,其他防护措施应考虑选择的设备类型及其防御非法入侵的能力、报警后的响应时间以及视频监控的监视效果。 5 保护目标的防护应符合下列规定: 1)应根据现场环境和安全防范管理要求,合理选择实体防护和(或)区域入侵探测和(或)位移探测和(或)视频监控等防护措施; 2)应根据不同保护目标的具体情况和对抗的风险,采取相应的实体防护措施; 3)可采用区域入侵探测、位移探测等手段对固定目标被接近或被移动的情况实时探测报警,应考虑报警后的人防响应能力; 4)采用视频监控进行防护时,应确保保护目标持续处于监控范围内,应考虑对保护目标及其所在区域的监视效果。且至少应能看清保护目标及其所在区域中人员的活动情况,当保护目标涉密或有隐私保护需求时,视频监控应满足保密和隐私保护的相关规定。 6 针对人员密集、大流量的出入口、通道等场所,除应考虑安全防护措施外,还应考虑人员疏导和快速通行等措施。 4.1.4 当保护对象被确定为防范恐怖袭击重点目标时,应根据防范恐怖袭击的具体需求,强化防护措施,并应符合下列规定: 1 周界的防护应考虑实体防护装置和电子防护装置的联合设置; 2 出入口和通道的防护应考虑防爆安全检查设备、人行通道闸和车辆阻挡装置的设置以及设置安全缓冲或隔离区等; 3 人员密集的公共区域防护应考虑视频监控的全覆盖、排爆设施和防御设施的配置; 4 监控中心、水电气热设备机房等重要区域、部位防护应考虑实体防护装置和电子防护装置的联合设置; 5 应考虑视频图像智能分析技术的应用和信息存储时间的特殊要求; 6应考虑对无人飞行器的防御和反制措施; 7 应考虑对安全防范系统及其关键设备安全措施和冗余措施的加强。 4.2 系统架构规划 4.2.1 安全防范系统架构规划应按照安全可控、开放共享的原则,统筹考虑子系统组成、信息资源、集成/联网方式、传输网络、安全防范管理平台、信息共享应用模式、存储管理模式、系统供电、接口协议、智能应用、系统运行维护、系统安全等要素。 4.2.2 安全防范系统的各子系统应根据现场勘察和风险防范规划以及前端布防情况确定,并应符合下列规定: 1 应综合设计和选择配置实体防护系统、电子防护系统、安全防范管理平台; 2 应根据现场自然条件、物理空间等情况,合理利用天然屏障,综合设计和选择配置人工屏障、防护器具(设备)等实体防护系统; 3 应综合设计和选择配置入侵和紧急报警系统、视频监控系统、出入口控制系统、停车库(场)安全管理系统、防爆安全检查系统、电子巡查系统、楼寓对讲系统等电子防护子系统,以及各子系统的前端、传输、信息处理/控制/管理、显示/记录等单元。 4.2.3 集成和(或)联网的各类信息资源应根据对安全防范各子系统集成管理的需要确定。 4.2.4 应根据各类信息资源共享、交换的实际需要以及系统复杂程度的不同,合理选择下列系统集成联网方式: 1 通过不同子系统设备之间的信号驱动实现的简单联动方式; 2 通过不同子系统管理软件之间的通信实现的子系统联动方式; 3 通过安全防范管理平台实现对安全防范各子系统以及其他子系统集中控制与管理的集成方式: 4 通过对多级安全防范管理平台的互联,实现大范围、跨区域安全防范系统的级联方式; 5 根据安全防范管理的需要,安全防范系统还可与其他业务系统进行集成、联网的综合应用方式。 4.2.5 安全防范系统宜采用专用传输网络,可采用专线方式或公共传输网络基础上的虚拟专网(VPN)方式。传输网络宜采用以监控中心为汇接/核心点(根节点)的星形/树形传输网络拓扑结构。系统传输的通信链路应满足系统的信息传输、交换和共享应用的需要。当有线传输不具备条件时,可采用具有相应安全措施的无线传输方式。 4.2.6 应根据安全防范系统集成、联网与管理的实际需要,合理规划设计安全防范管理平台的具体功能,且应符合本标准第6.4.1条的相关规定。 4.2.7 应根据安全防范系统信息共享应用的实际需要。设置客户端和(或)分平台。客户端和(或)分平台宜基于系统专用传输网络进行规划设计。安全防范管理平台也可通过边界安全隔离措施与基于其他网络环境建设的安全防范系统和(或)其他业务系统实现信息的交换与共享。 4.2.8 应根据安全防范系统信息存储与管理的实际需要,合理规划数据存储管理模式。 4.2.9 应根据安全防范系统及其设备的空间分布特点、供电条件和安全保障需求,合理选择主电源、备用电源及其供电模式和保障措施。 4.2.10 应根据安全防范系统、设备互联互通以及信息共享应用的具体要求,统筹规划设计系统的各类接口以及信息传输、交换、控制协议。 4.2.11 应根据用户对安全防范系统信息、数据深化应用的实际需求,进行安全防范管理平台的智能化模块设计,或在安全防范管理平台之外单独规划设计智能化应用系统,包括视频智能分析系统、大数据分析系统等。 4.2.12 应根据安全防范系统接入设备的规模及复杂程度,进行安全防范管理平台的运行维护模块设计,或在安全防范管理平台之外单独规划设计运行维护管理平台(运行维护管理系统),保障安全防范系统、设备以及网络的正常运行。 4.2.13 应按照信息安全相关要求,整体规划安全防范系统的安全策略,选择适宜的接入设备安全措施、数据安全措施、传输网络安全措施以及不同网络的边界安全隔离措施等。 4.3 人力防范规划 4.3.1 安全防范工程建设(使用)单位应根据人防、物防、技防相结合,探测、延迟、反应相协调的原则,综合考虑物防、技防能力以及系统正常运行、应急处置的需要,进行人力防范规划。 4.3.2 安全防范工程建设(使用)单位应合理配备保卫人员、系统值机操作和维护人员等人力资源以及必要的防护、防御和对抗性设备、设施和装备。 4.3.3 人员、设备、设施和装备的数量及部署位置应满足安全防范系统运行、应急反应、现场处置和预期风险对抗能力的要求。 4.3.4 应建立健全安全防范管理制度,并结合安全防范系统运行要求,优化业务流程。 4.3.5 应针对各类突发事件分别制定应急处置预案,并定期演练。应急处置预案至少包括针对的事件、人员及分工、处置的流程及措施、设备(设施或装备)的使用、目标保护和人员疏散方案等内容。 4.3.6 应建立技术、技能培训机制,确保人员胜任工作岗位。 5工程建设程序 5.1 一般规定 5.1.1 安全防范工程建设程序应划分项目立项、工程设计、工程施工、工程初步验收与试运行、工程检验验收及移交、系统运行维护等主要阶段。 5.1.2 安全防范工程建设管理应按现行国家标准《建设工程项目管理规范》GB/T 50326的有关规定执行。 5.2 项目立项 5.2.1 安全防范工程项目立项时,应编制项目建议书,项目建议书应提出安全防范的实际需求和项目建设规划。 5.2.2 项目建议书经批准后,应编制可行性研究报告。可行性研究报告应对技术可行性与经济合理性进行分析、论证和综合评价,应能为安全防范工程建设提供投资决策依据。可行性研究报告应包括设计说明、设计图纸、主要设备清单及工程造价(投资)估算等。 5.3 工程设计 5.3.1 安全防范工程初步设计前,建设单位应根据获得批准的可行性研究报告组织编制设计任务书。设计任务书应根据相关的国家法律法规规定、标准规范要求和管理使用需求,明确工程建设的目的及内容、保护对象和防范对象、安全需求、安全防范工程需要防范的风险、安全防范系统功能性能要求等。 5.3.2 建设单位应按照相关法律法规的要求,确定设计单位。 5.3.3 设计单位应会同相关单位进行现场勘察,并编制现场勘察报告。现场勘察报告应经参与勘察的各方确认。 5.3.4 设计单位应根据设计任务书、设计合同和现场勘察报告开展初步设计工作,提出实现项目建设目标、满足安全防范管理要求的具体实施方案。初步设计文件应包括设计说明、初步设计图纸、主要设备和材料清单及工程概算书等。 5.3.5 安全防范工程初步设计完成后,项目管理机构应组织专家对初步设计方案进行评审,并出具评审意见。 5.3.6 安全防范工程初步设计方案评审通过并经项目管理机构确认后,设计单位应根据初步设计方案及评审意见进行施工图设计。 5.3.7 施工图设计文件应满足设备材料采购、非标准设备制作和施工的需要。施工图设计文件应包括设计说明、施工图设计图纸、设备材料清单及工程预算书等。 5.3.8 施工图设计完成后,建设单位应根据政策法规要求将相关资料报建设行政主管部门审查。建设单位应向审查机构提供的资料包括作为勘察设计依据的政府有关部门的批准文件及附件、全套施工图、其他应当提交的材料等。 5.4 工程施工 5.4.1 施工图审查通过后,建设单位应按照相关法律法规的要求,确定施工单位。 5.4.2 深化设计应在审查通过的施工图设计文件基础上,对施工图设计的内容进行审查、核算和修订,量化、准确地表达设计内容及设备、材料、工艺要求等,对施工方、施工作业的特殊要求等进行详尽说明。 5.4.3 施工图设计单位应配合深化设计单位了解系统的情况及要求。审核深化设计单位的设计图纸。 5.4.4 深化设计完成后,应由项目管理机构组织评审。评审通过后,深化设计单位应提交全部深化设计文件。 5.4.5 工程施工前,设计单位应对施工单位和监理单位进行设计交底。 5.4.6 工程施工时,施工单位应按照深化设计文件中的技术指标订货、按照深化设计文件规定的建设内容和施工工艺施工。 5.4.7 安全防范工程的管线敷设、设备安装、系统调试等应按本标准第7章执行。 5.4.8 工程施工阶段,建设单位可委托具有相应能力的监理单位对工程建设进行监督管理。工程监理应按本标准第8章执行。 5.5工程初步验收与试运行 5.5.1 施工单位应依据工程合同要求对相关人员进行技术培训。培训大纲、课程设置及培训方案应经项目管理机构评审、批准。 5.5.2 工程质量及系统功能性能经施工单位自检满足工程合同和设计文件要求后,项目管理机构、设计单位及施工单位应共同对工程进行初步验收,形成初步验收报告。 5.5.3 初步验收通过、项目整改及复验完成后,安全防范系统至少应试运行30d。试运行期间,施工单位应配合项目管理机构建立系统的运行、操作和维护等管理制度。 5.5.4 系统经试运行达到合同和设计文件要求,项目管理机构应依据试运行期间系统的运行情况及试运行记录,出具试运行报告。 5.6 工程检验、验收及移交 5.6.1 安全防范工程建设完成,经试运行达到工程合同和设计文件要求后,施工单位应编制竣工报告。 5.6.2 施工单位应根据深化设计图纸、图纸会审记录、设计变更、工程洽商等文件编制竣工文件。竣工文件应完整齐全、准确真实、签章完备,应与施工内容一致。 5.6.3 高风险保护对象以及按照相关法律法规、工程合同等要求需进行工程检验的安全防范工程,应在工程竣工验收前,由检验机构对工程质量进行检验并出具检验报告。工程检验的依据、程序及检验项目、检验要求及方法等应按本标准第9章执行。 5.6.4 工程检验完成、项目整改复验合格后,建设单位应组织竣工验收。竣工验收应包括施工验收、技术验收和资料审查。竣工验收的组织、验收内容和要求、验收结论等应按本标准第10章执行。 5.6.5 安全防范工程竣工验收通过且项目整改复验完成后,施工单位应整理、编制、移交完整的工程竣工文件,并将安全防范系统移交建设单位正式投入使用。 5.7 系统运行与维护 5.7.1 安全防范工程施工单位应按照工程合同、工程质量保修书等的规定,完成工程保修、技术支持等售后服务工作。 5.7.2 建设(使用)单位应制定安全防范系统运行与维护规划,建立包括人员、经费、制度和技术支撑系统在内的运行维护保障体系。 5.7.3 安全防范系统的运行与维护应按本标准第11章执行。 6 工程设计 6.1 一般规定 6.1.1 安全防范工程的设计应运用传感、通信、计算机、信息处理及其控制、生物特征识别、实体防护等技术,构成安全可靠、先进成熟、经济适用的安全防范系统。 6.1.2 安全防范工程的设计应遵循整体纵深防护和(或)局部纵深防护的理念,分别或综合设置建筑物(群)和构筑物(群)周界防护、建筑物和构筑物内(外)区域或空间防护以及重点目标防护系统。 6.1.3 安全防范工程的设计除应满足系统的安全防范效能外,还应满足紧急情况下疏散通道人员疏散的需要。 6.1.4 安全防范工程的设计应以结构化、规范化、模块化、集成化的方式实现,应能适应系统维护和技术发展的需要。 6.1.5 高风险保护对象安全防范工程的设计应结合人防能力配备防护、防御和对抗性设备、设施和装备。 6.2现场勘察 6.2.1 安全防范工程设计前,应进行现场勘察,并应做好现场勘察记录。 6.2.2 现场勘察应符合下列规定: 1 调查保护对象的基本情况,应包括下列内容: 1)保护对象的风险等级与防护级别; 2)保护对象的人防组织管理、物防设施能力与技防系统建设情况; 3)保护对象所涉及的建筑物、构筑物或其群体的基本情况:建筑平面、使用(功能)分配、通道、门窗、电(楼)梯分布、管道、供配电线路布局、建筑结构、墙体及周边情况等; 4)其他需要勘察的内容。 2 调查和了解保护对象所在地及周边的地理、气候、雷电灾害、电磁等自然环境和人文环境等情况,应包括下列内容: 1)调查了解保护对象周围的地形地物、交通情况及房屋状况;调查了解保护对象当地的社情民风及社会治安状况(包括常发、易发的不安全事件和案件); 2)调查工程现场一年中温度、湿度、风、雨、雾、霜等的变化情况和持续时间(以当地气候资料为准);调查了解当地的雷电活动情况和所采取的雷电防护措施; 3)调查保护对象周围的电磁辐射情况,必要时应实地测量其电磁辐射的强度和辐射规律; 4)其他需要勘察的内容。 3 调查和了解防护区域内与工程建设相关的情况,应包括下列内容: 1)周界的形状、长度及已有的物防设施情况,周界出入口及周界内外地形地物情况; 2)防护区域内防护部位、防护目标的分布; 3)防护区域内所有出入口位置、通道长度、门洞尺寸及门窗(包括天窗)的位置、尺寸等; 4)防护区域内各种管道、强弱电竖井分布及供电设施情况; 5)防护区域内光照度变化情况和夜间提供光照度的能力; 6)监控中心/分控中心/专用设备间的位置、建筑结构、使用面积、层高、进/出线位置、供电及防雷接地情况; 7)其他需要勘察的内容。 4 调查和了解保护对象的开放区域(公共区域)的情况,应包括下列内容: 1)人员密集场所的位置、面积、周边环境、应急疏散措施等; 2)开放区域(公共区域)内人员、车辆的承载能力及活动路线; 3)开放区域(公共区域)出入通道(口)位置、数量、形态等; 4)其他需要勘察的内容。 5 调查和了解重点部位和重点目标的情况,应包括下列内容: 1)枪支等武器、弹药、危险化学品、民用爆炸物品、核与放射物品、传染病病原体等物质所在的场所及其周边的情况; 2)电信、广播电视、供水、排水、供电、供气、供热等公共设施所在的场所及其周边的情况; 3)其他需要勘察的内容。 6 调查了解主要防范对象及其攻击特点。 6.2.3 现场勘察结束后应编制现场勘察报告。现场勘察报告的内容应包括项目名称、勘察时间、参加单位及人员、项目概况、勘察内容、勘察记录等。 6.3 实体防护设计 6.3.1 实体防护设计应与建筑选址、建筑设计、景观设计进行统筹规划、同步设计。 6.3.2 实体防护设计应根据保护对象的安全需求,针对防范对象及其威胁方式,按照纵深防护的原则,采取相应的实体防护措施延迟或阻止风险事件的发生。 6.3.3 实体防护设计应遵循安全性、耐久性、联动性、模块化、标准化等原则。 6.3.4 实体防护设计应包括周界实体防护设计、建(构)筑物设计和实体装置设计。 6.3.5 周界实体防护设计应包括周界实体屏障、出入口实体防护、车辆实体屏障、安防照明与警示标志等设计内容。 6.3.6 周界实体屏障的设计应符合下列规定: 1 应根据场地条件合理规划周界实体屏障的位置;周界实体屏障的防护面一侧的区域内不应有可供攀爬的物体或设施; 2 有防爆安全要求的周界实体屏障。应根据爆炸冲击波对防护区域的破坏力和(或)杀伤力,设置有效的安全距离; 3 根据安全防范管理要求,可按照分级、分区、纵深防护的原则,设置单层或多层周界实体屏障;多层周界实体屏障之间宜建立清除区;宜充分利用天然屏障进行综合设计,可多种类、多形式屏障组合应用; 4 有防攀越、防穿越、防拆卸、防破坏、防窥视、防投射物等防护功能的周界实体屏障,其材质、强度、高度、宽度、深度(地面以下)、厚度等应满足防护性能的要求; 5 穿越周界的河道、涵洞、管廊等孔洞,应采取相应的实体防护措施。 6.3.7 出入口实体防护设计应符合下列规定: 1 根据安全防范管理要求,在满足通行能力的前提下,应减少周界出入口数量;出入口应设置实体屏障,宜远离重要保护目标;人员、车辆出入口宜分开设置;可设置有人值守的警卫室或安全岗亭;无人值守的出入口实体屏障的防护能力应与周界实体屏障相当; 2 根据安全防范管理要求,车辆出入口及相关道路设计应考虑车辆限速措施;出入口可设置车辆检查管理区;根据需要,可设置防车辆撞击和爆炸袭击的实体屏障;防车辆尾随时,应采用封闭式廊道、联动互锁门等方式,宜与电子防护系统联合设置; 3 出入口实体屏障宜具有防止人员穿越、攀越、拆卸、破坏、窥视、尾随等防护功能。 6.3.8 车辆实体屏障设计应符合下列规定: 1 根据安全防范管理要求,可在周界、出入口、建(构)筑物外广场等区域或部位设置被动式车辆实体屏障和主动式车辆实体屏障,以限制、禁止、阻挡车辆进入,防范车辆撞击和车辆炸弹袭击对保护对象的伤害; 2 车辆实体屏障应具有减速、吸能、阻停等防护功能;应根据防范车辆的载重、速度及其撞击产生的动能,合理设计车辆实体屏障的高度、结构强度、固定方式和材质材料等。满足相应的防冲撞能力要求; 3 有防爆安全要求的车辆实体屏障。应设置有效的安全距离; 4 车辆实体屏障可多重组合应用,进行纵深防护布置。 |
联系我们
|
微信联系客服
![]() |
关于我们 | 联系我们 | 收费付款 |
服务热线:400-001-5431 | 电话:010-8572 5110 | 传真:010-8581 9515 | Email: bz@bzfyw.com | |
版权所有: 北京悦尔信息技术有限公司 2008-2020 京ICP备17065875号-1 51La |
本页关键词: |
GB 50348-2018, GB/T 50348-2018, GBT 50348-2018, GB50348-2018, GB 50348, GB50348, GB/T50348-2018, GB/T 50348, GB/T50348, GBT50348-2018, GBT 50348, GBT50348 |