Intrusion detection is the supervised loop that tells the institution something is wrong. Where access control says who can come in, intrusion detection says when someone is in who should not be. The work is straightforward (panel, sensors, supervised zone wiring, central station reporting), and the discipline is in the zone design, the false-alarm reduction, and the ULC-listed monitoring path. Get those right and the system catches the events it should; get them wrong and the system catches every shopping cart, every cleaner, every HVAC cycle, until the central station ignores it.

The governing standards

When the standards apply

Every monitored intrusion install in Canada. The standards below define the equipment listing, the install practice, and the central station performance.

The standards

Panel selection

When the rule applies

Every intrusion install. The panel is the controller for the system: it monitors the zones, manages arming and disarming, and communicates to the central station.

The spec

Field note

Sensor types and applications

When the rule applies

Every zone on the install. The sensor type is selected against the space being protected and the threat being detected.

The six common sensor types

Passive infrared (PIR)
Detects motion by sensing changes in infrared heat signature within the protected area. Used indoors for area protection. False alarms triggered by HVAC airflow, sun warming surfaces, small animals, fluorescent light cycling. Mount carefully against environmental factors.
Dual-technology (PIR + microwave)
Combines PIR with microwave (motion-detection radar). Both technologies must agree on a detection event before triggering an alarm. Significantly lower false alarm rate than PIR alone, at slightly higher unit cost. Used indoors in environments where PIR false alarms are documented.
Glassbreak
Detects the acoustic signature of glass breaking. Mounted on the wall opposite or adjacent to the protected glass, ceiling level, within 4500 mm (15 ft) of the protected glass. Used for perimeter window protection.
Magnetic contact (door/window contact)
Reed-switch sensor on the door or window frame, magnet on the moving leaf. Detects the open/closed state. Used on every door and window in a perimeter zone, plus secured-room interior doors.
Photoelectric beam (active infrared)
Transmitter-receiver pair forming an infrared beam across an opening or an outdoor perimeter. Detects beam interruption. Used outdoors for perimeter detection along fence lines and across driveway entrances.
Perimeter LiDAR
Laser-scanning sensor that creates a detection plane along a wall, fence, or property line. Detects intrusion across the plane with sub-metre accuracy and rejects environmental clutter (wildlife, vegetation movement). Used at high-security perimeters where false alarm rate matters and the budget supports the technology.

Field note

Zone design

When the rule applies

Every intrusion install. The zone design defines how the panel reports the alarm: which zone caused it, what type of alarm it is, and what the operator should do about it.

The spec

Supervised zone wiring

When the rule applies

Every zone on the install. Supervised wiring lets the panel detect not just alarm/normal state but also tamper conditions (cut wire, short, removed sensor).

The spec

Field note

Central station monitoring

When the rule applies

Every monitored intrusion install. The central station (sometimes called a monitoring station, signal receiving centre, or SRC) is the third-party service that receives the panel’s alarms and dispatches the appropriate response.

The spec

Field note

False alarm reduction

When the rule applies

Every monitored install. False alarms degrade the institution’s response: the central station ignores them, the police down-prioritise the address, and the system loses its institutional credibility. False-alarm reduction is design discipline, not after-the-fact tuning.

The spec

Field note

Integration with access control and video

When the rule applies

Most institutional deployments combine intrusion with access control and video on shared infrastructure. The integration determines what the operator sees when an alarm occurs.

The spec

Tags intrusionoptexpirglass-breakmonitoring