Elements and Performance Criteria
- Prepare to program integrated system access control
- The functions of integrated system access is determined from the systems data base and customer requirements.
- Control parameters are determined from the integrated systems data base and confirmed with the customer.
- Programming software tools and project data are down loaded to a compatible PC and checked.
- Manufacturer’s instruction for installing and connecting internet connectivity equipment are read and understood.
- Program integrated system access control
- OHS risk control work measures and procedures are followed.
- Knowledge of integrated system logic-based programming methods are used in programming access control.
- Integrated system functions and parameters are programmed for compatibly with the integrated system and to customer requirements
- Network connectivity is implemented in accordance with manufacturer’s instruction and regulatory requirements.
- Back up, transfer and test system access control
- OHS work completion risk control measures and procedures are followed.
- Programmed functions and parameters are backed up and transfer to the system following manufacturer’s instructions.
- System access tests are conducted to verify compatibility and compliance with the integrated system and customer requirements.
- Non-compliance operations and anomalies are corrected to comply with manufacturer’s and customer requirements.
- A copy of the documentation of the as-programmed access specifications is given the client or client’s representative.