Yes No
Note
Engineering Tender
Demonstration of In the case where a design and
Equipment installation contract is already in
place, the tender phases will be Contractors
skipped.
Fail
Pass The Factory Acceptance Test may
be skipped if the equipment has
previously been proven at a similar
Tender Criteria Eskom site. Tender Awarded
Not Met
Contractors
Corrections Factory
Factory Acceptance Test
Acceptance Tests Report
Fail Once
Engineering Acceptance Fail
Pass
Fail Twice
Factory
Contract Defects
Continued on Process
following page
Figure 1: Design and Installation Process (pg1)
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
Site Design and Installation Process - Continued
Responsible
Actions Performed Documents Produced
People
Continued from
Installation previous page
documents Contractors Site Installation Corrections As built design
Fail Once
Engineering Site Acceptance
Site Acceptance Test Report
Tests
Fail
Fail Twice Commissioning
Pass
Contract Defects
Process
Protective
Services
Site Becomes
Operational Operations
Figure 2: Design and Installation Process (pg2)
3.5.1 Site Specific Requirement Specification
A careful examination of the requirements of each site is essential before deciding on the level of security to
implement at a site. The first step of the design process is therefore a site visit by a member of Eskom Group
Security to determine the security risks at the site. From this visit a Risk Assessment and Site Specific
Functional Requirement document will be drawn up highlighting the risks and recommending the level of
security needed at the site. The Eskom document 240-79537982[15] outlines the process for security threat
and risk assessments. The relevant group Security Generic Physical Security Design (PSD) shall also be
applied.
Note that the site visit should include other security which may be needed to be installed or refurbished. For
example should there be an additional fence, additional locking mechanism or burglar guards installed? At
some sites it may be determined that these security measures are sufficient and CCTV is not necessary.
If CCTV is required at a site, site specific CCTV functional requirements shall be drawn up. This document is
compiled by Engineering based on a site visit and the Risk Assessment. The functional requirements shall
take into account what needs to be secured at a site and the risks and challenges associated with the site’s
unique layout. The site specific functional requirement document should include:
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
1) Where detection, observation, recognition and identification are needed from cameras?
2) Where detection will be needed
3) Whether monitoring of the CCTV will be onsite, offsite, or both.
4) The communications mediums available to the site from an offsite security control room.
5) The expected response time of armed response to the site.
6) Any potential blind spots due to the site layout and geography.
7) Suggested zones for the alarm and CCTV system
8) Eskom shall identify the floor space for the security cabinet or provide space in an existing panel.
3.5.2 Design and Tender
Once the CCTV functional requirements documents have been finalised the detailed design can begin. Where
a contractor has not already been appointed for security systems installations, this design will be submitted as
part of the tender process. Where a contract for a number of CCTV sites has already been put in place, the
design phase may mean adapting a generic design for the particular site being secured.
Since not all aspects of the design are required at time of tender, the design documents required at time of
tender and at time of final design are specified separately, below.
Eskom may choose to do the design in-house, in which case some, or all of the design documents will be
provided by Eskom.
3.5.2.1 Tender Design Requirements
The design document shall include:
a) The equipment (make and model) to be used
b) Electronic copies of all equipment data sheets. This should include user and installation manuals if
possible.
c) An overall system diagram showing the interconnections between equipment.
1) Connections between equipment shall be labelled with communication protocol (RS485,
TCP/IP, NO/NC contact) or voltage level.
2) For tender this does not need to include wiring colours/numbers and terminal
names/numbers.
d) The proposed design for both backup power solutions shall be included (see section 3.7.9)
1) 110V DC Power design.
2) 220V AC Power Option:
i. Show expected backup time including calculations.
ii. Include Make, Model and Capacity of batteries to be used
e) A site layout (see Figure 3) showing:
1) The placement of all cameras and detection equipment
2) The purpose of each camera
3) The expected vertical and horizontal fields of view of all cameras. This may be calculated
manually or by using camera CAD software.
4) The detection area of all detection equipment
5) The various alarm zones on the site, with zone name and number
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
6) The routes for cabling to outdoor equipment and motorized gate through existing cable
trenches and dedicated trenches. Cable exit points shall be clearly marked.
7) Cable and wire numbering philosophy and methodology.
8) The position of the security cabinet
9) Position of yard/junction boxes.
f) A list of equipment in the security cabinet.
g) A list of equipment to be in yard boxes (if used).
3.5.2.2 Final Design Requirements
The design document shall include:
a) The equipment (make and model) to be used
b) Electronic copies of all equipment data sheets. This should include user and installation manuals if
possible.
c) An overall system diagram showing the interconnections between equipment.
1) Connections between equipment should be labelled with communication protocol (RS485,
TCP/IP, NO/NC contact) or voltage level.
2) Final Design: Wiring colours and numbers and terminal names/numbers to be indicated for
all connections.
d) Power supply details including:
1) The power supply point(s) to be used, including MCB numbers.
2) The backup power solution to be used at the site (see section 3.7.9)
e) If the preferred 110V DC power option the following shall be included (arranged by Eskom
representative):
1) Document from the relevant DC engineer confirming that the 110V DC supply can be used
for the CCTV system. This document should include calculations that show that the site
backup power requirements can still be achieved with the additional load of the CCTV
system.
f) If the 220V AC Power Option is to be used then the following will be supplied:
1) Expected backup time including calculations.
2) Make, Model and Capacity of batteries to be used
g) A site layout (see Figure 3) showing:
1) The placement of all cameras and detection equipment
2) The purpose of each camera
3) The expected field of view of all cameras
4) The detection area of all detection equipment
5) The various alarm zones on the site, with zone name and number
6) The routes for indoor cabling, clearly marking the trunking or overhead racks to be used /
installed.
7) The routes for cabling to outdoor equipment and motorized gate through existing cable
trenches and dedicated trenches. Cable exit points shall be clearly marked.
8) Cable and wire numbering philosophy and methodology.
9) The position of the security cabinet
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
10) Position of yard/junction boxes.
h) The layout of equipment in the security cabinet.
i) The layout of equipment in yard boxed (if used).
j) The design document shall be accepted by an Eskom Security Systems Engineer before any
installation begins.
k) The site specific Health and Safety plan shall be accepted by an Eskom Health and Safety
practitioner before any installation begins.
Control Room
Identification HFOV>90°
Emergency Observation Exit
Detection
Main Switch Room
Entrance
Emergency
Exit
Main Identification
Fence Entry
Motor Gate Number
plate Observation
recognition
& human HFOV>90°
recognition
Gate Pedestrian
Figure 3: Example of Camera Placement, FOV and Purpose
3.5.3 Tender Technical Evaluation
The tender technical evaluation shall work in conjunction with the Eskom commercial process and shall consist
of two steps:
3.5.3.1 Paper Evaluation
The submission shall be evaluated against the CCTV functional requirements Document based on the tender
proposal documents and the specification sheets of the proposed equipment.
3.5.3.2 Practical Evaluation
Functional testing of the chosen equipment is crucial to ensure that equipment is able to meet the CCTV
functional requirements. Comparing datasheets is not sufficient; the proposed equipment needs to be tested
in a simulated environment to ensure it can meet all requirements.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
If the design submitted meets the CCTV functional requirements ‘on paper’ then a demonstration of the
equipment shall be arranged as the next stage of functional evaluation.
3.5.3.2.1 Presentation
Companies meeting the Paper Evaluation requirements will be required to do a presentation of their proposed
design. The presentation should:
a) Give an overview of the proposed design
b) Highlight advantages of the proposed solution as far as it will enable Eskom to secure it’s sites from
intruders
c) Demonstrate an in depth technical knowledge of and familiarity with the equipment to be used.
d) Demonstrate how equipment will work together to provide the security level required.
e) The suppliers ability to support the equipment when technical issues are encountered
f) Examples of similar installations which the tenderer has done
g) Eskom evaluators may ask questions regarding the proposed solution.
3.5.3.2.2 Demonstration of Equipment
A demonstration of the equipment shall be arranged.
The procedure for the Tender Demonstration Tests can be found in section 0.
Once a contract has been placed, any design changes shall be subject to additional demonstration tests before
Eskom approves the change.
An equipment demonstration may also be required if there is an existing CCTV contract, but the site design
proposes a piece of equipment that has not previously been used on an Eskom site.
3.5.3.2.3 Site Visit
Each tenderer shall arrange for an Eskom representative(s) to view a site where they have done a similar
installation.
The site visit will be evaluated based on:
a) Quality of installation. Cables routed neatly, cabinets organised, cabling labelled.
b) Ability of cameras to operate as expected
c) Effectiveness of intruder detection used.
d) It is acknowledged that maintenance of the system is the system owner’s responsibility and the
condition of equipment and cabling at time of visit may not be a true reflection of the quality at the
time of handover.
3.5.4 Factory Acceptance Test
Once the tender has been awarded and the purchase order for the term contract / site installation has been
placed, Factory Acceptance Tests shall be performed. In the case where there is an existing term contract,
and the equipment and system setup has been proven at previous Eskom installations, the factory acceptance
test need only be done when the contract is established. This shall be at the discretion of the responsible
Eskom engineer. The site where the equipment has been previously proven shall be documented.
The procedure for the Factory Acceptance Tests can be found in section 0
If the Factory Acceptance Tests are not met after corrections have been made, the relevant contract defects
process shall be followed.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.5.5 Installation of System
The CCTV design shall be signed off as accepted by Eskom’s appointed Project Engineer before installation
of the system can begin. No work may begin on site without design approval from Eskom and a site kick off
meeting.
The system shall be installed according to the appropriate manufacturer and Eskom specifications.
Detailed installation specifications can be found in section 3.6 of this document.
Any changes to the design made during the course of installation shall be approved by the Project Engineer
via a project change request (PCR) or a formal site instruction and reflected in the as-built design documents.
3.5.6 Commissioning of System
Commissioning of the System includes adjusting all necessary settings to ensure that the installation meets
the CCTV functional requirements. This requires explicit testing of the system including the simulation of
incidents in all lighting conditions (sunrise, full sun, sunset, night). Commissioning tests include testing the
interface between the CCTV system and the security control room (off site and on site).
The site will not be accepted until Site Acceptance Tests prove that the installation meets all requirements as
set out in the site specific functional requirements.
The procedure for the Site Acceptance Tests can be found in section 0.
If the Site Acceptance Tests are not met after corrections have been made, the relevant contract defects
process shall be followed.
3.5.7 Documentation
On completion of the installation the contractor shall provide Eskom with the following documentation:
a) Detailed as-built drawings of the installation including the following:
1) A site layout diagram indicating the position of all equipment and devices installed. A
complete cable block and wiring diagram with cable & wire numbers
2) A site layout diagram indicating the position of all equipment and devices installed
3) Coverage plots of the areas covered by intruder detectors and a list and description of each
zone.
4) Coverage plots of the areas covered by cameras’ fields of view
5) Alarm system zones
b) Manuals and training for the CCTV surveillance system. The manuals shall include the following:
1) An overview of the CCTV and intruder detection system, including the equipment block
schematic
2) The functions and features of each item of equipment.
3) Individual operating instructions for each item of equipment.
4) Detailed operating instructions for all modes of operation of the CCTV system.
c) Manufacturer’s technical and maintenance specifications for each item of equipment installed.
d) All documents shall be provided in soft and hard copy. Drawings softcopies shall be provided in as
CAD files in .dwg format. Other soft copy documents shall be provided as pdfs.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
e) All system and camera settings shall be recorded, so that they can be confirmed and reproduced as
required.
1) Where possible these settings and configurations shall consist of backup files which can be
loaded onto the relevant equipment in the case of malfunction or replacement.
2) Where the equipment does not allow for softcopy backups, an electronic document listing
the settings may be provided.
3.6 Installation
a) To ensure quality workmanship and sound installation practice, it is imperative that the contractor
adheres to the specifications and standards supplied by Eskom. Should there be any uncertainty
with regards to the specifications; the contractor is to contact the Eskom employee responsible for
the project for guidance.
b) Only contractors with experience in CCTV and alarm system installations shall do installations. To
this end the tenderer shall provide a CV of relevant experience and references.
c) All installers shall adhere to the OHS Act (Occupational Health and Safety Act) of 1970 when
installing the system. Contractors and sub-contractors shall meet the requirements specified by
Eskom Health and Safety specifications
d) All equipment shall have a mechanical earth connected to the site earth according to Eskom
standards.
e) All equipment shall be designed and specified for a minimum realisable operational life 10 years
under the prevailing environmental conditions unless otherwise agreed to by Eskom during the
tender evaluation stage.
f) Consideration must be given for the minimum working and electrical clearances of overhead
equipment – see Eskom Specification 34-304 - Substations, Section 2: Generic Substation Design
[2] - section 4.5.1.2
g) All equipment shall be labelled in accordance with the design diagrams, with durable, weather
resistant labels.
h) Cable and wiring marking shall be in accordance with Eskom standard 240-64636794, Standard for
Wiring and Cable Marking in Substations.
i) All cables and wires shall be marked with a unique identification, at all terminations, in accordance
with the cabling and wiring diagrams supplied.
j) All of the splices and connections shall be mechanically secure and shall provide electrical contact
without stress on connections and terminals. Splicing is strongly discouraged but if unavoidable,
splices used shall have insulation equivalent to that of the wires being joined.
k) Any hole which insulated conductors pass through shall be provided with a smooth, rounded bushing,
or shall have smooth, rounded surfaces upon which the insulated conductors may bear.
l) Wireways shall be smooth and free from sharp edges, burrs, fins, or moving parts that may damage
wiring.
m) All internal wiring connections shall be made with a solder lug or pressure terminal connector
n) A terminal lug shall be arranged such that in any position it cannot contact the metal enclosure, non-
energized accessible metal parts or other electrical circuits. Alternatively the shank of the lug shall
be provided with insulation equivalent to that of the conductor.
o) Terminal blocks shall be in accordance with Eskom standard 240-70413291, Specification for
Electrical Terminal Blocks.
p) The CCTV installation shall be signed off as accepted by Eskom’s appointed Project Engineer for
the security system installation.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.7 System Level
3.7.1 System Overview
The CCTV system consists of various subsystems. A functional block diagram of the CCTV system illustrating
the main subsystems and the interaction between the subsystems is provided in 4 below. The CCTV system
has components both on and off site. What follows is a brief explanation of the system as a whole, detailed
descriptions of each subsystem can be found later in the document.
3.7.1.1 On site
At each site being protected, various subsystems connect to create an integrated security system. These
subsystems will differ from site to site but may include:
a) Physical deterrents such as fences
b) Outdoor perimeter detection provided by a number of technologies
c) Indoor intruder detection provided by a number of technologies
d) Surveillance cameras (indoor and outdoor)
e) Lighting systems
f) Access control equipment
g) Other devices such as sirens, public address systems or alarm system status LEDs
These subsystems will communicate with various controllers (DVR, Alarm panel, PA controller etc.) using a
combination of hardwired contacts and communication busses (RS232, Ethernet, proprietary protocols etc.).
These controllers will communicate with each as necessary to create a system which can meet the functional
requirements set forth in this document. At manned sites there may also be a security monitoring station on
site from which CCTV and alarms can be viewed.
The security equipment cabinet shall also serve as the point of power distribution for the security equipment
which may need a variety of combination of AC and DC power at various voltage levels.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
CCTV Site
Physical Palisade Field Equipment
Other
Deterent Fence
Perimeter Thermal Video
Other
Detection Cameras Analytics
Surveilance Outdoor Indoor Room Entrance Entrance Gates
PT or PTZ Other
Cameras Observation Observation Identification Recognition
Other Lighting IlluminationIR SecurityLighting IndoorLights
Access Gate
Maglocks Other
Control Motor
Other Speakers – LED
Sirens Other
Devices PA System Status
Other Motion Door
Other
Sensors Sensors Contacts
On site
Power Distribution communications
Access Security
Analytic Power
Control NVR/DVR PA System Encoders Equipment Cabinet Equipment
Panel
Monitoring
Alarm Panel
Station
Site Security
Network
Alarm Push &
Remote Access
Fiber Backbone,
Satellite,
Cellular APN,
or Microwave*
*Link provided by Eskom Telecoms
or a 3rd Party Engineering
LAN Backup Maintenance Administrator
Eskom Regional (Optional) Modems Server Room
VMS Alarm Base Operations Investigators
Server(s) Station
Corporate
LAN
Dedicated Comms Selectedor Link
eventssignals
Corporate
Regional Security Control Centre LAN Eskom National
(Eskom or 3rd Party) Security Control Centre
Alarm Base Monitoring Monitoring
Station Workstation Workstation
Figure 4: Functional Block Diagram of CCTV System
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.7.1.2 Eskom Local OT Security Server
All sites with CCTV systems will communicate with a Local OU Security Server. This server shall be owned
and hosted by Eskom. VMS server software will be housed here as well as other server related equipment
such as alarm base stations. Housing the system at an Eskom site ensures that Eskom has control over the
server equipment and prevents Eskom from being locked into using a specific service provider for remote
security monitoring. All sites in the OU will connect to this Local OU Security Server via a combination of
available communication channels. WAN communications may be provided by Eskom or a third party. The
Local OU Security Server shall be suitably protected by physical and network access control (secure room,
user rights, firewalls etc.).
Standalone sites such as Power Stations may be designed with an onsite Local OU Security Server. If
necessary due to budget/resource availability, the server can be hosted at a third party (see 3.11.2.1 for
details).
3.7.1.3 Local Security Control Centre
The Local Security Control Centre shall be responsible for responding to alarms from sites and managing
incidents on site using the CCTV data from site. Ideally the Local Security Control Centre should be an Eskom
manned centre, but budget and resource restraints may necessitate that the control centre be provided by a
third party. Network security between any 3rd parties and the Eskom Network shall be designed and controlled
by Eskom. Details of the activities of the Local Security Control Centre can be found in section 3.12 - Security
Control Room.
The Security Control Centre shall use approved VMS client software to connect to the Eskom OT Security
Server, thereby receiving all alarm signals from the various sites (black screen monitoring). The Local Control
Centre shall also be able to receive video on demand from the sites via the OT Security Server.
The connection between the Local OT Security Server and the Local Security Control Centre shall be a
dedicated link (e.g. a Diginet line / microwave link). There may also be a backup links directly between the
Local Security Control Centre and sites if this is deemed necessary.
3.7.1.4 National Security Control Centre
Eskom intends to establish an Eskom National Security Control Centre from which selected security incidents
can be managed and monitored. A communication link would be established from the local OU security servers
to the National Control Centre server via the Eskom corporate LAN. Selected signals or events would then be
directed to the National Security Control Centre. It shall be possible to escalate events from the Local Security
Control Centre to the National Security Control Centre.
3.7.1.5 Engineering and Operational Access
Eskom engineers shall be able to connect to the Local OT Security Server remotely from the Eskom
Engineering (OT) LAN to perform maintenance and administrative tasks on the system.
Members of Eskom Group Security shall be able to connect to the OT security server remotely from the Eskom
corporate network in order to perform operational tasks (check up-time of systems, confirm sites are being
armed etc.) and investigations (view footage and alarm logs etc.).
This remote access shall be restricted to those who have explicitly been granted access rights.
3.7.2 Operation - Unauthorised Access
The figure below depicts the sequence of events that the security alarm system and personnel shall follow
during unauthorised access to the protected site[3].The CCTV system needs to enable this sequence of events
can take place.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
Figure 5: Unauthorised Access Flow of Information [20]
a) The alarm system shall be triggered by either of the following which could indicate an unauthorised
access:
1) Attempt to disarm system by unauthorised user.
2) Panic button been pressed.
3) Control centre issuing an alarm instruction due to unauthorised access
4) Cameras and alarm sensors detecting violation.
b) Each violation shall be reported to the control centre and notified to the security controller.
c) The security controller shall be able to address the unauthorised person using the Public Address
System.
d) The operator shall be able to use information available, as well as the site history to decide on a
response.
e) The security controller shall be able to confirm the arrival of the responders on site following an alarm
event.
3.7.3 Warrantee and Certification
a) All equipment installed shall be subject to the OEM warrantee.
b) Contractor shall provide proof that technicians have been trained and certified to install and configure
the CCTV equipment specified.
c) There shall be an agreement from the OEM that the OEM supports the tender offering and will
continue to support the product if the tenderer defaults.
3.7.4 General Physical Requirements
All installed equipment shall meet the following mechanical requirements:
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.7.4.1 Environmental conditions
All equipment shall be designed for application in ‘special’ environmental conditions as follows (adapted from
Table 2 of IEC 60255-1[4] ):
a) Ambient air temperature: -25 °C to +55 °C (installed indoors); or -25 °C to +70 °C (installed outdoors,
within enclosures).
b) Altitude: < 2 500 m
c) Pollution: Location in urban areas with industrial activities and without special precautions to
minimize the presence of sand or dust (conditions as per classes 3C2 and 3S2 in IEC 60721-3-
3[12]).
d) Relative humidity (24h average): 98%
e) All outside equipment Including fasteners and supports should be corrosion resistant and appropriate
for the environment on site
f) After fabrication, metal surfaces including doors and removable covers shall be prepared and
finished with corrosion protection.
g) Paint work damaged during transport and delivery shall be made good as per manufacturer repair
specification at no cost to Eskom. If site re-painting is necessary, the equipment and labels shall be
carefully masked and any overpaint which occurs in spite of the masking must be removed. If the
damage is not repairable, Eskom reserves the right to return the equipment.
h) All nuts, bolts and washers use for the construction to be stainless steel. Screws can be cadmium
plated.
i) Further environmental protection may be needed e.g. Equipment installed at a coal power station or
in a mining area will need added dust protection.
j) Convection cooled (fan-less) equipment are strongly preferred. If fans are used, they shall be speed
controlled and the electronics shall be isolated and conformal coated to protect against dust ingress.
3.7.5 General Electrical Requirements
All installed equipment shall meet the following electrical requirements:
a) The expected life of equipment under conditions specified (section 3.7.4.1 above) shall be a minimum
of 5 years.
b) All power cable shall be appropriately sized to ensure voltage drops along cable runs remain within
the operating specifications of the equipment being powered.
c) All equipment shall be effectively protected against overvoltage due to lighting strikes or switching
surges by strategically placed surge arrestors
d) Descriptive cable markings shall be used as agreed to with Eskom. These shall be reflected on the
drawings. See section 3.6 for more details.
e) Cable selection and routing shall always be done in such a way that operation of equipment is not
affected by electrical interference. This may be achieved by separating power and communications
cables, shielding of cables, or a combination of the two.
f) Equipment shall not be affected by electrostatic discharges that are applied directly to the equipment
or to metal objects in the proximity of the equipment: All electronic equipment shall be a class 2
device as specified in IEEE 1613-2009, 8 Electrostatic discharge tests[24]
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.7.6 Cable routes in control plant / equipment rooms:
a) Auxiliary power cables shall be laid in the control room power rack, away from communication
cables.No conduit is needed on the rack.
b) Communications cables should use the control plant room communications rack. No conduit is
needed on the rack.
c) Where cable racks are not available, cables may be routed along the wall or in PVC sleeves in the
cable trench, at Eskom’s discretion.
d) Where security cables are routed along the walls, they shall be in metal or plastic conduit.
e) Auxiliary power and communication cables shall be in separate conduit.
f) In substations, security cables shall not be routed in the ceiling.
g) If fibre optic leads are used they should be protected using sprague tubing when entering and exiting
cable trays or panels.
h) Regional or site specific requirements may supersede the above cable route requirements.
3.7.7 Outdoor Cables and Trenching in Substations
a) Security cable should share control cable or lighting trenches where possible, where this is not
possible, security cable trenches shall be dug.
b) The security cables shall enter the control plant room through the same path as control cables.
c) Security cable trenches shall be 0,5 m deep
d) All cables shall be armoured or laid in appropriately sized plastic conduit (e.g. HDPE, Kabelflex,
whether in cable trenches or dedicated security trenches. The appropriate bends and connectors
must be used for the conduit, according to manufacturer’s instructions.
e) Security systems communication cables and auxiliary power cables shall not be laid in the same
conduit unless using fibre communication or DC power.
f) Drilled holes in junction boxes shall be kept to a minimum and shall be appropriately sealed to prevent
water ingress.
g) Care shall be taken when working with fibre optic cable so as to ensure the fibre is not damaged
during installation or maintenance.
h) The stone layer shall be removed far enough from the cable trench excavation as illustrated in 6.
The trench soil shall not be placed on top of any yard stone.
i) After the cables have been laid, the trenches must be backfilled with the original soil in layers not
exceeding 300mm and properly compacted. Once the backfill is completed, the stone shall be
replaced appropriately.
Figure 6: Cable Trench Layout
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.7.8 Security Cabinet
The security cabinet/panel shall contain all the control equipment of the intruder detection and the surveillance
system (digital video recorder (DVR), communication equipment, public address (PA) etc.). The cabinet shall
be housed within a suitable access controlled equipment room; at substations this shall be the substation
control plant room.
a) Cabinet shall be a freestanding swing frame panel or a freestanding server cabinet.
b) Cabinet shall be designed so as to limit dust ingress which could affect effective operation of
equipment.
c) All points of cable entry shall be through glands so as to secure the cables.
d) Access to the inside of the cabinet shall be restricted and controlled by means a physical lock to
which only authorized security personnel and Eskom employees from the Risk Department shall
have access. Cabinet shall be alarmed for tempering and remain armed when main alarm system is
disarmed. This is subject to regional requirements.
e) Cabinet design shall take into consideration airflow and heat distribution. Equipment shall be laid out
such that units that generate the most heat are at the top.
f) There shall be a dedicated Aux power supply distribution module with a suitably sized incomer
isolator and suitably sized load MCBs per piece of equipment.
g) The incomer supply DB MCB for this module must be correctly sized to protect the incomer cable in
order to prevent nuisance trips.
h) Cables shall be neatly routed in trunking.
i) Cable ties or similar shall be used for cable management.
j) Where possible equipment in the security cabinet shall be 19 inch rack mountable or DIN rail
mounted equipment. Where 19” or DIN rail mounting is not available, equipment shall be neatly
secured on shelves.
k) Equipment or connection accessed regularly shall be accessible from the front of the panel or shall
be wired to a terminal rack accessible from the front.
l) Equipment shall be suitably earthed to the cabinet, and the cabinet shall be earthed to the substation
earth.
m) Eskom shall approve the layout design before the cabinet is populated.
Figure 7: Example of Poorly Organised Figure 8: Example of Well Organised
Security Equipment Cabinet Security Equipment Cabinet
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
3.7.9 Backup Power Supply
Two power supply solutions shall be provided for the system.
Option A will operate off 110V DC and will be connected to the relay house 110V DC supply which has battery
backup.
Option B is to use the 220V AC supply from the site and it shall include a battery backed up UPS for all security
system devices.
The responsible Eskom DC design engineer shall be consulted on a per site basis to determine which power
supply system will be used and to allocate connection MCB’s on the main Distribution Board. Option A be
installed whenever possible since this arrangement leverages off the battery maintenance processes already
in place. Option B will be used when there is no site battery capacity or the capacity is not sufficient to supply
the added load of the camera and alarm system. For both options the standing time for backup power is 12
hours at sites within 200kms of a responsible Eskom DC section, 18 hours at sites more than 200kms from a
responsible Eskom DC section.
Both power supply design options shall be available.
3.7.9.1 Option A: 110V DC
a) The security system shall be powered by 110V supplied from the site’s DC supply. In the event of a
power failure the system will be supplied by the substation’s battery and / or generator backup.
b) The security system shall be supplied by an appropriately sized supply cable and MCB from the site’s
DC panel.
c) The MCB used on the AC/DC panel shall be clearly labelled ‘Security’.
d) Power will be distributed through the panel so as to isolate the supply of the subsystems by means
of appropriately sized MCBs. At a minimum the following will be on separate supply circuits:
1) Intruder detection system
2) Perimeter Cameras
3) DVR, Indoor cameras and PTZ
4) Perimeter detection system (if separate from perimeter cameras)
5) Other security related equipment such as motorized gates or electric fences.
e) Figure 9 below, shows an overview of the power distribution for option A. This should be adapted
according to the equipment being used.
f) All equipment shall meet the specifications of sections 3.7.3 - Warrantee and Certification, 3.7.4 -
General Physical Requirements, and 3.7.5 - General Electrical Requirements.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
MCB DVR
MCB Alarm Panel
110V DC -
mV DC 220V AC MCB Site Batteries 110V DC MCB mV DC
Converter
Other mV DC
MCB
Equipment
110V DC -
nV DC nV DC MCB nV DC MCB
Equipment
Converter
Figure 9: Preferred Power Distribution, Using Backup Power from the Site
3.7.9.2 Option B: 220V AC
a) The security system shall be powered by 220V AC supplied from the site’s AC supply with an
appropriately sized Uninterruptable Power Supply.
b) The security system will be supplied by an appropriately sized supply cable and MCB from the site’s
AC panel.
c) MCB on the AC/DC panel shall be clearly labelled ‘Security’ to indicate the use.
d) Power will be distributed through the panel so as to isolate the supply of the subsystems by means
of appropriately sized MCBs. At a minimum the following will be on separate supply circuits:
1) Intruder detection system
2) Perimeter Cameras
3) DVR, Indoor cameras and PTZ
4) Perimeter detection system (if separate from perimeter cameras)
5) Other security related equipment such as motorized gates or electric fences.
e) An uninterruptible power supply (UPS) shall be installed to supply the entire CCTV and intruder
detection system for a minimum of 12 hours at sites within 200kms of the responsible Eskom DC
section, and for a minimum of 18 hours at sites more than 200kms from the responsible Eskom DC
section.
f) CCTV system batteries in addition to UPS batteries are not recommended. If CCTV system batteries
are unavoidable then individual subsystems that have their own battery backup, these shall not be
fed by the UPS. This is to prevent the UPS from charging these batteries in the event of a power
failure (See figures 10 and 11 ). Any CCTV system batteries used shall provide backup for the time
specified in section e) above.
g) The system shall have a power failure intruder detection indication that shall be sent through to the
security control room should the AC supply be interrupted.
h) The system may have an additional power failure alarm indication that shall be sent through to Eskom
network control via SCADA should the AC supply be interrupted.
i) Figure 11 below, gives an overview of the power distribution for option B. This should be adapted
according to the equipment being used. DC voltages shown are examples; other DC or AC voltages
may be used as necessary.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
j) All equipment shall meet the specifications of sections 3.7.3 - Warrantee and Certification, 3.7.4 -
General Physical Requirements, and 3.7.5 - General Electrical Requirements.
Incorrectly Distributed
MCB DVR
Power û
Other 220V
MCB AC
220V AC 220V AC Equipment MCB
UPS
MCB Alarm Panel
nV DC Power nV DC û nV Battery
Supply UPS is supplying alarm
backup battery Other nV DC
MCB
Equipment
Figure 10: Incorrectly Distributed Option 2 Power, Battery Downstream from UPS
Correctly Distributed
MCB DVR ü Power
Other 220V
MCB AC
220V AC 220V AC Equipment MCB
UPS
MCB Alarm Panel
nV DC Power nV DC MCB nV Battery
Supply ü
Other nV DC
MCB
Equipment
Battery backup
supplied by mains
Figure 11: Correctly Distributed Option 2 Power, Battery Parallel to UPS
3.7.10 Communication
a) A connection from the site to the Eskom local OT security server shall provide the means of
communication to the control centre for, alarms and live viewing.
b) The connection shall also be used for remotely configuring equipment and downloading of recorded
footage
c) The communication link between the site and the security control room shall be by means of a
dedicated and secure communication medium between the sites and the security control room.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
d) Communication shall take place over Eskom’s telecommunications network if at all possible.
1) When specifying a new site Eskom Telecoms will be consulted to determine the feasibility of
using (or establishing) an Eskom Telecoms link to the site.
2) Eskom Telecoms will be consulted before going out on tender and communications available
shall be stated at tender phase.
3) The priority and risk at the site shall be taken into account when deciding whether or not to
increase bandwidth available for security
e) Though the Eskom telecommunication network is preferred, 3rd party communications infrastructure
may be used if necessary.
f) The communication medium will be fibre (2Mbps bandwidth) where possible and satellite or
microwave where fibre is not installed.
g) As a last resort, if a higher bandwidth connection is not possible, GPRS may be used for
communications provided equipment is specified and configured to be operated over the lower
bandwidth.
h) The communication link shall be established according to the latest Eskom specification
DISSCZAA2: CCTV Satellite Telecommunication Specification for Distribution Substations.
i) The connection from the security equipment to the Eskom Telecoms network shall be Ethernet and
use RJ45 connectors.
j) Eskom to provide all IP addresses to be used for on-site LAN.
3.7.11 PA System
The PA system shall provide the means by which the security control room personnel shall communicate
audibly over a speaker system. The communication to the speakers shall be by means of an audio module
connected to or forming part of the DVR.
A traditional PA system with amplifier may be used, or a Network Horn Speaker, which communicates using
TCP/IP. Cost and ease of installation should be taken into account when choosing between the two types.
The PA system shall meet all specifications listed in section 3.7.4 – General Physical Requirements and
section 3.7.5 - General Electrical Requirements. Additional requirements are listed below.
a) If using a traditional PA, A power amplifier with a minimum of 25W RMS X 2 channels output power
shall be installed to power the speakers with amplifier size that matches.
b) The speakers shall be weatherproof, environmental, corrosion and vandalism resistant as well as
UV resistant.
c) The speakers shall be installed under the overhang of the building’s roof where possible.
d) The audio from the speakers shall be clearly audible throughout the whole yard and be able to handle
an alarm siren without distortion.
e) Additional speakers shall be added if necessary
f) Speaker setup shall take into account local residents in urban areas.
3.7.12 Time Synchronisation
a) In order accurately analyse recordings of incidents, and for providing reliable evidence, recorded
footage needs to be time stamped with an accurate date and time stamp.
b) The preferred method of time synchronization is using GPS. If a site has a GPS time signal, it should
be used for the security system.
c) At a single site, all cameras shall be time synced to within 1s of each other. This time syncing may
be provided by the DVR or other timing device.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.
Document Classification: Confidential
SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304
INTRUDER DETECTION
Revision: 2
Page:
d) Different sites shall be synchronised so that the difference between the times at different sites is less
than 10s. This synchronisation may happen via an NTP clock or the central video management
system (VMS).
e) The central NTP clock or VMS system shall get its time from a GPS signal.
3.8 Intruder Detection System
3.8.1 Indoor Detection
a) There shall be intruder detection in all buildings and rooms which the risk assessment indicates
should be protected. At substations this will include all rooms of the relay house and switch rooms.
b) The sensors shall be placed so as to detect intrusion through any door or window leading into the
building or by which access can be gained into the secured area.
c) Intruder detection may be in the form of movement detection (e.g. passive infrared sensors (PIRs),
video analytics); door and window detection (e.g. Reed switches), or some combination of sensors.
d) Intruder detection shall be located as to detect unauthorised entry through any door or window in the
building.
e) Battery rooms holding lead acid batteries are a zone 2 hazardous location with specific rules
governing work in the room. For this reason battery rooms shall not have CCTV or alarm equipment
installed inside, but rather a door contact installed on the outside of all doors and windows to detect
unauthorised entry.
3.8.2 Alarm System Operation
a) The alarm system shall meet the requirements of Eskom specification 240-86738968 - Standard for
Security Alarm Systems for Protection of Eskom Installations and its Subsidiaries [3]. In addition, the
alarm system shall support the following when integrated with the CCTV:
b) When an alarm is generated by the alarm system, the CCTV system shall detect the alarm and know
what zone was triggered in ordered to trigger the relevant cameras for that zone.
c) The alarm system shall receive trigger signals from CCTV video analytics in addition to triggers from
the site’s traditional security sensors.
d) For redundancy alarm signals shall be sent to the Local OT security server through the CCTV system
(to the VMS) and well as through the alarm system (to the alarm base station).
e) The intruder detection system shall be able to control relay contacts which can be connected to the
gate motor for opening and closing the gate.
f) Should the intruder detection system be triggered at night, the site’s LED floodlights shall be activated
for a period of 15 minutes. Night can be determined by a means of day/night sensor or a clock timer.
See section 3.8.3 below for more details.
g) When the alarm is deactivated, a signal shall be sent through to the security control room identifying
the employee who disarmed the site.
h) Alarm system activation / deactivation shall be confirmed by means of audio sound over the speaker
system as well as indicator LED(s) visible from inside the relay house and from the outside the gate
of the site.
i) Activation/deactivation of the intruder detection system shall activate/deactivate perimeter detection
and internal building protection whether the detection is on the cameras or alarm sensors.
j) Each activation / deactivation of the alarm system shall be date and time stamped and recorded by
the alarm system.
k) The system shall use remote controls to activate and deactivate the system as specified by 240-
86738968 or per the technology already being used in the region.
ESKOM COPYRIGHT PROTECTED
When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user
to ensure it is in line with the authorized version on the WEB.