FMDS0916 Burglary and Theft
FMDS0916 Burglary and Theft
FMDS0916 Burglary and Theft
Table of Contents
Page
©2010 Factory Mutual Insurance Company. All rights reserved. No part of this document may be reproduced,
stored in a retrieval system, or transmitted, in whole or in part, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without written permission of Factory Mutual Insurance Company.
9-16 Burglary and Theft
Page 2 FM Global Property Loss Prevention Data Sheets
List of Figures
Fig. 1a. Plan view. ........................................................................................................................................ 24
Fig. 1b. Plan view. ........................................................................................................................................ 25
Fig. 1c. Elevation view. ................................................................................................................................ 26
List of Tables
Table 1. Protection For Buildings or Stock Rooms ....................................................................................... 3
Table 2. Protection of Vehicles And Yard Storage ......................................................................................... 5
Table 3. Protection For Burglary Resistant Safes and Vaults ....................................................................... 7
Table 4. Demand ............................................................................................................................................ 9
Table 5. Determining Probability .................................................................................................................. 10
Table 6. Alarm Equipment ............................................................................................................................ 16
Table 7. Vault Classification ......................................................................................................................... 22
Table 8. Vault Door Classes ....................................................................................................................... 22
1.0 SCOPE
This data sheet addresses the subject of burglary and theft losses in manufacturing and warehouse facilities,
and, to a limited extent, mercantile locations. Currency, works of art, precious stones and metals, etc. require
sophisticated alarm systems, very secure storage (e.g., safes or vaults), or combinations of alarms, safes,
watch service, etc.
Robbery and employee theft are not addressed in this data sheet.
1.1 Changes
January 2010. Minor editorial changes were made for this revision. Section 4.0, References, was updated.
2.1 Buildings
2.1.1 Protection
2.1.1.1 Based on the probability of loss and the loss expectancy, burglary protection should be provided as
shown in Table 1. The protection level of an alarm system is determined by adding the classification numbers
for the components of the system. (A system consisting of Perimeter-2 and Area-1 alarm protection would offer
Level 3 protection.)
2.1.1.2 Use the following types of passive protection when ‘‘passive protection only’’ is recommended in
this data sheet.
1. Adequate exterior lighting. This includes lighting an area of ten ft (three m) on either side of fences, and
areas within 40 ft (12 m) of building entrances. Lights should be roof-mounted or pole-mounted so they are
not easily attacked. Yard storage subject to theft should be in a well-lighted area.
2. Windows. Those easily reached from the ground and not fronting main roads should be blocked or
protected. Windows on upper stories made accessible by nearby structures should also be protected.
Protection, as permitted by the applicable governing building and fire codes, should be in the form of bars
or screens as follows:
a. Where the fire department must have quick access to the protected area, bars can be 1⁄4 in. (6 mm)
rods spaced one in. (2.5 cm) apart. In other areas, flat iron bars at least 11⁄2 in. (four cm) by 3⁄8 in. (1 cm)
should be used, spaced no more than five in. (13 cm) apart vertically and no more than 24 in. (61 cm)
apart horizontally. 3⁄8 in. (1 cm) rivets or carriage bolts should be provided at the points where bars cross.
b. The ends of bars should be securely fastened to the window frame using 3⁄8 in. (1 cm) carriage bolts
or rivets, or they should be embedded in masonry walls. If this is not practical, the bars should be attached
with 3⁄8 in. (1 cm) lag bolts.
c. If screens are used, wire should be a minimum of eight gauge in size, with mesh openings of no more
than 2 in. (5 cm). The mesh should be securely attached to a heavy metal frame bolted to the window
frame with 3⁄8 in. (1 cm) carriage bolts.
d. Bars or screens should be located on the inside of windows so that glass must be broken before the
bars can be attacked. Heads of bolts used to secure bars or screens should be case hardened to resist
drilling.
e. Glass store display windows are subject to ‘‘hit and run’’ attacks and should therefore be made of force
resistant glazing when contents of the display area are of significant value, such as jewelry, television
sets, etc.
3. Fences or Barriers. Fences should be flush with the ground and a minimum of 7 ft (2 m) in height, with
barbed wire at the top tilted toward the outside of the protected area. Barrier systems (walls, barbed tape or
concertina, etc.) should provide the same degree of protection.
4. Exterior doors. These should be of substantial construction with adequate locking devices. They should
be a minimum of 11⁄2 in. (4 cm) thick, and should be solid wood, wood core with 16 ga. metal facing on the
interior, or solid metal. Windows in doors should be force resistant glazing or should be protected by metal
grill work. The door frame should also be of substantial construction, well secured to the structure. A heavy
dead-bolt lock should be provided, with a bolt that extends at least 1 in. (25 cm) into the bolt receptacle.
5. Protection against other tenants. Adequate cutoffs between tenants should be of solid masonry
construction, complete from the floor to the underside of the roof. Any openings should be locked with suitable
hardware. Other tenants should not have free access.
6. Visitors should be supervised for the duration of their visit.
Note: The above are adequate as the sole means of burglary protection only in cases of low probability or
low loss expectancy.
2.1.1.3 Alarms should be connected to an FM Approved burglar alarm central station or police station
wherever possible. Where this is not possible, watch service should be provided. (For Level 2 protection, a
loud local alarm can be substituted for central station connection, if reliable local response can be assured.)
2.1.1.4 Alarm equipment should be FM Approved or an adequate equivalent.
2.1.1.5 Line supervision should be provided for Level 3 alarm systems and above. Where the loss probability
is moderate, an FM Approved local alarm can substitute for line supervision. FM Approved digital dialing
equipment is an adequate means of monitoring alarm signals where line security is not needed.
2.1.1.6 All locations should have suitable passive protection as judged adequate for the location.
2.1.1.7 During construction, renovation or equipment installation contractors should be supervised closely.
Provide watch service and alarms and address related items (such as the means of alarm transmission
notification and location accessibility) as outlined in Data Sheet 1-0, Safeguards During Construction,
Alteration and Demolition. Provide fencing and lighting for the site.
2.1.2.5 If alarms cannot be placed in service due to equipment failure, watch service should be provided
until alarms are returned to service.
2.2 Yards
2.2.1 Protection
2.2.1.1 Yard storage should be protected with fencing, adequate exterior lighting, and secure locking devices
on fence gates.
2.2.1.2 Where warranted according to Table 2, protection of yard storage beyond simple passive protection
should be provided.
2.3 Vehicles
2.3.1 Protection
2.3.1.1 Exterior perimeter alarms and/or vehicle alarms should be provided based on the probability of yard
storage loss and loss expectancy as shown in Table 2.
2.3.1.2 Alarms should be connected to an FM Approved burglar alarm central station or police station.
2.3.1.3 Alarm equipment should be FM Approved, or an adequate equivalent should be provided.
2.3.1.4 Loaded trailers should not be parked in the yard. Where they must be left unattended, kingpin locks
should be provided. Alarms should be provided in accordance with Table 2. Unless the commodities in the
trailers are of low demand, this arrangement has a high probability of loss.
2.3.1.5 Watch service may be used as a substitute for exterior perimeter alarms. Key stations should be
located in the yard to assure proper coverage.
2.3.1.6 Vehicles or loaded trailers should be protected with fencing, adequate exterior lighting, and secure
locking devices on fence gates and loaded trailers.
2.4.1 Protection
2.4.1.1 When all susceptible commodities are stored in suitable safes or vaults, alarms should be provided
based on the probability of loss and the loss expectancy as shown in Table 3. Otherwise, protect the safe
or vault according to Table 3 and protect the building using Table 1 or 3, whichever requires the higher level
of protection.
2.4.1.2 The safe or vault door should have a combination lock and be equipped with a relocking device.
The door combination should be given to the minimum number of employees. The combination should be
changed every six months or whenever someone who knows the combination leaves the company.
2.4.1.3 Alarms should be connected to an FM Approved burglar alarm central station or police station. Where
the probability of loss is moderate and the loss expectancy is moderate or low, a loud local alarm can
substitute for remote monitoring if reliable local response can be assured.
2.4.1.4 Alarm equipment should be FM Approved or meet adequate equivalent requirements.
2.4.1.5 Line supervision should be provided in all cases except where the loss expectancy is low. Where
the probability of loss is moderate, a loud local alarm can substitute for line supervision if reliable local
response can be assured.
2.4.1.6 Watch service may be used as a substitute for vault or safe alarms where needed if the watchman
checks the vault or safe at least once every 30-60 min
2.4.1.7 All locations should have suitable passive protection as judged adequate for the location.
There are many factors that affect the probability of a burglary or theft They are most easily evaluated when
broken down into three categories: Demand, concentration of value, and transportability.
3.1.1 Demand
The demand is a direct indication of the desirability of goods from the point of view of burglary or theft This
takes into consideration the cost of the goods in question, the ease with which they can be resold, and the
number of potential buyers.
Very high-demand items have high unit values, are easily transportable, and can be readily resold to a large
number of people or industries. This category includes gold, platinum, diamonds, and jewelry made of
precious metals and stones. Because of the large loss expectancies generated by small volumes of these
items, combinations of alarms, safes and vaults, watch service, etc. are recommended. These items are
generally not within the scope of this document.
High-demand items are those with high unit value, marketable on a ‘‘no questions asked’’ basis. This category
includes luxuries or non-essentials as well as high-value, commonly used industrial items.
Moderate-demand items are those which are less easily resold. This category includes items of lower unit
value; it also includes those of high unit value which would only be of use to a limited number of people or
industries.
Low-demand items are those that have limited appeal to the general public or are widely used but priced
low. Also included are high- or moderate-value items of use to a limited number of people or industries.
Table 4 illustrates examples of various demand items. Caution must be exercised when classifying
commodities. The demand for a particular item may vary due to such factors as scarcity, geography, unusual
market prices, popularity, etc.
Demand refers to the marketability of a stolen item. While dollar values play a part in determining demand,
they do so in an indirect way. Color televisions are expensive and are high-demand items. Oscilloscopes
are also expensive, but are moderate-demand items due to the limited market. Designer clothes are expensive
and are high-demand items. Children’s clothes would be much less expensive, but would still be high-demand
items.
Examples:
1. Drill Bits used on oil rigs. These have a high unit value and would have a high demand in areas where
oil drilling is common. The demand would be lower elsewhere.
2. Copper is listed as a high-demand item due to its cost. A few years ago, it was a moderate-demand item
due to its lower value.
3. Children’s toys can change their demand every few years. Popularity and availability are major factors
used to determine demand. Electronic toys and games are popular and expensive and are thus a high-
demand item. (These may become less expensive in the future in the same way pocket calculators have
increased in sophistication while decreasing in cost.)
Table 4. Demand
Very High Demand High Demand Moderate Demand Low Demand
Diamonds Antiques Brass Blowers/Fans
Drugs-narcotics Audio/Visual Equipment Cathode Ray Tubes (CRTs) Chemicals
Fine Art Bicycles * Compressors Containers/Drums
Gold Cobalt Alloys Computers Cotton Bales
Precious Stones Calculators * Duplicating Machines Dry Cleaning Equipment
Palladium Cameras (includes lenses & Electric Motors Glue
accessories) *
Platinum Cigarettes Household Appliances Hand Tools (hammers,
(Dishwashers, Refrig.,etc.) shovels, etc.)
Silver Clothing * Industrial Pumps Heavy Industrial Machinery
Copper Lumber Office Supplies (Pens,
Pencils, Paper, etc.)
Furniture * Metal Working Machines Perishable foods (fresh fruit,
ice cream, etc.)
Guns Sophisticated Electronic Pet Food
Equipment (used in industry
or research)
Jewelry Titanium Rolled Paper
Liquor * Zinc Ingots Salt
Meat Sandpaper
Microwave Ovens Scrap Metals (Steel,
Aluminum, Iron, etc.)
Motorcycles Textbooks
Personal Computers Tool Boxes
Printed circuit boards Transformers
Power Tools
Records/Tapes
Stereo Equipment
Televisions
Toys/Games (Electronic) *
* These items are the luxury models that have a high unit value. Similar items with a lower unit value have a moderate demand.
3.1.2 Concentration
Loss history indicates that it is unlikely that more than two trailer loads of goods will be stolen. Therefore,
the loss expectancy can be considered to be the value of 7000 ft3 (200 m3) of the goods subject to theft, which
represents roughly the volume of two trailers. Common sense must also be used. For instance, commodities
having a high weight per volume would overload a trailer before it is completely filled, so the loss experience
would be based on the maximum weight two trailers could carry. (50,000 lbs [22 tons] is a rough estimate of
the capacity of one trailer.)
3.1.3 Transportability
Transportability is simply a reflection of whether an item is movable. Goods arranged for bulk handling, such
as palletized storage, where lift trucks are available, are generally considered transportable. On the other
hand, the lack of a lift truck does not automatically mean that palletized goods are not to be considered
transportable. Microwave ovens, stored in boxes on pallets, would be considered transportable if no lift trucks
were available, as they can be moved one at a time.
Of course, not all cases are precisely defined, so a certain amount of judgment is necessary.
3.1.6 Examples
1. Storage of electric hand saws and drills in boxes on pallets in a warehouse.
Demand: High (from Table 1-power tools)
Concentration: Yes
Transportability: Yes
Probability: High
Note: Tools are considered transportable whether or not a fork lift is available. The tools can be easily moved
by hand.
2. Storage of integrated circuits in tubes on shelves.
Demand: High for common, multi-use types, or Low for specialized types
Concentration: Yes
Transportability: Yes
Probability: High or Low depending on type
The common, multi-use type have a high demand because of high unit value and ease of resale to the
electronics industry. Specialized types are low demand due to the very limited market. Only another
manufacturer of the same item is likely to use the specialized integrated circuits.
3. 25 in. color television sets in hotel rooms.
Demand: High
Concentration: No
Transportability: Yes
Probability: Low
The television sets are not considered to have concentration of value. Theft of 7,000 ft3 of television sets
is not likely since the thief would have to obtain entry to each room to have access to the television set.
• Linear microphone systems are small coaxial cables that pick up the ‘‘sound’’ of tiny vibrations through
changes in a static charge in the insulation between its two conductors. They are programmed to
distinguish sounds characteristic of intrusion.
• Seismic alarm systems use buried detectors. The pressure generated by a person walking over these
detectors will actuate an alarm. Other seismic detectors will actuate an alarm due to pressure caused by a
vehicle crossing the detector.
• Vibration detectors can be mounted on fencing and will respond to movement of the fence.
• Mercury flow switches can be mounted on fencing and will respond to movement of the fence or fence
posts indicative of an intruder climbing the fence.
Vibration detectors or mercury flow switches are not normally applicable unless on-premise guards are able
to monitor the areas.
3.4.2 Alarms
In many cases, a properly designed burglar alarm system can provide adequate protection. Burglar alarm
equipment ranges in sophistication from simple magnetic contacts for doors to television systems using digital
image processing techniques. Installations can range in complexity from simply protecting doors to protecting
all openings, walls, floors, roofs, and providing motion detection within the premises. Although they can be
complex, the basic purpose of an alarm system is easily defined. It should detect a burglary attempt and
provide a suitable response to prevent the successful completion of the burglary.
To ensure alarms are reliable and to minimize false alarms, experience has shown that burglar alarms must
be properly maintained, inspected frequently, and carefully activated.
Burglar alarm systems can be classified according to the extent of protection provided.
Complete Protection. Complete protection means attempted entry is detected if a movable opening is opened
or if entry is attempted by breaking through the protected area. For the parts of a structure, complete
protection is as indicated below:
• Doors. Contacts plus one or more of the following: wiring, foil, beams, vibration detectors or floor traps.
(Beams, and/or floor traps must pass directly in front of the doors.)
• Windows. Contacts (on movable windows) plus one or more of the following: foil, wiring, vibration detectors
or beams. For nonmovable windows, contacts are not needed. (Beams and/or wiring must protect the
area in front of the windows.)
• Walls and Ceilings. Beams, vibration detectors, wiring, or foil.
• Floors. Beams, vibration detectors, floor traps, wiring, or foil.
• Other Openings. Contacts (for movable openings) plus one or more of the following: foil, wiring, traps,
vibration detectors or beams. (Protection must be located on or in front of these openings.)
• Partial Protection. Partial protection applies only to movable openings. It means attempted entry is detected
if one of these openings is moved. Partial protection of openings consists of contacts or switches only.
• Double Circuit. Where foil, wiring, etc. is provided to protect a surface, a double circuit arrangement is
one in which two separate foil strip circuits are provided, interwoven so that the foil cannot be simply
‘‘jumped’’ to defeat the alarm system.
• Burglar Alarm Protection. Categorized into two types: perimeter protection and area protection. There are
different levels of protection within each category, and a burglar alarm system can consist of varying
combinations of the different types. The type of alarm system suitable for a given situation is a function
of the probability of burglary, the loss expectancy, and the configuration and construction of the building.
covered with moisture-retardant paper before foil is applied. The foil should be covered so as to not be visible
without close inspection, and should be protected from mechanical damage. (Where mechanical protection
is not required, a coat of nonconducting paint is sufficient.)
Open wiring is similar to foil stripping, except that wire is used. This method is only suitable for protecting
skylights or ceilings where the wiring is at least 8 ft (2.4 m) above the floor. The wiring should be provided
in two layers, perpendicular to one another and spaced from 2 to 6 in. (50 to 150 mm) apart. The wiring should
be arranged to transmit an alarm when an attempt is made to lower it.
Screens and grooved stripping are also similar to foil. Fine wire is woven into window screens or placed in
grooves cut in wood doweling or wood strips, which are attached to the opening or surface to be protected.
Wires should be spaced no more than 4 in. (10 cm) on center, and should be arranged as a double circuit.
Cutting the screen or wire will interrupt the circuit and actuate an alarm. Also, screens and stripping should
be arranged so that any movement of more than 2 in. (5 cm) will actuate an alarm.
Beams can be used as perimeter protection for walls and doors. They consist of a light source and a receiver
arranged so that a person passing between the two will obstruct the beam and actuate an alarm. For a door,
a single beam is sufficient. For walls, a ‘‘stacked’’ or crossed arrangement should be used. (As infrared
beams are primarily used for area protection, a more detailed description can be found under Section 3.4.4
of this data sheet.)
Sonic and vibration detectors are devices that can be attached to walls, ceilings, windows, etc. and will actuate
an alarm if attempts are made to penetrate the protected surface. They are generally designed to respond
to the specific type of sound or vibration that is produced when the surface they protect is attacked. (A detector
designed for glass would not be suitable for a metal wall, for example.)
Table 6 contains additional information on the above equipment.
3. All susceptible commodities are in a separate, cut-off area. Protection consists of a Perimeter 2 system
(Example 1), a contact on the one storage room door and complete motion detection inside the storage room.
This is a Level 5 (Perimeter 2 and Area 3-Spot Protection [See Page 11]) alarm system.
In one-way systems, the protected premise continually transmits status signals to the monitoring station.
However, an acknowledgment of successful communication is not received at the protected premise.
Signaling from a central station to guards or police would be through conventional means.
In two-way systems, normal communication between the protected premise and the monitoring station is
based on an interrogate-response cycle. An additional feature of this system is remote control capability.
Radio signaling of alarm systems can necessitate multiple retransmission of the signal to remote monitoring
stations. This permits one station to monitor alarms at a significant distance from the protected premise when
response from the central station to the protected property is not possible.
A direct wire is the easiest type of connection to supervise. Supervision can consist of simply monitoring
the line resistance to see whether it is open or short circuited. A more sophisticated line supervision method
is to superimpose a tone or A.C. voltage on the line, and monitor for any changes.
In a McCulloh loop system, a break in a line on the loop causes a trouble signal at the monitoring station.
This does not, however, indicate exactly where the trouble is, so it cannot be determined which alarm systems,
if any, are out of service. Devices have recently become available that allow a form of line supervision on
the McCulloh loop system. These devices can inform the monitoring station of the status of individual alarm
systems on the loop. They are not installed on all systems, however, as they are costly.
As indicated previously, supervision of a digital communicator system is achieved on a 24-hour basis when
it transmits a status communication. If the derived channel system is through constantly powered telephone
lines, end-to-end line supervision exists.
Supervision of the alarm system using radio signaling is possible on the two-way systems via the interrogate-
response cycle. Supervision of one-way radio signaling is possible if the system transmits a status signal
every 24 hours (or less) which the monitoring station compares to a stored data base. Failure to transmit a
status signal is treated as a trouble signal.
3.4.8.6 Response
Response can be provided by police and/or guards employed by the central station. The key to effective
response is that it be timely and performed by capable persons.
Response time is an important factor, but statistics for burglaries in the types of occupancies addressed by
this data sheet indicate that, in most cases, burglars remain at the scene for periods ranging from 15 minutes
to one hour or more.
Response times are greatly affected by traffic conditions, so it is unrealistic in many cases to guarantee
extremely fast response. Also, reductions in police manpower in many large cities reduce the speed of
response.
Factory Mutual classifies response time on two levels: 15 minutes or less, and 20 minutes or less.
(Concentrations of extremely high values, such as are found in jewelry stores, etc. may call for faster response
time.)
• FM-15 Response is defined as the capability of response to the protected premises by police or suitably
trained and equipped guards within 15 minutes of receipt of an alarm at the monitoring station.
• FM-20 Response is the same as above, except that response is within 20 minutes.
Systems that meet the requirements of line security are classified as FM-15-S (15-minute response time)
and FM-20-S (20-minute response time).
2. Frequency of rounds should be no less than once per hour. Rounds should be random, so that they are
unpredictable. (In some cases, closed circuit television may be an adequate substitute for regular rounds
or for decreased frequency of rounds.)
3. Watchmen should be responsible only for plant security and fire prevention functions. They should not
perform maintenance or other functions along with their security function.
4. Watchmen should be well trained and equipped for proper response.
5. Means should be provided for quick notification of police or other authorities by all watchmen.
If all of the above requirements are met, watch service can be considered the equivalent of Level 3 alarms.
Where a higher level of protection is needed, watch service can be combined with perimeter alarms to
achieve the needed protection level. Watch service is generally incompatible with area protection.
A loud local alarm should be provided in combined watch service/alarm systems, in addition to central station
or police station alarm monitoring.
Dogs cannot be used as a replacement for watch service, as they can be easily circumvented by shooting,
poisoning, etc.
Modular panels can be used to form the walls, ceiling and floor of a vault. They are manufactured of
intrusion-resistant material and are intended for assembly at the site. Some modular panels can also be
disassembled, relocated and/or modified. Tested panels will bear an Underwriters Laboratories Inc. Burglary
Resistant Vault Panel Label. These modular vaults can weigh considerably less than a corresponding generic
vault.
Vault doors are constructed of intrusion-resistant materials with a burglary resistant lock equipped with a
relocking device. (A relocking device locks the bolt mechanism if the lock is attacked to gain entry.) Tested
doors will bear a UL Inc. Burglary-Resistant Vault Door label.
The ratings for burglary-resistant vault doors and modular panels are:
Safes are steel containers with a combination lock designed for protection of valuable records or commodities.
They are generally smaller than vaults and are often movable. Safes are either fire resistant or burglary
resistant.
Fire-resistant safes are constructed to resist and retard the penetration of heat, to protect paper records
from destruction by fire. These units have steel retaining walls which sandwich an inner insulating material.
This construction provides minimal burglar protection.
Burglar-resistant safes are specifically designed to protect valuable commodities from theft This protection
is provided by using open-hearth steel in the walls, roof, floor and door of the safe, and intricately designed
locking and relocking devices. This construction will not protect paper from fire damage although it will provide
protection against burglary.
There are a number of units available that combine both fire and burglar resistance.
A safe which has been tested will bear a label on the inside of the door indicating the degree or level of
protection it affords. A burglary-resistant safe label indicates the type of protection it provides: tool resistant,
torch resistant and explosive resistant. The resistance is designated by letter followed by a number.
TL = tool resistant
TR = torch resistant
TX = torch and explosive resistant.
Number = net working time for which safes must resist attack
Examples: TRTL-30 defines a safe that will resist tool and torch attack on the door for 30 min TRTL-15x6
and TRTL-30x6 defines safes that will resist tool and torch attack on all six sides for 15 or 30 min
TXTL-60 defines the highest safe rated by UL. It will resist tool, torch, and explosive attack on all six sides
for 60 min
Safe walls, ceilings, and floors should be constructed of intrusion-resistant materials such as steel or alloys.
In addition, safes should ideally be securely attached to the structure in which they are located to prevent
them from being stolen and taken to a remote location for attack. This attachment should consist of bolting
or welding to structural members, embedding in concrete, etc.
4.0 REFERENCES
For more information, please refer to the following data sheets as cited in the text.
Data Sheet 1-0, Safeguards During Construction, Alteration and Demolition
Data Sheet 5-40, Fire Alarm Systems
Data Sheet 9-1, Supervision of Property
Data Sheet 10-6, Protection Against Arson and Other Incendiary Fires
There are no conflicts with NFPA standards
multiplex: An electronic system that uses a sophisticated electronic coding system, usually computerized,
to monitor a number of alarm systems on one high quality voice-grade telephone line.
opening: Any opening having an area of 96 in.2 (620 cm2) and one dimension of at least 6 in. (15 cm). Ducts
having a minimum cross-sectional area of 144 in.2 (930 cm2) are considered openings. An opening may
be covered by a door or window, or blocked, inadequately barred, etc., and still be considered an opening.
partial protection: Attempted entry is detected if a movable opening is moved. Partial protection of openings
consists of contacts or switches only.
robbery: When violence or threat of violence is used to execute a theft
theft: The taking of property belonging to another, without the owner’s consent, with intent to deprive the
owner of its value and to appropriate it to the use or benefit of the thief.