- Project plans
- Project activities
- Legislation and standards
- Industry context
Last edited 16 Jan 2018
To help improve this article, click 'Edit this article' above.
Access control is the selective restriction of access to a particular place, building, room, resource or installation. To gain access to a restricted location an individual generally needs to have authorisation or to be given permission to enter by someone that already has authorisation.
Perimeter security can be used to prevent intruders from penetrating a defined boundary between land, buildings or parts of buildings and gaining access to protected people, property or assets. Perimeter security may be created by psychological, physical or electronic barriers which:
Perimeter security is commonly required to protect operations such as:
- Transportation (airports, stations, ports, bridges).
- Utilities (dams, power plants, pipelines, energy distribution networks).
- Industry (chemical, oil and gas operations).
- Commerce (offices, banks, warehouses, entertainment facilities).
- Defence (military bases, weapons storage, command centres).
- Government (embassies, courts, departments).
- Correctional facilities (prisons and other institutions).
- VIP areas (secured estates, royal palaces).
There are a great number of methods that can be used to provide perimeter security.
- Fences, railings and walls.
- Perimeter structures.
- Street furniture such as cycle racks, seating, planters, and so on.
- Gates, turnstiles, boom barriers, bollards and height restrictors.
- Electric fences which deliver a non-lethal electric shock. Attempts to short circuit, reduce the voltage or breach the fence can trigger an intruder alarm. Some fences have the ability to pinpoint perimeter disturbances making it quicker for building occupants to be alerted to where a potential intrusion is taking place.
- Buried cable detection systems which provide covert perimeter security, detecting the precise location of intruders.
- Closed-loop systems in which vibration sensor cables are installed at high and low levels on a perimeter fence.
- CCTV used to oversee the perimeter.
- Microwave, infrared or radar sensors which can detect walking, running or crawling targets. When an intruder enters the detection zone, changes to the field are registered and an alarm is triggered.
- Rising kerbs and road blockers.
Construction sites can use perimeter security for safety purposes, and to prevent damage, theft or vandalism.
 Related articles on Designing Buildings Wiki
- Access control.
- Access to construction sites.
- Approved document Q.
- Building wraps.
- Commercial security systems.
- Construction phase plan.
- Fire and rescue service.
- Fire dampers.
- Fire detection and alarm systems.
- Health and safety.
- Hostile architecture.
- Intruder alarm.
- Joint fire code.
- Outbuildings security.
- Safety signs.
- Security and the built environment.
- Security glazing.
- Smart surveillance, video surveillance and VSaaS.
- Smoke detector.
- Types of alarm.
- Types of lock.
 External references
Featured articles and news
New BRE book considers the progression from project-based knowledge creation to whole-life urban knowledge management.
This CIOB article explores the concept of value in building design and construction.
BREEAM and Measurabl announce integration to improve the financial performance of commercial real estate.
Rogers Stirk Harbour + Partners' release new images of soon-to-open 3WTC tower in New York.
A document can be called a bond or a guarantee. Does the name matter and what is the difference between them?
New briefing note is launched focusing on increasing knowledge of housing that promotes health and wellbeing.
Arbitration is a private, contractual form of dispute resolution used in the construction industry.
The European Parliament has approved a revised Energy Performance of Buildings directive.
One in six MPs supports the ring-fencing of retentions as proposed in the 'Aldous Bill'.
A stakeholder is anyone who has an interest in the process or outcome of a construction project.
BRE launches online self-assessment tool for ethical labour sourcing.