RDI

RDI workflow

Perimeter & Boundary Security Monitoring (Ongoing)

the evidence system cameras on site hoardings, perimeter fencing, and boundary structures provide continuous passive monitoring — replacing traditional manned guarding or standalone CCTV.

Category
Security, Theft & Access Control
Frequency
Common
Confidence
Medium
Evidence records
10
Cost model
Qualitative

Trigger, activity, conclusion

01 · Trigger

Site mobilisation and establishment of site compound/perimeter hoarding — at which point planning conditions/site security plan/contractor procedures require perimeter monitoring.

02 · Activity

Continuous passive monitoring of site boundary — recording all perimeter movement, detecting/logging breach attempts, verifying hoarding integrity.

03 · Conclusion

Site reaches practical completion and demobilisation. Perimeter cameras recovered. Full archive retained per post-project period. Monitoring obligation formally discharged.

Workflow steps

  1. Step 01

    Site security plan specifies perimeter monitoring requirement.

    Inferred
  2. Step 02

    the evidence system cameras installed on hoardings/fencing/structures for overlapping boundary coverage.

    Evidenced
  3. Step 03

    the evidence system platform configured — cloud recording, motion detection alerts, access permissions assigned.

    Evidenced
  4. Step 04

    During working hours, perimeter feeds available for passive monitoring.

    Evidenced
  5. Step 05

    After working hours, motion-triggered alerts notify designated personnel.

    Evidenced
  6. Step 06

    Daily/weekly perimeter recording review conducted to confirm hoarding integrity.

    Inferred
  7. Step 07

    Any perimeter incident documented — clips exported and filed.

    Inferred
  8. Step 08

    Periodic perimeter audits supported by camera evidence.

    Inferred
  9. Step 09

    At practical completion, cameras recovered and archive retained per retention policy.

    Evidenced

Evidence records

The site had a specific planning condition requiring continuous perimeter CCTV coverage throughout the construction period. the evidence system cameras on the hoarding were the primary compliance mechanism, with the PM able to demonstrate to the planning authority that coverage was maintained through the cloud recording archive.
Anonymized evidence record 33.1
CDM Regulations (UK) and equivalent frameworks in other jurisdictions require that construction site boundaries are secured and monitored — creating a baseline legal obligation that drives perimeter monitoring as a standard workflow on every project above a minimum size threshold.
Anonymized evidence record 33.2
Insurance requirements for contractors' all-risk (CAR) and public liability policies typically mandate perimeter security measures. the evidence system's cloud-archived perimeter monitoring provides documentary evidence of compliance that can support insurance renewals and claims.
Anonymized evidence record 33.3

ROI model

Template C

security theft

Evercam prevents security incidents or reduces their cost through deterrence, faster investigation, and evidence for insurance/police. The baseline is incident frequency × cost per incident.

Formula

saving = (incidents_prevented_pct × incidents_per_year × avg_incident_cost) + (investigation_time_saved_hours × hourly_rate × incidents_investigated_per_year)