Closing Out Surveillance Projects

Author: Brian Rhodes, Published on Apr 29, 2012

Closing out projects can be surprisingly difficult. For what seems to be simple process, gracefully concluding work and leaving a jobsite can prove challenging. Despite devoted efforts to bring work to an end, loose ends and lagging issues can stretch the end of a job for weeks. In this note, we address the process of successfully closing out installations.

Overview

The final phase of an installation project is often called 'Close Out'. Successfully managing this work phase will leave customers with a great impression and high degree of satisfaction with the install project. Observing the following steps will ensure that closeout is a positive experience for the integrator and customer alike:

  • Closeout Conference
  • Gross Error Checking
  • Motion Detection Optimization
  • Developing the Punchlist
  • Conducting Enduser Training
  • Obtaining Final Signatures

Closeout conference: The size and scope of the job dictate how formal this step is. For small jobs, it may be a quick phonecall to the owner letting them know that work is soon to wrap. For larger jobs, this may be a formal meeting with customers that outline the close out schedule and communicate dates and enduser involvement. This exchange should clearly identify the dates you intend to bring the system online and start recording, plan to hold enduser training, and the day you intend to leave the site. By having this conversation, no confusion or doubt remains with the customer of what comes next. When the integrator clearly defines these milestones to the customer, it goes a long way in avoiding the reputation of being 'shifty' or 'leaving in the dead of night'.

Gross Error Checking: Just like a proofreading process, make a point to step back and observe system operation as a whole. Confirm that all major elements of the system are operating and accomplishing their intended tasks. This step includes confirming the following operations:

  • Cameras stream video properly: Check that CODEC selection and framerates match specifications (e.g., a camera was not incorrectly set up for JPEG rather than H.264, causing storage inefficiency)
  • System devices remain online and are stable: Cameras and servers are not randomly 'dropping off' the network.
  • Networked storage locations are available: Confirm video is written and recalled properly when stored remotely.
  • Network Access is sufficient: Admin/security policies should be provisioned to avoid issues with VMSes.
  • Incorrect network/device settings are not impeding operation : Common examples include switches not optimized to flow video traffic, cameras improperly time/date synchronised, or DHCP unexpectedly reassigning IP addresses.

Performing this check early in project closeout prevents nasty surprises at the last minute. When major errors are found, they still can be remedied before the turnover date.

Motion Detection Optimization: One of the core functions of surveillance is recording video when expected. As we discussed in our previous 'Optimizing Motion Detection' note, confirming that cameras are recording when expected is fundamental to system operation.  Our experience has shown that this is a multi-stage process, where initial optimization is set and followed up on a few days later. The passage of time will reveal excessive recording in cameras where final tweaks need to be made. Final camera positioning and focus should be a part of this process, 

Developing the Punchlist: This concept borrowed from the construction industry simply means to develop and address a 'to-do' list of loose ends. Example 'punchlist' items include:

  • Touch-up painting
  • Patching holes
  • Labeling equipment
  • Organizing and bundling cables
  • Tidying up work areas

In general, the punchlist is composed of many small details that are easily forgotten on their own. Developing a punchlist with the customer present may be prudent, as it allows the customer to point out small details of significant importance to be addressed. This walk through provides the opportunity for the customer to critique work or express concerns well in advance of formally ending the project. Sucessfully working the punchlist is evidence of the intergrator's attention to detail and indicates a high level of installation quality.

End User Training: See our previous 'Effective End User Training' post for complete overview on this topic. This step allows the customer a chance to learn their system so that the system's value and utility are obvious. Properly managing this step establishes 'customer satisfaction' and allows the integrator to demonstrate value or explain functions that the customer may not otherwise understand. The tone is set for repeat business opportunities, and good integrators are keenly aware of this.

Obtaining Final Signatures: While self-explanatory, this step is much more than simply ritual or symbolic in service industries. When the customer signs the final approvals document, it indicates a level of acceptance and satisfaction with the job. This signature also may contractually begin the warranty period for the installed equipment. This provides one last opportunity for the customer to address any unresolved issues, and allows the integrator the opportunity to end the job on a high note.

At some point, if completeness or acceptance is disputed, the integrator can produce the signature as proof that they left only when the job was finished. Keeping records of these signatures can disarm accusations or clear up confusion should future questions be raised.

Comments : PRO Members only. Login. or Join.

Related Reports

Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Measuring For Security Installation Guide on May 15, 2018
Accurate measurement is a fundamental skill, yet many installers do not know how to do it. Using these tools are a key skill needed for security...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
Access Control Levels and Schedules Tutorial on May 01, 2018
Configuring access levels and setting up schedules is central to maintaining facility security. Many people may need to enter areas but most do not...
Amazon Enters Home Security Services on Apr 26, 2018
Move over ADT? It is certainly what investors have feared for ADT, especially since Amazon acquired Ring. [Update: We spoke with Amazon and have...
Favorite Access Control Manufacturers 2018 on Apr 26, 2018
150+ Integrators told IPVM "What is your favorite access control management software/system? Why? Unlike the 2016 access favorites where a group...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
VMS New Developments Spring 2018 (Avigilon, Exacqvision, Genetec, Hikvision, Milestone, Network Optix) on Apr 04, 2018
What's new with VMS software? In this report, we examine new features and releases for Spring 2018 to track different areas of potential...
Forced Door Alarms For Access Control Tutorial on Apr 04, 2018
One of the most important access control alarms is also often ignored. "Forced Door" provides a vital and even critical notification against...

Most Recent Industry Reports

Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Top Benefits Of Attending Trade Shows (Statistics) on May 15, 2018
150 integrators told IPVM: What are the top benefits of going to trade shows? The clear top 2 responses in order: (1) Networking (2) New...
Measuring For Security Installation Guide on May 15, 2018
Accurate measurement is a fundamental skill, yet many installers do not know how to do it. Using these tools are a key skill needed for security...
Arecont Files Ch.11, Agrees To Sell To Turnaround Specialist on May 14, 2018
The long-anticipated sale of Arecont Vision is finally happening. After raising $80 million in debt in 2014, a failed sale in 2017 and the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact