Intrusion detection is the supervised loop that tells the institution something is wrong. Where access control says who can come in, intrusion detection says when someone is in who should not be. The work is straightforward (panel, sensors, supervised zone wiring, central station reporting), and the discipline is in the zone design, the false-alarm reduction, and the ULC-listed monitoring path. Get those right and the system catches the events it should; get them wrong and the system catches every shopping cart, every cleaner, every HVAC cycle, until the central station ignores it.
The governing standards
When the standards apply
Every monitored intrusion install in Canada. The standards below define the equipment listing, the install practice, and the central station performance.
The standards
Panel selection
When the rule applies
Every intrusion install. The panel is the controller for the system: it monitors the zones, manages arming and disarming, and communicates to the central station.
The spec
Field note
Sensor types and applications
When the rule applies
Every zone on the install. The sensor type is selected against the space being protected and the threat being detected.
The six common sensor types
Passive infrared (PIR)
Detects motion by sensing changes in infrared heat signature within the protected area. Used indoors for area protection. False alarms triggered by HVAC airflow, sun warming surfaces, small animals, fluorescent light cycling. Mount carefully against environmental factors.
Dual-technology (PIR + microwave)
Combines PIR with microwave (motion-detection radar). Both technologies must agree on a detection event before triggering an alarm. Significantly lower false alarm rate than PIR alone, at slightly higher unit cost. Used indoors in environments where PIR false alarms are documented.
Glassbreak
Detects the acoustic signature of glass breaking. Mounted on the wall opposite or adjacent to the protected glass, ceiling level, within 4500 mm (15 ft) of the protected glass. Used for perimeter window protection.
Magnetic contact (door/window contact)
Reed-switch sensor on the door or window frame, magnet on the moving leaf. Detects the open/closed state. Used on every door and window in a perimeter zone, plus secured-room interior doors.
Photoelectric beam (active infrared)
Transmitter-receiver pair forming an infrared beam across an opening or an outdoor perimeter. Detects beam interruption. Used outdoors for perimeter detection along fence lines and across driveway entrances.
Perimeter LiDAR
Laser-scanning sensor that creates a detection plane along a wall, fence, or property line. Detects intrusion across the plane with sub-metre accuracy and rejects environmental clutter (wildlife, vegetation movement). Used at high-security perimeters where false alarm rate matters and the budget supports the technology.
Field note
Zone design
When the rule applies
Every intrusion install. The zone design defines how the panel reports the alarm: which zone caused it, what type of alarm it is, and what the operator should do about it.
The spec
Supervised zone wiring
When the rule applies
Every zone on the install. Supervised wiring lets the panel detect not just alarm/normal state but also tamper conditions (cut wire, short, removed sensor).
The spec
Field note
Central station monitoring
When the rule applies
Every monitored intrusion install. The central station (sometimes called a monitoring station, signal receiving centre, or SRC) is the third-party service that receives the panel’s alarms and dispatches the appropriate response.
The spec
Field note
False alarm reduction
When the rule applies
Every monitored install. False alarms degrade the institution’s response: the central station ignores them, the police down-prioritise the address, and the system loses its institutional credibility. False-alarm reduction is design discipline, not after-the-fact tuning.
The spec
Field note
Integration with access control and video
When the rule applies
Most institutional deployments combine intrusion with access control and video on shared infrastructure. The integration determines what the operator sees when an alarm occurs.