The A2P mark (Assurance Prévention Protection [Prevention and Protection Insurance]) is also an anti-intrusion certification adapted to equipment for protection against intrusion. This certification is issued by the CNPP.

Alimentation Pneumatique de Sécurité [Safety Pneumatic Supply]

The crossing point of a property, a building, a room.

Access Control
All the physical and/or electronic equipment that ensure that access (to a place, a system, etc.) is authorised.

Access Control Reader
Electronic system enabling the reading, through projection, through close contact or remotely, of the electronic elements contained on or in a badge. The reader enables the identification of the badge wearer.

Access Lock
Access space that is enclosed on both sides by openings that cannot be opened at the same time. The openings are generally interlocked. One opening is not able to open when the other is not closed. The aim of this system is to streamline and control, and individually identify or authenticate access. Access locks can be made of various materials.

Access Management
All the means (physical, technical, electronic, human and organisational) enabling the management (authorisation/prevention), drawing and planning of access authorisations to defined places.

Automatic External Defibrillator

Artificial Intelligence

Sound, light and/or discreet signal that gives an inside warning of a danger or provokes a reaction. There are different categories of alarms.

Functionality of access control that stops a person from entering the same area twice, without having left beforehand.

Anti-theft Gate
Detection Antenna for Anti-theft Tags

Anti-theft Tag

Armoured Doors
Doors complying with European standard EN 1627.

Armoured Vehicle
The different standards of armour correspond to a level of protection depending on the threat. The levels of armour go from B2 (NIJ-II) to B7, which represents the highest level in the field of civil vehicles.

Fire of malevolent origin.

Authentication enables the confirmation of the proof of one’s identity. For example, biometrics allows authentication.

Device enabling the identification of a person or an object.


Paper or laminated copy that aids the identification of the wearer.

Barbed Wire
Strands of twisted iron that can serve as a demarcation of property. They should be used as a deterrent.

Business Continuity Plan

Business Intelligence. It used to be called Economic Espionage.

Biometrics groups “all computing techniques aiming to automatically recognise an individual through their physical, biological or even behavioural characteristics”.

Building Management System

Mobile piece of a lock that engages in a latch to keep an opening closed.

Book VI
Code de la Sécurité Intérieure [Internal Security Code]: Book VI covers Private Security Activities

Burglar-proof Window
Window conforming to the CLASS 4 BURGLAR-PROOF SECURITY standard (UNI ENV 1627/30:2000 standard).


Certificat d’Aptitude à la Conduite en Sécurité [Certificate of Aptitude in Safe Driving]

Confidentiel Défense [Confidential]

Central Command Station of Security and/or Safety, of a site or a building, centralising the alarms, the means of alert and connection.

Central Alarm
Equipment designed to control the processing of the information from the detectors and the control of alarm devices. A central alarm includes, in separated elements or not: a processing box, its on/off switch or switches, its power supply or supplies, one or more activation control device.

Close Protection
Task of ensuring the protection of people. In public administration, the staff in charge of this task are called “Security Officers”. In the private sector, they are called “Close Protection Officers”, the new name for “Bodyguards”.

Cloud Souverain
Data hosting provider that guarantees both the nationality of the place of hosting and access to the client’s data. The latter safeguards the technical and legal control of its contents.

Concertina Wire
Name given to barbed wire in coils of 60 to 90 cm in diameter. Generally positioned on cranked tops to prevent a fence being crossed.

Cranked Top
Cranked tops are features inclined at 45°, installed on fence posts. They are single or double branched. They are designed to stop people from climbing the fence. They are generally combined with barbed wire or concertina coils. Note: ensure that the plumb distance of the cranked top on the exterior of the property is always within the legal limit of the property.

Term used in Remote Surveillance in particular and according to a defined procedure, to verify a piece of information or a received call.

Centralised Technical Management


Cyclical Testing
Enables regular verification in order to ensure that the telephone line and the plant are functioning in an optimal manner.


Direction du Renseignement et de la Sécurité de la Défense [Directorate for Defence Intelligence and Security]

Document Unique d’Évaluation des Risques Professionnels [Single Document for the Evaluation of Occupational Risks]

Data Intelligence
Methods of collecting, analysing and synthesising relevant and useful information for the company.

see Dome Camera

Fixed frame of an opening.

Data Protection Officer

Disaster Recovery Plan

Dynamic Masking


Équipement d’Alarme [Alarm Equipment]

Écran de Contrôle et de Signalisation [Control and Signalling Screen]

Economic Security
All of the methods, techniques and legal processes enabling a company to work and prosper in a competitive world through Data Intelligence, the Protection of Information Assets, Influence and lobbying.

Environmental Security
“Includes three elements:
1) sustainable use of renewable and non-renewable resources;
2) the protection of the elements (air, water, earth) in order to prevent pollution destroying natural regeneration;
3) the maximum reduction of dangers linked to industrial activities.”

Event Report
Written, detailed and in-depth account of an event directed to a line manager.



Facial Recognition
Software enabling the identification of an individual from a photo or 3D model created from several images of the person.

False Alarm
An alarm is deemed to be false when it has been inappropriately triggered.

In terms of Safety, the essential role of a fence or physical, peripheral protection is to prevent crossing in one sense or another. This protection can be of a different nature: reinforced grating, palisade, etc. It demarcates the property.

Fortified Cabinet
A fortified cabinet is a reinforced cabinet, in particular with regard to the door and its lock and closing mechanisms. Its resistance to forced entry varies depending on the model.


General Data Protection Regulation

Glass Break Detector
Sensor enabling the detection of a glass break. Several different technologies exist.


H0 B0
The training course and qualification H0 B0 that arises from it aims to bring Security-related skills to staff before completing tasks or non-electrical work in a place that is defined as dangerous.

Refers to a person presenting hearing impairments.

High-rise Building: This notion is defined by Article R122-2 of the French Construction and Housing Code: “a high-rise building constitutes any building section whose top floor slab level is 50 metres higher than the highest ground level that public utilities machinery and fire fighting equipment can use, for housing, and more than 28 metres higher for all other buildings.”

Hypervision is the centralisation of the monitoring tools for different applications. It enables the management of several applications from a single tool.


Influence is a method composed of a combination of actions that involve constructing a network of partners and experts, supporting and promoting influencers and investing in vector images, in the business’ interests.

Infrared Barrier
Detection barrier used either as exterior peripheral protection or as perimeter protection on the border of a building. An infrared transmitter (that is active) emits an infrared ray to a receptor.

Phenomenon that slows down and prevents chemical reactions that come from combustion.

The objective of these is to provide a reminder and information on what should be done.

Act of penetrating a non-authorised space.

Object containing ions, a radioactive material. Some smoke alarms use this system to detect smoke. They are completely banned in France, where only optical smoke detectors are authorised.

The Internet of Things is the interconnection between the Internet and objects, places and physical environments.


Jamming Device
Electronic device that enables, through the emission or reflection of electromagnetic signals, the disruption of means of detection or radio communication.



Loi de Programmation Militaire [Military Planning Law]

Integral or added element to a doorframe in which the lock bolt is engaged. The latch can be interlocked and therefore electric.

Lithium (battery)
Lithium is a chemical compound used to manufacture long-lasting batteries. The voltage dispensed is often double that of classic alkaline or carbon-zinc batteries. Lithium batteries are soldered to the detector. They ensure an operating life of 5 to 10 years depending on the model.

Lobbying is a regulated activity and a method that consists of influencing decision-makers (Laws, Regulations, Standards) so that the normative framework goes in the direction of the business’ interests.

Localised Alarm
Sound, light and/or discreet alarm that alerts a central security station or dedicated staff to intervene.

Lone Worker
In the absence of a regulatory definition of lone work, this is the evaluation of the risks that shall oblige the employer to permit the identification of situations of prolonged or intermittent, usual or unintended isolation and the associated risks. It then falls back to the employer to determine the measures that are appropriate for their prevention.


Malicious Acts
Risk of human origin, relating to wilful acts with the intention of harming a natural or legal person, an organisation or a property.

This is a mark guaranteeing compliance with a standard. For example, the NF 292 or EN 14604 standards are respectively characterised by a NF and CE logo.

Mechanical Protection
All the mechanical elements installed on equipment to reinforce the equipment and delay a possible intrusion.


NF 292
It has been the French certification of reference for smoke detectors since 1st May 2008. It conforms to the European standard EN 14604.


Essential Services Officer

Opacifying Smoke Generator
Device combined with an alarm system that enables the project of a dense smoke rendering intrusion almost impossible in a premises or a closed building.

Opening Detector
Sensor enabling the detection of an opening being opened.

Operator of Vital Importance


Plan de Prévention du Risque Inondation [Flood Risk Prevention Plan]

Patrol Control
Method of controlling the execution of a patrol and its correct implementation.

Exterior limit and edge of a building or an enclosed space.

Perimeter Detection
System combining different typologies of detectors to detect an intrusion in a defined area.

Peripheral Detection
System combining different typologies of detectors to detect an intrusion in the periphery of a defined area.

Peripheral Protection
All the structural elements installed at the periphery of a site to reinforce and delay a possible intrusion.

Exterior limit and edge of a property or a place.

Product of electrons under the influence of light.

Physical Protection
All the structural elements installed at a site to reinforce and delay a possible intrusion.

Prevention Plan
A prevention plan is an evaluation of the risks carried out when an external company must intervene in a company. This document is initiated by the user company and carried out together with the external company.

Private Security
Private Security brings together Suppliers and Providers of Technological Solutions or Human Surveillance.

Person with Reduced Mobility: a person affected by a physical handicap.

All the specific guidance on the method of applying or implementing an instruction.

Successive actions and operations to manufacture something.

Method to execute a task.

Protection of Information Assets
Methods of protecting sensitive information in all its aspects: the information itself, the processes and systems that handle it – logic modelled on quality management and based on risk management (impact, occurrence probability, criticality).

Protected Zone



Process according to which people adopt an extreme belief system – including the willingness to use, encourage or facilitate violence – in order to implement an ideology, a political project or a cause as a method of social change.

Principles of installation of railings. The space between the railings must be no more than 11 cm. The railings must be correctly sealed at the top and bottom of the wall.

Remote Monitoring Centre
Remote Monitoring Establishment equipped to receive alarms (see Remote Monitoring). Remote Monitoring establishments are equipped and protected according to the P1 to P5 standards, which determine the levels of authorisation. The higher the level, the more important the means (technical, human, organisational) are.

Remote Surveillance
Remote Surveillance is the concept of directing the elements of alarm detection (intrusion, fire, technical) through an external connection (fibre, ADSL, radio, 4G) to a remote centre (Centre of Remote Surveillance) enabling the collection of information, qualifying and processing it and, finally, applying specific preestablished instructions.

Remote Video Surveillance
Remote Video Surveillance is a type of remote surveillance that combines the transmission, after an alarm, of images and/or enables the implementation of a remote procedure of removal of doubt by video.

Removal of Doubt
Regulatory procedure to confirm the appropriateness of the alarm. The removal of doubt can be carried out remotely (listening to audio, visual through video, technical through alarms on successive sensors) or through human presence dispatched to the scene.

Capacity of an organisation (business, State, etc.) to overcome damage to its environment (crisis, attack, economic shock, etc.).

Radio-frequency identification, most often designated by the acronym RFID, is a method for storing and retrieving data remotely by using markers called “radio-tags” (“RFID tag” or “RFID transponder”).

Rising Barrier
Rigid barrier that rises (manually or motorised) on a vertical axis at one end.

Risk Analysis
Identifying and evaluating potential dangers of any nature that can threaten property, values and people.

Return on Investment


Semi-automatic Defibrillator

Piece of metal furniture, reinforced by a specific plating and whose opening is equipped with Safety locks and/or combination opening devices. It is used to store valuable objects and/or documents. The resistance to forced entry varies depending on the nature and quality of the product. It is fixed to the ground and the wall.

Safety is all of the human, organisational and technical means combined to deal with spontaneous or deliberate acts whose aim is to harm or jeopardise for psychological and/or financial gain.

Safety at Work
Multidisciplinary approach that aims to eliminate or reduce the risk of accidents likely to be produced when a professional activity is carried out.

Safety Ink
Specific ink that prevents the reproduction or forgery of a document. It also enables the authenticity of a document to be verified.

An IT product’s potential to deal with a strong demand while maintaining its performance.

Security is all of the human, organisational and technical means combined to deal with technical, physical, chemical and environmental risks that could damage people or property without a profit goal.

Security Checkpoint
Walk-through Metal-detector

Security Officer
The task of the security officer within companies is to set the rules and security instructions to be put into action, relating to people, information and supports protected by a specific classification (Articles R 2311-2 and R 2311-3 of the French Defence Code define three levels of classification: Très Secret Défense [Top Secret], Secret Défense [Secret], Confidentiel Défense [Confidential]). They are responsible for ensuring the proper implementation of these rules and instructions.

A system that gives an alert if a wilful or inadvertent action is such that it will corrupt the proper functioning of a system and/or a device.

Selective General Alarm

Shock Detector
Sensor enabling the detection of shocks or vibrations on walls. Several different technologies exist.

“Term used mainly in retail to qualify the sources of financial losses for a shop or warehouse. There are 3 types:
*known loss: product that has become unsaleable and is retired from sales (broken, expired, etc.);
*unknown loss: product not recovered during the cross-checking of the book inventory and the physical inventory;
*financial: money not recovered during the cross-checking of the book inventory of funds present in a shop with the funds actually counted.”

Act of marking different dangers, such as obstacles or objects likely to cause an accident, by making them visible, thanks to barriers, cones or with road markings.

Simplified Standard 42 CNIL
The simplified standard 42 issued by the CNIL defines the processing linked to the management of the access control on workplaces in France.

This is a sound signal that enables the warning of an imminent danger.

Sliding Fence
Rigid barrier that slides (manually or motorised) on a rail.

Sprinkler system (enabling an incipient fire to be extinguished and contained). Sprinkler is the American brand that has “given” its name to this type of system.

Safety Power Supply

Plan Particulier de Mise en Sûreté [Specific Safety Measures Plan]

Signal Unit


Ticket of Attendance
Paper document proving the attendance of someone when the alarm was activated, which includes a certain amount of specific information indicating the conditions and the results of the attendance.

Measures an element’s capacity to produce adverse and negative effects on health.

Enables the recovery of the history of actions and operations in a procedure.

Traceability Tool
IT tool that allows someone to follow the traceability of events or malfunctions (Technical, Fire Safety, Accidentology, Safety) revealed by the Human Surveillance staff and to ensure a better understanding of the development of the criticality of the sites.


Unité d’Aide à l’Exploitation [Operating Support Unit]: Computing unit that enables, through the display of completed plans, support to the operation of alarms, anomalies, etc.

Unité de Commande Manuelle Centralisée [Centralised Manual Control Unit]

Unité de Gestion d’Alarme [Alarm Management Unit]

Unité de Gestion Centralisée des Issues de Secours [Centralised Management Unit of Emergency Exits]

Unit of Exit Width
“Each clearing must have a minimum exit width proportionate to the total number of persons called to take it.
This width must be calculated according to a width type (called “unit of exit width”) of 0.60 metres.
Nevertheless, when a clearing only includes one or two units of exit width, the width must be, respectively, from 0.60 metres to 0.90 metres and from 1.20 metres to 1.40 metres. (French Fire Safety Regulation – Article CO 36)”


Video Protection
Video Protection is Video Surveillance applied to any public space (Public Road, Public Building). Cameras must not be pointed at private areas. Systems for masking private areas must be integrated. The images must only be recorded for a limited time. A Video Protection system complies with technical regulations and standards. A complete file must be dropped at the Prefecture for validation before use or during modifications.

Video Surveillance
Video Surveillance is a system, composed of a combination of equipment (camera(s), connection network, recorder(s), screen(s), image processing software, etc.), installed in places that are not open to the public. The Video Surveillance System must not monitor workspaces and must be presented for validation to staff representatives. In the event of recording digital files, a declaration to the CNIL is obligatory.

Qualified Security Guard who is authorised to monitor Video Protection screens.

Alarm device on 3 levels in the face of the terrorist threat (Vigilance/Enhanced Security – Risk of Attack/Emergency Attack).

Volumetric Detector
Sensor enabling the detection of movement within a given volume. Several different technologies exist: Passive infrared, high frequencies, ultrasounds and blended solutions.


This is the act of preventing emergencies, that is outwardly “alerting”.

Weak Signals

Wire Mesh
Metal equipment enabling the fencing of a space. A wire mesh is made of metal yarn in varying thicknesses, meshes, welded or not.




Zone de Diffusion d’Alarme [Alarm Broadcast Zone]

Zone de Compartimentage [Partitioning Zone]

Zone de Détection [Detection Zone]

Zone de Désenfumage [Smoke Extraction Zone]

Zone Réservée [Reserved Area]

Zone à Régime Restrictif [Restricted Zone]

Zone de Mise en Sécurité [Safety Zone]