LOS ANGELES - The long process to craft a false-alarm ordinance that would be agreeable to both law enforcement and the alarm industry in Los Angeles is far from over, according to Jerry Lenander, executive director of the California Alarm Association.
In the first month of the new policy, the Los Angeles Police Department reported a 20 percent decrease in total alarm responses, according to Jerry Lenander.
TALLAHASEE, Fla. - A proposed bill that would add false alarm training and second-call alarm verification requirements to licensing standards in Florida is one step closer to passage after being referred to the Florida SenateÃ¢â‚¬â„¢s Criminal Justice Committee in early March.
SACRAMENTO, Calif. - A back-and-forth debate between California municipalities and alarm companies over whether their customer lists are considered confidential information and protected under a federal privacy act has been settled by a new state law.
While verification has been the mainstay of access control systems, many in the industry say that authentication and validation of documents - be it a card, passport, driverÃ¢â‚¬â„¢s license or other form of identification - is the next frontier to be conquered.
Beyond determining whether a document is real comes the greater questions of is the person who is holding the document who they say they are and if so, what are they allowed to be doing?
Central databases are often used for this validation purpose, noted Phil Libin, president and co-founder of CoreStreet, a validation software provider based in Cambridge, Mass.
More sophisticated access control systems, along with the convergence of physical security with other corporate functions such as building controls and human resources data bases that use the corporate IT network, has sparked continued evolution in access control-related software.
In his view, said Rudy Prokupets, chief technology officer and vice president-research and development for Lenel Systems International, customers are looking for seamless integration, open architecture and integration between electronic, or physical, security and IT security.