Skip to main content
E2242CXMWPTelecommunications

RFP - Relocation of the National Security Co-ordination Centre (nscc) - Eskom

Issuing Organization

Unknown

Location

Northern Cape

Closing Date

02 Feb 2026

View Full Details & ApplyBack to All Tenders
Share:
At a Glance

Tender Type

Request for Proposal

Delivery Location

1 Maxwell Drive, - Sunninghill - Johannesburg - 2191

Published

15 Dec 2025

Tender Description
RFP - Relocation of the National Security Co-ordination Centre (nscc) at Megawatt Park.
Industry Classification
Procurement Type

Request for Proposal

Delivery Location

1 Maxwell Drive, - Sunninghill - Johannesburg - 2191

Requirements & Eligibility
Analysis: Appendix TSpec 2 - E2242CXMWP - 240-91190304.pdf

Submission Guidelines

Returnable Documents:

Evaluation Criteria

Yes No Note Engineering Tender Demonstration of In the case where a design and Equipment installation contract is already in place, the tender phases will be Contractors skipped. Fail Pass The Factory Acceptance Test may be skipped if the equipment has previously been proven at a similar Tender Criteria Eskom site. Tender Awarded Not Met Contractors Corrections Factory Factory Acceptance Test Acceptance Tests Report Fail Once Engineering Acceptance Fail Pass Fail Twice Factory Contract Defects Continued on Process following page Figure 1: Design and Installation Process (pg1) ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: Site Design and Installation Process - Continued Responsible Actions Performed Documents Produced People Continued from Installation previous page documents Contractors Site Installation Corrections As built design Fail Once Engineering Site Acceptance Site Acceptance Test Report Tests Fail Fail Twice Commissioning Pass Contract Defects Process Protective Services Site Becomes Operational Operations Figure 2: Design and Installation Process (pg2) 3.5.1 Site Specific Requirement Specification A careful examination of the requirements of each site is essential before deciding on the level of security to implement at a site. The first step of the design process is therefore a site visit by a member of Eskom Group Security to determine the security risks at the site. From this visit a Risk Assessment and Site Specific Functional Requirement document will be drawn up highlighting the risks and recommending the level of security needed at the site. The Eskom document 240-79537982[15] outlines the process for security threat and risk assessments. The relevant group Security Generic Physical Security Design (PSD) shall also be applied. Note that the site visit should include other security which may be needed to be installed or refurbished. For example should there be an additional fence, additional locking mechanism or burglar guards installed? At some sites it may be determined that these security measures are sufficient and CCTV is not necessary. If CCTV is required at a site, site specific CCTV functional requirements shall be drawn up. This document is compiled by Engineering based on a site visit and the Risk Assessment. The functional requirements shall take into account what needs to be secured at a site and the risks and challenges associated with the site’s unique layout. The site specific functional requirement document should include: ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 1) Where detection, observation, recognition and identification are needed from cameras? 2) Where detection will be needed 3) Whether monitoring of the CCTV will be onsite, offsite, or both. 4) The communications mediums available to the site from an offsite security control room. 5) The expected response time of armed response to the site. 6) Any potential blind spots due to the site layout and geography. 7) Suggested zones for the alarm and CCTV system 8) Eskom shall identify the floor space for the security cabinet or provide space in an existing panel. 3.5.2 Design and Tender Once the CCTV functional requirements documents have been finalised the detailed design can begin. Where a contractor has not already been appointed for security systems installations, this design will be submitted as part of the tender process. Where a contract for a number of CCTV sites has already been put in place, the design phase may mean adapting a generic design for the particular site being secured. Since not all aspects of the design are required at time of tender, the design documents required at time of tender and at time of final design are specified separately, below. Eskom may choose to do the design in-house, in which case some, or all of the design documents will be provided by Eskom. 3.5.2.1 Tender Design Requirements The design document shall include: a) The equipment (make and model) to be used b) Electronic copies of all equipment data sheets. This should include user and installation manuals if possible. c) An overall system diagram showing the interconnections between equipment. 1) Connections between equipment shall be labelled with communication protocol (RS485, TCP/IP, NO/NC contact) or voltage level. 2) For tender this does not need to include wiring colours/numbers and terminal names/numbers. d) The proposed design for both backup power solutions shall be included (see section 3.7.9) 1) 110V DC Power design. 2) 220V AC Power Option: i. Show expected backup time including calculations. ii. Include Make, Model and Capacity of batteries to be used e) A site layout (see Figure 3) showing: 1) The placement of all cameras and detection equipment 2) The purpose of each camera 3) The expected vertical and horizontal fields of view of all cameras. This may be calculated manually or by using camera CAD software. 4) The detection area of all detection equipment 5) The various alarm zones on the site, with zone name and number ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 6) The routes for cabling to outdoor equipment and motorized gate through existing cable trenches and dedicated trenches. Cable exit points shall be clearly marked. 7) Cable and wire numbering philosophy and methodology. 8) The position of the security cabinet 9) Position of yard/junction boxes. f) A list of equipment in the security cabinet. g) A list of equipment to be in yard boxes (if used). 3.5.2.2 Final Design Requirements The design document shall include: a) The equipment (make and model) to be used b) Electronic copies of all equipment data sheets. This should include user and installation manuals if possible. c) An overall system diagram showing the interconnections between equipment. 1) Connections between equipment should be labelled with communication protocol (RS485, TCP/IP, NO/NC contact) or voltage level. 2) Final Design: Wiring colours and numbers and terminal names/numbers to be indicated for all connections. d) Power supply details including: 1) The power supply point(s) to be used, including MCB numbers. 2) The backup power solution to be used at the site (see section 3.7.9) e) If the preferred 110V DC power option the following shall be included (arranged by Eskom representative): 1) Document from the relevant DC engineer confirming that the 110V DC supply can be used for the CCTV system. This document should include calculations that show that the site backup power requirements can still be achieved with the additional load of the CCTV system. f) If the 220V AC Power Option is to be used then the following will be supplied: 1) Expected backup time including calculations. 2) Make, Model and Capacity of batteries to be used g) A site layout (see Figure 3) showing: 1) The placement of all cameras and detection equipment 2) The purpose of each camera 3) The expected field of view of all cameras 4) The detection area of all detection equipment 5) The various alarm zones on the site, with zone name and number 6) The routes for indoor cabling, clearly marking the trunking or overhead racks to be used / installed. 7) The routes for cabling to outdoor equipment and motorized gate through existing cable trenches and dedicated trenches. Cable exit points shall be clearly marked. 8) Cable and wire numbering philosophy and methodology. 9) The position of the security cabinet ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 10) Position of yard/junction boxes. h) The layout of equipment in the security cabinet. i) The layout of equipment in yard boxed (if used). j) The design document shall be accepted by an Eskom Security Systems Engineer before any installation begins. k) The site specific Health and Safety plan shall be accepted by an Eskom Health and Safety practitioner before any installation begins. Control Room Identification HFOV>90° Emergency Observation Exit Detection Main Switch Room Entrance Emergency Exit Main Identification Fence Entry Motor Gate Number plate Observation recognition & human HFOV>90° recognition Gate Pedestrian Figure 3: Example of Camera Placement, FOV and Purpose 3.5.3 Tender Technical Evaluation The tender technical evaluation shall work in conjunction with the Eskom commercial process and shall consist of two steps: 3.5.3.1 Paper Evaluation The submission shall be evaluated against the CCTV functional requirements Document based on the tender proposal documents and the specification sheets of the proposed equipment. 3.5.3.2 Practical Evaluation Functional testing of the chosen equipment is crucial to ensure that equipment is able to meet the CCTV functional requirements. Comparing datasheets is not sufficient; the proposed equipment needs to be tested in a simulated environment to ensure it can meet all requirements. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: If the design submitted meets the CCTV functional requirements ‘on paper’ then a demonstration of the equipment shall be arranged as the next stage of functional evaluation. 3.5.3.2.1 Presentation Companies meeting the Paper Evaluation requirements will be required to do a presentation of their proposed design. The presentation should: a) Give an overview of the proposed design b) Highlight advantages of the proposed solution as far as it will enable Eskom to secure it’s sites from intruders c) Demonstrate an in depth technical knowledge of and familiarity with the equipment to be used. d) Demonstrate how equipment will work together to provide the security level required. e) The suppliers ability to support the equipment when technical issues are encountered f) Examples of similar installations which the tenderer has done g) Eskom evaluators may ask questions regarding the proposed solution. 3.5.3.2.2 Demonstration of Equipment A demonstration of the equipment shall be arranged. The procedure for the Tender Demonstration Tests can be found in section 0. Once a contract has been placed, any design changes shall be subject to additional demonstration tests before Eskom approves the change. An equipment demonstration may also be required if there is an existing CCTV contract, but the site design proposes a piece of equipment that has not previously been used on an Eskom site. 3.5.3.2.3 Site Visit Each tenderer shall arrange for an Eskom representative(s) to view a site where they have done a similar installation. The site visit will be evaluated based on: a) Quality of installation. Cables routed neatly, cabinets organised, cabling labelled. b) Ability of cameras to operate as expected c) Effectiveness of intruder detection used. d) It is acknowledged that maintenance of the system is the system owner’s responsibility and the condition of equipment and cabling at time of visit may not be a true reflection of the quality at the time of handover. 3.5.4 Factory Acceptance Test Once the tender has been awarded and the purchase order for the term contract / site installation has been placed, Factory Acceptance Tests shall be performed. In the case where there is an existing term contract, and the equipment and system setup has been proven at previous Eskom installations, the factory acceptance test need only be done when the contract is established. This shall be at the discretion of the responsible Eskom engineer. The site where the equipment has been previously proven shall be documented. The procedure for the Factory Acceptance Tests can be found in section 0 If the Factory Acceptance Tests are not met after corrections have been made, the relevant contract defects process shall be followed. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.5.5 Installation of System The CCTV design shall be signed off as accepted by Eskom’s appointed Project Engineer before installation of the system can begin. No work may begin on site without design approval from Eskom and a site kick off meeting. The system shall be installed according to the appropriate manufacturer and Eskom specifications. Detailed installation specifications can be found in section 3.6 of this document. Any changes to the design made during the course of installation shall be approved by the Project Engineer via a project change request (PCR) or a formal site instruction and reflected in the as-built design documents. 3.5.6 Commissioning of System Commissioning of the System includes adjusting all necessary settings to ensure that the installation meets the CCTV functional requirements. This requires explicit testing of the system including the simulation of incidents in all lighting conditions (sunrise, full sun, sunset, night). Commissioning tests include testing the interface between the CCTV system and the security control room (off site and on site). The site will not be accepted until Site Acceptance Tests prove that the installation meets all requirements as set out in the site specific functional requirements. The procedure for the Site Acceptance Tests can be found in section 0. If the Site Acceptance Tests are not met after corrections have been made, the relevant contract defects process shall be followed. 3.5.7 Documentation On completion of the installation the contractor shall provide Eskom with the following documentation: a) Detailed as-built drawings of the installation including the following: 1) A site layout diagram indicating the position of all equipment and devices installed. A complete cable block and wiring diagram with cable & wire numbers 2) A site layout diagram indicating the position of all equipment and devices installed 3) Coverage plots of the areas covered by intruder detectors and a list and description of each zone. 4) Coverage plots of the areas covered by cameras’ fields of view 5) Alarm system zones b) Manuals and training for the CCTV surveillance system. The manuals shall include the following: 1) An overview of the CCTV and intruder detection system, including the equipment block schematic 2) The functions and features of each item of equipment. 3) Individual operating instructions for each item of equipment. 4) Detailed operating instructions for all modes of operation of the CCTV system. c) Manufacturer’s technical and maintenance specifications for each item of equipment installed. d) All documents shall be provided in soft and hard copy. Drawings softcopies shall be provided in as CAD files in .dwg format. Other soft copy documents shall be provided as pdfs. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: e) All system and camera settings shall be recorded, so that they can be confirmed and reproduced as required. 1) Where possible these settings and configurations shall consist of backup files which can be loaded onto the relevant equipment in the case of malfunction or replacement. 2) Where the equipment does not allow for softcopy backups, an electronic document listing the settings may be provided. 3.6 Installation a) To ensure quality workmanship and sound installation practice, it is imperative that the contractor adheres to the specifications and standards supplied by Eskom. Should there be any uncertainty with regards to the specifications; the contractor is to contact the Eskom employee responsible for the project for guidance. b) Only contractors with experience in CCTV and alarm system installations shall do installations. To this end the tenderer shall provide a CV of relevant experience and references. c) All installers shall adhere to the OHS Act (Occupational Health and Safety Act) of 1970 when installing the system. Contractors and sub-contractors shall meet the requirements specified by Eskom Health and Safety specifications d) All equipment shall have a mechanical earth connected to the site earth according to Eskom standards. e) All equipment shall be designed and specified for a minimum realisable operational life 10 years under the prevailing environmental conditions unless otherwise agreed to by Eskom during the tender evaluation stage. f) Consideration must be given for the minimum working and electrical clearances of overhead equipment – see Eskom Specification 34-304 - Substations, Section 2: Generic Substation Design [2] - section 4.5.1.2 g) All equipment shall be labelled in accordance with the design diagrams, with durable, weather resistant labels. h) Cable and wiring marking shall be in accordance with Eskom standard 240-64636794, Standard for Wiring and Cable Marking in Substations. i) All cables and wires shall be marked with a unique identification, at all terminations, in accordance with the cabling and wiring diagrams supplied. j) All of the splices and connections shall be mechanically secure and shall provide electrical contact without stress on connections and terminals. Splicing is strongly discouraged but if unavoidable, splices used shall have insulation equivalent to that of the wires being joined. k) Any hole which insulated conductors pass through shall be provided with a smooth, rounded bushing, or shall have smooth, rounded surfaces upon which the insulated conductors may bear. l) Wireways shall be smooth and free from sharp edges, burrs, fins, or moving parts that may damage wiring. m) All internal wiring connections shall be made with a solder lug or pressure terminal connector n) A terminal lug shall be arranged such that in any position it cannot contact the metal enclosure, non- energized accessible metal parts or other electrical circuits. Alternatively the shank of the lug shall be provided with insulation equivalent to that of the conductor. o) Terminal blocks shall be in accordance with Eskom standard 240-70413291, Specification for Electrical Terminal Blocks. p) The CCTV installation shall be signed off as accepted by Eskom’s appointed Project Engineer for the security system installation. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.7 System Level 3.7.1 System Overview The CCTV system consists of various subsystems. A functional block diagram of the CCTV system illustrating the main subsystems and the interaction between the subsystems is provided in 4 below. The CCTV system has components both on and off site. What follows is a brief explanation of the system as a whole, detailed descriptions of each subsystem can be found later in the document. 3.7.1.1 On site At each site being protected, various subsystems connect to create an integrated security system. These subsystems will differ from site to site but may include: a) Physical deterrents such as fences b) Outdoor perimeter detection provided by a number of technologies c) Indoor intruder detection provided by a number of technologies d) Surveillance cameras (indoor and outdoor) e) Lighting systems f) Access control equipment g) Other devices such as sirens, public address systems or alarm system status LEDs These subsystems will communicate with various controllers (DVR, Alarm panel, PA controller etc.) using a combination of hardwired contacts and communication busses (RS232, Ethernet, proprietary protocols etc.). These controllers will communicate with each as necessary to create a system which can meet the functional requirements set forth in this document. At manned sites there may also be a security monitoring station on site from which CCTV and alarms can be viewed. The security equipment cabinet shall also serve as the point of power distribution for the security equipment which may need a variety of combination of AC and DC power at various voltage levels. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: CCTV Site Physical Palisade Field Equipment Other Deterent Fence Perimeter Thermal Video Other Detection Cameras Analytics Surveilance Outdoor Indoor Room Entrance Entrance Gates PT or PTZ Other Cameras Observation Observation Identification Recognition Other Lighting IlluminationIR SecurityLighting IndoorLights Access Gate Maglocks Other Control Motor Other Speakers – LED Sirens Other Devices PA System Status Other Motion Door Other Sensors Sensors Contacts On site Power Distribution communications Access Security Analytic Power Control NVR/DVR PA System Encoders Equipment Cabinet Equipment Panel Monitoring Alarm Panel Station Site Security Network Alarm Push & Remote Access Fiber Backbone, Satellite, Cellular APN, or Microwave* *Link provided by Eskom Telecoms or a 3rd Party Engineering LAN Backup Maintenance Administrator Eskom Regional (Optional) Modems Server Room VMS Alarm Base Operations Investigators Server(s) Station Corporate LAN Dedicated Comms Selectedor Link eventssignals Corporate Regional Security Control Centre LAN Eskom National (Eskom or 3rd Party) Security Control Centre Alarm Base Monitoring Monitoring Station Workstation Workstation Figure 4: Functional Block Diagram of CCTV System ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.7.1.2 Eskom Local OT Security Server All sites with CCTV systems will communicate with a Local OU Security Server. This server shall be owned and hosted by Eskom. VMS server software will be housed here as well as other server related equipment such as alarm base stations. Housing the system at an Eskom site ensures that Eskom has control over the server equipment and prevents Eskom from being locked into using a specific service provider for remote security monitoring. All sites in the OU will connect to this Local OU Security Server via a combination of available communication channels. WAN communications may be provided by Eskom or a third party. The Local OU Security Server shall be suitably protected by physical and network access control (secure room, user rights, firewalls etc.). Standalone sites such as Power Stations may be designed with an onsite Local OU Security Server. If necessary due to budget/resource availability, the server can be hosted at a third party (see 3.11.2.1 for details). 3.7.1.3 Local Security Control Centre The Local Security Control Centre shall be responsible for responding to alarms from sites and managing incidents on site using the CCTV data from site. Ideally the Local Security Control Centre should be an Eskom manned centre, but budget and resource restraints may necessitate that the control centre be provided by a third party. Network security between any 3rd parties and the Eskom Network shall be designed and controlled by Eskom. Details of the activities of the Local Security Control Centre can be found in section 3.12 - Security Control Room. The Security Control Centre shall use approved VMS client software to connect to the Eskom OT Security Server, thereby receiving all alarm signals from the various sites (black screen monitoring). The Local Control Centre shall also be able to receive video on demand from the sites via the OT Security Server. The connection between the Local OT Security Server and the Local Security Control Centre shall be a dedicated link (e.g. a Diginet line / microwave link). There may also be a backup links directly between the Local Security Control Centre and sites if this is deemed necessary. 3.7.1.4 National Security Control Centre Eskom intends to establish an Eskom National Security Control Centre from which selected security incidents can be managed and monitored. A communication link would be established from the local OU security servers to the National Control Centre server via the Eskom corporate LAN. Selected signals or events would then be directed to the National Security Control Centre. It shall be possible to escalate events from the Local Security Control Centre to the National Security Control Centre. 3.7.1.5 Engineering and Operational Access Eskom engineers shall be able to connect to the Local OT Security Server remotely from the Eskom Engineering (OT) LAN to perform maintenance and administrative tasks on the system. Members of Eskom Group Security shall be able to connect to the OT security server remotely from the Eskom corporate network in order to perform operational tasks (check up-time of systems, confirm sites are being armed etc.) and investigations (view footage and alarm logs etc.). This remote access shall be restricted to those who have explicitly been granted access rights. 3.7.2 Operation - Unauthorised Access The figure below depicts the sequence of events that the security alarm system and personnel shall follow during unauthorised access to the protected site[3].The CCTV system needs to enable this sequence of events can take place. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: Figure 5: Unauthorised Access Flow of Information [20] a) The alarm system shall be triggered by either of the following which could indicate an unauthorised access: 1) Attempt to disarm system by unauthorised user. 2) Panic button been pressed. 3) Control centre issuing an alarm instruction due to unauthorised access 4) Cameras and alarm sensors detecting violation. b) Each violation shall be reported to the control centre and notified to the security controller. c) The security controller shall be able to address the unauthorised person using the Public Address System. d) The operator shall be able to use information available, as well as the site history to decide on a response. e) The security controller shall be able to confirm the arrival of the responders on site following an alarm event. 3.7.3 Warrantee and Certification a) All equipment installed shall be subject to the OEM warrantee. b) Contractor shall provide proof that technicians have been trained and certified to install and configure the CCTV equipment specified. c) There shall be an agreement from the OEM that the OEM supports the tender offering and will continue to support the product if the tenderer defaults. 3.7.4 General Physical Requirements All installed equipment shall meet the following mechanical requirements: ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.7.4.1 Environmental conditions All equipment shall be designed for application in ‘special’ environmental conditions as follows (adapted from Table 2 of IEC 60255-1[4] ): a) Ambient air temperature: -25 °C to +55 °C (installed indoors); or -25 °C to +70 °C (installed outdoors, within enclosures). b) Altitude: < 2 500 m c) Pollution: Location in urban areas with industrial activities and without special precautions to minimize the presence of sand or dust (conditions as per classes 3C2 and 3S2 in IEC 60721-3- 3[12]). d) Relative humidity (24h average): 98% e) All outside equipment Including fasteners and supports should be corrosion resistant and appropriate for the environment on site f) After fabrication, metal surfaces including doors and removable covers shall be prepared and finished with corrosion protection. g) Paint work damaged during transport and delivery shall be made good as per manufacturer repair specification at no cost to Eskom. If site re-painting is necessary, the equipment and labels shall be carefully masked and any overpaint which occurs in spite of the masking must be removed. If the damage is not repairable, Eskom reserves the right to return the equipment. h) All nuts, bolts and washers use for the construction to be stainless steel. Screws can be cadmium plated. i) Further environmental protection may be needed e.g. Equipment installed at a coal power station or in a mining area will need added dust protection. j) Convection cooled (fan-less) equipment are strongly preferred. If fans are used, they shall be speed controlled and the electronics shall be isolated and conformal coated to protect against dust ingress. 3.7.5 General Electrical Requirements All installed equipment shall meet the following electrical requirements: a) The expected life of equipment under conditions specified (section 3.7.4.1 above) shall be a minimum of 5 years. b) All power cable shall be appropriately sized to ensure voltage drops along cable runs remain within the operating specifications of the equipment being powered. c) All equipment shall be effectively protected against overvoltage due to lighting strikes or switching surges by strategically placed surge arrestors d) Descriptive cable markings shall be used as agreed to with Eskom. These shall be reflected on the drawings. See section 3.6 for more details. e) Cable selection and routing shall always be done in such a way that operation of equipment is not affected by electrical interference. This may be achieved by separating power and communications cables, shielding of cables, or a combination of the two. f) Equipment shall not be affected by electrostatic discharges that are applied directly to the equipment or to metal objects in the proximity of the equipment: All electronic equipment shall be a class 2 device as specified in IEEE 1613-2009, 8 Electrostatic discharge tests[24] ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.7.6 Cable routes in control plant / equipment rooms: a) Auxiliary power cables shall be laid in the control room power rack, away from communication cables.No conduit is needed on the rack. b) Communications cables should use the control plant room communications rack. No conduit is needed on the rack. c) Where cable racks are not available, cables may be routed along the wall or in PVC sleeves in the cable trench, at Eskom’s discretion. d) Where security cables are routed along the walls, they shall be in metal or plastic conduit. e) Auxiliary power and communication cables shall be in separate conduit. f) In substations, security cables shall not be routed in the ceiling. g) If fibre optic leads are used they should be protected using sprague tubing when entering and exiting cable trays or panels. h) Regional or site specific requirements may supersede the above cable route requirements. 3.7.7 Outdoor Cables and Trenching in Substations a) Security cable should share control cable or lighting trenches where possible, where this is not possible, security cable trenches shall be dug. b) The security cables shall enter the control plant room through the same path as control cables. c) Security cable trenches shall be 0,5 m deep d) All cables shall be armoured or laid in appropriately sized plastic conduit (e.g. HDPE, Kabelflex, whether in cable trenches or dedicated security trenches. The appropriate bends and connectors must be used for the conduit, according to manufacturer’s instructions. e) Security systems communication cables and auxiliary power cables shall not be laid in the same conduit unless using fibre communication or DC power. f) Drilled holes in junction boxes shall be kept to a minimum and shall be appropriately sealed to prevent water ingress. g) Care shall be taken when working with fibre optic cable so as to ensure the fibre is not damaged during installation or maintenance. h) The stone layer shall be removed far enough from the cable trench excavation as illustrated in 6. The trench soil shall not be placed on top of any yard stone. i) After the cables have been laid, the trenches must be backfilled with the original soil in layers not exceeding 300mm and properly compacted. Once the backfill is completed, the stone shall be replaced appropriately. Figure 6: Cable Trench Layout ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.7.8 Security Cabinet The security cabinet/panel shall contain all the control equipment of the intruder detection and the surveillance system (digital video recorder (DVR), communication equipment, public address (PA) etc.). The cabinet shall be housed within a suitable access controlled equipment room; at substations this shall be the substation control plant room. a) Cabinet shall be a freestanding swing frame panel or a freestanding server cabinet. b) Cabinet shall be designed so as to limit dust ingress which could affect effective operation of equipment. c) All points of cable entry shall be through glands so as to secure the cables. d) Access to the inside of the cabinet shall be restricted and controlled by means a physical lock to which only authorized security personnel and Eskom employees from the Risk Department shall have access. Cabinet shall be alarmed for tempering and remain armed when main alarm system is disarmed. This is subject to regional requirements. e) Cabinet design shall take into consideration airflow and heat distribution. Equipment shall be laid out such that units that generate the most heat are at the top. f) There shall be a dedicated Aux power supply distribution module with a suitably sized incomer isolator and suitably sized load MCBs per piece of equipment. g) The incomer supply DB MCB for this module must be correctly sized to protect the incomer cable in order to prevent nuisance trips. h) Cables shall be neatly routed in trunking. i) Cable ties or similar shall be used for cable management. j) Where possible equipment in the security cabinet shall be 19 inch rack mountable or DIN rail mounted equipment. Where 19” or DIN rail mounting is not available, equipment shall be neatly secured on shelves. k) Equipment or connection accessed regularly shall be accessible from the front of the panel or shall be wired to a terminal rack accessible from the front. l) Equipment shall be suitably earthed to the cabinet, and the cabinet shall be earthed to the substation earth. m) Eskom shall approve the layout design before the cabinet is populated. Figure 7: Example of Poorly Organised Figure 8: Example of Well Organised Security Equipment Cabinet Security Equipment Cabinet ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.7.9 Backup Power Supply Two power supply solutions shall be provided for the system. Option A will operate off 110V DC and will be connected to the relay house 110V DC supply which has battery backup. Option B is to use the 220V AC supply from the site and it shall include a battery backed up UPS for all security system devices. The responsible Eskom DC design engineer shall be consulted on a per site basis to determine which power supply system will be used and to allocate connection MCB’s on the main Distribution Board. Option A be installed whenever possible since this arrangement leverages off the battery maintenance processes already in place. Option B will be used when there is no site battery capacity or the capacity is not sufficient to supply the added load of the camera and alarm system. For both options the standing time for backup power is 12 hours at sites within 200kms of a responsible Eskom DC section, 18 hours at sites more than 200kms from a responsible Eskom DC section. Both power supply design options shall be available. 3.7.9.1 Option A: 110V DC a) The security system shall be powered by 110V supplied from the site’s DC supply. In the event of a power failure the system will be supplied by the substation’s battery and / or generator backup. b) The security system shall be supplied by an appropriately sized supply cable and MCB from the site’s DC panel. c) The MCB used on the AC/DC panel shall be clearly labelled ‘Security’. d) Power will be distributed through the panel so as to isolate the supply of the subsystems by means of appropriately sized MCBs. At a minimum the following will be on separate supply circuits: 1) Intruder detection system 2) Perimeter Cameras 3) DVR, Indoor cameras and PTZ 4) Perimeter detection system (if separate from perimeter cameras) 5) Other security related equipment such as motorized gates or electric fences. e) Figure 9 below, shows an overview of the power distribution for option A. This should be adapted according to the equipment being used. f) All equipment shall meet the specifications of sections 3.7.3 - Warrantee and Certification, 3.7.4 - General Physical Requirements, and 3.7.5 - General Electrical Requirements. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: MCB DVR MCB Alarm Panel 110V DC - mV DC 220V AC MCB Site Batteries 110V DC MCB mV DC Converter Other mV DC MCB Equipment 110V DC - nV DC nV DC MCB nV DC MCB Equipment Converter Figure 9: Preferred Power Distribution, Using Backup Power from the Site 3.7.9.2 Option B: 220V AC a) The security system shall be powered by 220V AC supplied from the site’s AC supply with an appropriately sized Uninterruptable Power Supply. b) The security system will be supplied by an appropriately sized supply cable and MCB from the site’s AC panel. c) MCB on the AC/DC panel shall be clearly labelled ‘Security’ to indicate the use. d) Power will be distributed through the panel so as to isolate the supply of the subsystems by means of appropriately sized MCBs. At a minimum the following will be on separate supply circuits: 1) Intruder detection system 2) Perimeter Cameras 3) DVR, Indoor cameras and PTZ 4) Perimeter detection system (if separate from perimeter cameras) 5) Other security related equipment such as motorized gates or electric fences. e) An uninterruptible power supply (UPS) shall be installed to supply the entire CCTV and intruder detection system for a minimum of 12 hours at sites within 200kms of the responsible Eskom DC section, and for a minimum of 18 hours at sites more than 200kms from the responsible Eskom DC section. f) CCTV system batteries in addition to UPS batteries are not recommended. If CCTV system batteries are unavoidable then individual subsystems that have their own battery backup, these shall not be fed by the UPS. This is to prevent the UPS from charging these batteries in the event of a power failure (See figures 10 and 11 ). Any CCTV system batteries used shall provide backup for the time specified in section e) above. g) The system shall have a power failure intruder detection indication that shall be sent through to the security control room should the AC supply be interrupted. h) The system may have an additional power failure alarm indication that shall be sent through to Eskom network control via SCADA should the AC supply be interrupted. i) Figure 11 below, gives an overview of the power distribution for option B. This should be adapted according to the equipment being used. DC voltages shown are examples; other DC or AC voltages may be used as necessary. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: j) All equipment shall meet the specifications of sections 3.7.3 - Warrantee and Certification, 3.7.4 - General Physical Requirements, and 3.7.5 - General Electrical Requirements. Incorrectly Distributed MCB DVR Power û Other 220V MCB AC 220V AC 220V AC Equipment MCB UPS MCB Alarm Panel nV DC Power nV DC û nV Battery Supply UPS is supplying alarm backup battery Other nV DC MCB Equipment Figure 10: Incorrectly Distributed Option 2 Power, Battery Downstream from UPS Correctly Distributed MCB DVR ü Power Other 220V MCB AC 220V AC 220V AC Equipment MCB UPS MCB Alarm Panel nV DC Power nV DC MCB nV Battery Supply ü Other nV DC MCB Equipment Battery backup supplied by mains Figure 11: Correctly Distributed Option 2 Power, Battery Parallel to UPS 3.7.10 Communication a) A connection from the site to the Eskom local OT security server shall provide the means of communication to the control centre for, alarms and live viewing. b) The connection shall also be used for remotely configuring equipment and downloading of recorded footage c) The communication link between the site and the security control room shall be by means of a dedicated and secure communication medium between the sites and the security control room. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: d) Communication shall take place over Eskom’s telecommunications network if at all possible. 1) When specifying a new site Eskom Telecoms will be consulted to determine the feasibility of using (or establishing) an Eskom Telecoms link to the site. 2) Eskom Telecoms will be consulted before going out on tender and communications available shall be stated at tender phase. 3) The priority and risk at the site shall be taken into account when deciding whether or not to increase bandwidth available for security e) Though the Eskom telecommunication network is preferred, 3rd party communications infrastructure may be used if necessary. f) The communication medium will be fibre (2Mbps bandwidth) where possible and satellite or microwave where fibre is not installed. g) As a last resort, if a higher bandwidth connection is not possible, GPRS may be used for communications provided equipment is specified and configured to be operated over the lower bandwidth. h) The communication link shall be established according to the latest Eskom specification DISSCZAA2: CCTV Satellite Telecommunication Specification for Distribution Substations. i) The connection from the security equipment to the Eskom Telecoms network shall be Ethernet and use RJ45 connectors. j) Eskom to provide all IP addresses to be used for on-site LAN. 3.7.11 PA System The PA system shall provide the means by which the security control room personnel shall communicate audibly over a speaker system. The communication to the speakers shall be by means of an audio module connected to or forming part of the DVR. A traditional PA system with amplifier may be used, or a Network Horn Speaker, which communicates using TCP/IP. Cost and ease of installation should be taken into account when choosing between the two types. The PA system shall meet all specifications listed in section 3.7.4 – General Physical Requirements and section 3.7.5 - General Electrical Requirements. Additional requirements are listed below. a) If using a traditional PA, A power amplifier with a minimum of 25W RMS X 2 channels output power shall be installed to power the speakers with amplifier size that matches. b) The speakers shall be weatherproof, environmental, corrosion and vandalism resistant as well as UV resistant. c) The speakers shall be installed under the overhang of the building’s roof where possible. d) The audio from the speakers shall be clearly audible throughout the whole yard and be able to handle an alarm siren without distortion. e) Additional speakers shall be added if necessary f) Speaker setup shall take into account local residents in urban areas. 3.7.12 Time Synchronisation a) In order accurately analyse recordings of incidents, and for providing reliable evidence, recorded footage needs to be time stamped with an accurate date and time stamp. b) The preferred method of time synchronization is using GPS. If a site has a GPS time signal, it should be used for the security system. c) At a single site, all cameras shall be time synced to within 1s of each other. This time syncing may be provided by the DVR or other timing device. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: d) Different sites shall be synchronised so that the difference between the times at different sites is less than 10s. This synchronisation may happen via an NTP clock or the central video management system (VMS). e) The central NTP clock or VMS system shall get its time from a GPS signal. 3.8 Intruder Detection System 3.8.1 Indoor Detection a) There shall be intruder detection in all buildings and rooms which the risk assessment indicates should be protected. At substations this will include all rooms of the relay house and switch rooms. b) The sensors shall be placed so as to detect intrusion through any door or window leading into the building or by which access can be gained into the secured area. c) Intruder detection may be in the form of movement detection (e.g. passive infrared sensors (PIRs), video analytics); door and window detection (e.g. Reed switches), or some combination of sensors. d) Intruder detection shall be located as to detect unauthorised entry through any door or window in the building. e) Battery rooms holding lead acid batteries are a zone 2 hazardous location with specific rules governing work in the room. For this reason battery rooms shall not have CCTV or alarm equipment installed inside, but rather a door contact installed on the outside of all doors and windows to detect unauthorised entry. 3.8.2 Alarm System Operation a) The alarm system shall meet the requirements of Eskom specification 240-86738968 - Standard for Security Alarm Systems for Protection of Eskom Installations and its Subsidiaries [3]. In addition, the alarm system shall support the following when integrated with the CCTV: b) When an alarm is generated by the alarm system, the CCTV system shall detect the alarm and know what zone was triggered in ordered to trigger the relevant cameras for that zone. c) The alarm system shall receive trigger signals from CCTV video analytics in addition to triggers from the site’s traditional security sensors. d) For redundancy alarm signals shall be sent to the Local OT security server through the CCTV system (to the VMS) and well as through the alarm system (to the alarm base station). e) The intruder detection system shall be able to control relay contacts which can be connected to the gate motor for opening and closing the gate. f) Should the intruder detection system be triggered at night, the site’s LED floodlights shall be activated for a period of 15 minutes. Night can be determined by a means of day/night sensor or a clock timer. See section 3.8.3 below for more details. g) When the alarm is deactivated, a signal shall be sent through to the security control room identifying the employee who disarmed the site. h) Alarm system activation / deactivation shall be confirmed by means of audio sound over the speaker system as well as indicator LED(s) visible from inside the relay house and from the outside the gate of the site. i) Activation/deactivation of the intruder detection system shall activate/deactivate perimeter detection and internal building protection whether the detection is on the cameras or alarm sensors. j) Each activation / deactivation of the alarm system shall be date and time stamped and recorded by the alarm system. k) The system shall use remote controls to activate and deactivate the system as specified by 240- 86738968 or per the technology already being used in the region. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB.

Technical Specifications

This specification sets out the physical, technical, functional requirements for integrated CCTV surveillance used at Eskom facilities. This document is intended for Operating Units, Engineering, Protective Services and Risk Management. The document includes testing and maintenance procedures. 2. Supporting clauses 2.1 Scope This specification focusses on the application of CCTV at substations. The principles outlined here can also be implemented at Eskom offices, telecommunication sites and power stations. It should shall be applied when designing and evaluating CCTV security systems for substations, for Eskom facilities. This document does not apply to cameras used for non-security purposes such as fire detection and operating. However many of the principles of design, testing and commissioning apply to CCTV in general and could be used to inform the design or specification of non-security CCTV systems. 2.1.1 Purpose This specification sets out Eskom’s physical, technical and functional requirements for CCTV surveillance used in Eskom. 2.1.2 Applicability This document shall apply throughout Eskom Holdings Limited Divisions. This document is intended for Operating Units, Project Engineering, Protective Services and Risk Management. 2.2 Normative / Informative references Parties using this document shall apply the most recent edition of the documents listed in the following paragraphs. 2.2.1 Normative [1] ISO 9001, Quality Management Systems. [2] 34-304, Generic Substation Design [3] 240-86738968 - Standard for Security Alarm Systems for Protection of Eskom Installations and its Subsidiaries [4] IEC 60255-1, Measuring relays and protection equipment – Part 1: Common requirements [5] IEC 60721-3-3, Classification of groups of environmental parameters and their severities – Stationary use at weather protected locations [6] SANS 10222-5-2, Electrical security installations Part 5-2: CCTV installations – Application guidelines. [7] 240-55410927, Cyber security standard for Operational Technology [8] 240-55683502 Definition of operational technology (OT) and OT / IT collaboration accountabilities [9] 34-1430, Procedure for first line maintenance of Security systems at substations [10] 240-44175038,Control of Non-Conforming Product or Service Procedure [11] 34-1617 Specification for Infrared Detectors Used at Distribution Substations [12] IEC 60721-3-3 Classification of groups of environmental parameters and their severities – Stationary use at weather protected locations ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: [13] DISPVADR2 REV0: 2007, Procedure for first line maintenance of security systems at substations. [14] 240-44175038, Control of Non-Conforming Product or Service Procedure [15] 240-79537982, Security Threat and Risk Assessments [16] SANS 10222-5-1-1, Part 5-1-1: CCTV installations — CCTV surveillance systems for use in security applications — Operational requirements [17] 240-64636794, Standard for Wiring and Cable Marking in Substations [18] 240-70413291, Specification for Electrical Terminal Blocks [19] D-DT-0011, Pole, Spun Conc Str/Light Assem 5.7m [20] D-DT0012, Pole, Spun Conc Str/Light Assem 7.2m [21] D-DT-0332, LV and MV Foundation Pole Arrangement [22] 240-79669677: Demilitarised Zone (DMZ) Designs For Operational Technology [23] 240-55863502: Definition of OT and OT/IT Collaboration Accountabilities [24] IEEE 1613-2009: IEEE Standard Environmental and Testing Requirements for Communications Networking Devices Installed in Electric Power Substations 2.2.2 Informative [25] CCTV Operational Requirements Manual, UK Home Office, N Cohen, J Gattuso & K MacLennan- Brown [26] Usability 101: Introduction to Usability, http://www.nngroup.com/articles/usability-101-introduction-to- usability/ (accessed 2015/02/21), J Nielsen [27] Panasonic iPro 6 Series: Full Review, http://www.securityelectronicsandnetworks.com/articles/2014 /04/30/panasonic-ipro-6-series-full-review, (accessed 2015/02/25) [28] DISPAVACE8, The Management of Electronic And Physical Protection Measures 2.3 Definitions 2.3.1 General Definition Description An electrical device that converts between a balanced signal and an unbalanced Balun signal. Used in the CCTV industry to transmit analogue signals over UTP cable instead of coaxial cable. The unit that contains an imaging device that produces a video signal from an CCTV camera optical image. CCTV control unit The equipment used to control and monitor the operational functions of a CCTV system. CCTV equipment The unit that contains a CCTV camera, lens and ancillary equipment. A system that consists of camera equipment as well as any monitoring and CCTV surveillance associated equipment for transmission and controlling purposes that is system necessary for surveillance of a defined security zone. A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores Charged coupling and displays the data for an image in such a way that each pixel (picture device element) in the image is converted into an electrical charge, the intensity of which is related to a colour in the colour spectrum ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: Definition Description CS Mount The configuration used to mount lenses. Customer Network Eskom field office typically consisting of offices, warehousing, workshops and Centre (CNC) outdoor storage areas. Device with the primary function of recording video footage from CCTV cameras. Digital Video Recorder May also include a number of other features. (DVR) For simplicity this document uses the term ‘DVR’ to refer to a DVR or NVR since both devices perform the same function. Microbolometer An uncooled thermal sensor used as a detector in thermal cameras. A Digital Video Recorder which is connected to a network rather than directly to Network Video cameras. Recorder (NVR) For simplicity this document uses the term ‘DVR’ to refer to a DVR or NVR since both devices perform the same function. Alarm generated when a detection system triggers for something other than an intruder (e.g. a bird sets off an alarm). Note: The term ‘nuisance alarm’ is used rather than the more common ‘false Nuisance Alarm alarm’. This is because ‘false’ implies that the sensor is broken whereas ‘nuisance’ indicates that the sensor did detect something (e.g. a bird), but not the thing that it is installed to detect (human intruder). OT is the technology that is used to operate, monitor and control the power Operational system.. (As opposed to Information Technology (IT) which is the infrastructure Technology (OT) used for corporate services). For further clarification see Eskom Standard 240-55683502[8] An electronic method of automatically analysing video images to detect specific Video Analytics types of events (more advanced than Video Motion Detection). Video Management Software used to connect to multiple DVRs or NVRs and view the footage from System the attached cameras. Video motion An electronic method of detecting a change in the field of view of a camera. detection 2.3.2 Disclosure classification Confidential: the classification given to information that may be used by malicious/opposing/hostile elements to harm the objectives and functions of Eskom Holdings Limited. 2.4 Abbreviations Abbreviation Description AGC Automatic gain control AI Automatic Iris BLC Back light compensation CCD Charged coupling device CCTV Closed circuit television CNC Customer Network Centre DVR Digital video recorder ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: Abbreviation Description EI Electronic Iris FPS Frames per second NTP Network Time Protocol OT Operational Technology PA Public address PCR Project Change Request PTZ Pan, tilt and zoom UPS Uninterruptible power supply UTP Unshielded Twisted Pair VDU Video display unit VMD Video motion detection VMS Video Management System VPN Virtual private network WDR Wide dynamic range 2.5 Roles and responsibilities Security systems design engineers shall utilise this document as the basis for the enquiry process and during the product development phase. Protective Services shall use this document to guide maintenance of installed CCVTV systems. 2.6 Process for monitoring The security technology and support department will monitor compliance to this standard. 2.7 Related/supporting documents This document supersedes DSP34-1613, DISSCABM6 and SCSSCABM6

Compliance Requirements

3.1 Objective The objective of CCTV is to promote safety and to render an additional, cost effective, visual intelligence medium to assist personnel in making decisions with regards to security. The visual environment created by CCTV will assist in deterring potential intruders, as well as guide security personnel, thus reducing the risk of danger to human life and assets. CCTV surveillance forms part of the total security system which incorporates fences, intruder detection systems, site access control, and human response teams. 3.2 Protection of Information The installation & maintenance contractor shall not disclose any particulars of the project including this specification or the CCTV surveillance system to any other party or authority without written consent from Eskom. All persons required to work on the site shall be made known to Eskom and may be required to have their security cleared prior to commencement of work and access to the site. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: 3.3 Note on Product Choice This document applies to going out on tender without a List of Approved Products (LAP). The supplier is free to tender with whatever make/model of equipment they believe is most able to meet the requirements of this specification. There may however be cases where a site/region wishes to issue a List of Approved Products. This would be a list of equipment (make and model) which Eskom has proven, through experience or testing, can meet the requirements of this specification. Reasons for this may include ensuring compatibility with equipment already installed, and to leveraging off experience and training already within the business. Should a LAP based tender be used, the functional requirements of this document would remain the same. However less vigorous testing of the equipment would be necessary. The tender documents should reflect which parts of this document would be relevant to the tender and what designs and practical evaluations will be applicable. It is recommended that the suppliers still be required to demonstrate an understanding of the equipment to be used, and how to use it effectively to achieve the security goals. This document assumes that a non-LAP tender will be followed, i.e. the supplier will choose the products to be used. 3.4 CCTV System Overview The use of CCTV surveillance systems enhance the visual monitoring of sites due to characteristics such as digital transmission of video, as well as digital storage of video for litigation purposes. A CCTV surveillance system provides a means to store and transmit visual footage of incidents within the site which can then be reviewed and analysed in detail. The CCTV installations at Eskom sites are primarily intended for verification purposes, i.e. the visuals should be of such a quality that an observer can, with a high degree of certainty, determine whether there are intruders, the number of intruders, their actions and any equipment they may be carrying such as saws, guns, etc. Should an intrusion incident occur, the intruder detection system shall be triggered by means of intruder detection units (typically video analytics on the perimeter cameras). The alarms and visuals shall be stored on site as well as transmitted to an assigned security alarm control room where the security personnel can assess the situation and then take the necessary responsive actions. The operators in the security control room shall have full control over the camera units, as well as have access to a public address (PA) system and outdoor lights installed at the site. This will enable the operator to obtain visuals of an intruder, as well as provide the operator a means of warding the intruder off via the PA system. The communication link between the site DVR and the security control room shall be by means of a dedicated and secure communication medium between the sites and the security control room and take place over Eskom’s telecommunications network. Communication media may include fibre (2Mbps bandwidth), microwave and satellite. GPRS shall only be used when higher bandwidth options are not available. Though the Eskom telecommunication network is preferred, 3rd party communications infrastructure may be used if necessary. 3.5 Design and Installation Process Overview The design and installation process illustrated in Figures 1 and 2 shall be followed at any new CCTV site to ensure that the system installed is able to deliver the level of security required. ESKOM COPYRIGHT PROTECTED When downloaded from the WEB, this document is uncontrolled and the responsibility rests with the user to ensure it is in line with the authorized version on the WEB. Document Classification: Confidential SPECIFICATION FOR CCTV SURVEILLANCE WITH Unique Identifier: 240-91190304 INTRUDER DETECTION Revision: 2 Page: Site Design and Installation Process Responsible Actions Performed Documents Produced People Risk Assesment Protective Services B-BBEE Minimum Level: 3
Tender Documents (1)

Appendix TSpec 2 - E2242CXMWP - 240-91190304.pdf

View

To download these documents and access AI-powered analysis, visit the main tender page.

Discussion