Laserfiche WebLink
NRC IEC <br /> uity Fund 1 <br /> enclosed by an 8' high Concrete block wall. There will be two 24' emergency access <br /> points, one at the East End, and the other at the West end. Main entry and exit <br /> point will be two separate 24' gates. This main point of entry will be controlled by <br /> a 24 hour manned Security attendant. <br /> ii [ I fill <br /> 9.4 Intercom <br /> A video-intercom system will provide video security and assist in communication <br /> throughout the Greenhouse facilities, even from a separate location. Fully integrating <br /> systems will allow for the identification of visitors, broadcasting of emergencies and <br /> announcements and forwarding of calls. <br /> 9.5 Access Codes <br /> Security begins with having a professional card printer that allows for the creation <br /> of water-marked identification cards, with the option of including magnetic strip or <br /> smart card technologies. The holographic anti-counterfeiting watermark can be <br /> custom designed or use a standard design included with the system. <br /> 9.5.1 Contactless Smart Card Readers <br /> These units will be used to control access to sensitive locations. These <br /> devices combine reliability with affordability and feature enhanced 64-bit <br /> security, encryption options, superior weather resistance and anti-vandalism <br /> protection. <br /> As this plan indicates, security technology used by the Company will consist <br /> of state of the art, commercial grade equipment. Furthermore, the security <br /> plan, along with all standard operating procedures developed, will be <br /> constantly updated and audited to guarantee that the Company facilities <br /> remain at the highest level of security at all times. <br /> 9.6 Concentric Security Model With Crime Prevention <br /> The Company will use the Concentric Security Model for the cultivation facility due <br /> to the scope, size and multiple Greenhouses. Viewing the facility as the center of <br /> the wider circle, the outer security perimeter will be the borders of the property, <br /> which would be defended by natural barriers (landscaping), access control, and <br /> surveillance technology. The intermediate security perimeter will include all <br /> cultivation buildings, storage facilities and offices. This perimeter would feature <br /> Page 31 1 54 <br />