{"id":344576,"date":"2024-10-20T00:12:10","date_gmt":"2024-10-20T00:12:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-84732018-tc\/"},"modified":"2024-10-25T23:35:05","modified_gmt":"2024-10-25T23:35:05","slug":"bs-84732018-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-84732018-tc\/","title":{"rendered":"BS 8473:2018 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
35<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4 System design 5 Administration <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6 Documentation and training <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7 Statistics relating to remotely notified I&HAS 8 False alarm management procedure 9 Diagnosis of false alarms <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 10 Restoring of remote notification I&HASs capable of policed alarm conditions <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Annex A (informative)\u2002 Typical steps in the transmission and filtering of alarm conditions <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Annex B (informative)\u2002 Progress of an alarm condition Figure B.1 \u2014 I&HAS not capable of generating confirmed alarms <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Figure B.2 \u2014 I&HAS capable of generating confirmed alarms <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex C (informative)\u2002 Examples of false alarms <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Annex D (normative)\u2002 Preventing false alarms: points to remember <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | Annex E (normative)\u2002 Hold-up alarms and hold-up alarm confirmation Table E.1 \u2014 Guidelines to avoid false activations <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Annex F (informative)\u2002 Corrective maintenance report form Figure F.1 \u2014 Model form for recording corrective maintenance <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Annex G (normative)\u2002 Recommendations for the recording of remotely notified alarm conditions <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Figure G.1 \u2014 Flow diagram illustrating the compilation of monthly reports on remotely notified alarm conditions <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Figure G.2 \u2014 Model form for recording remotely signalled\/notified alarm conditions <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Annex H (normative)\u2002 Attendance on false alarms <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Intruder and hold-up alarm systems. Management of false alarms. Code of practice<\/b><\/p>\n |