RDI workflow
Perimeter & Boundary Security Monitoring (Ongoing)
the evidence system cameras on site hoardings, perimeter fencing, and boundary structures provide continuous passive monitoring — replacing traditional manned guarding or standalone CCTV.
- Category
- Security, Theft & Access Control
- Frequency
- Common
- Confidence
- Medium
- Evidence records
- 10
- Cost model
- Qualitative
Trigger, activity, conclusion
Site mobilisation and establishment of site compound/perimeter hoarding — at which point planning conditions/site security plan/contractor procedures require perimeter monitoring.
Continuous passive monitoring of site boundary — recording all perimeter movement, detecting/logging breach attempts, verifying hoarding integrity.
Site reaches practical completion and demobilisation. Perimeter cameras recovered. Full archive retained per post-project period. Monitoring obligation formally discharged.
Workflow steps
- Step 01
Site security plan specifies perimeter monitoring requirement.
Inferred - Step 02
the evidence system cameras installed on hoardings/fencing/structures for overlapping boundary coverage.
Evidenced - Step 03
the evidence system platform configured — cloud recording, motion detection alerts, access permissions assigned.
Evidenced - Step 04
During working hours, perimeter feeds available for passive monitoring.
Evidenced - Step 05
After working hours, motion-triggered alerts notify designated personnel.
Evidenced - Step 06
Daily/weekly perimeter recording review conducted to confirm hoarding integrity.
Inferred - Step 07
Any perimeter incident documented — clips exported and filed.
Inferred - Step 08
Periodic perimeter audits supported by camera evidence.
Inferred - Step 09
At practical completion, cameras recovered and archive retained per retention policy.
Evidenced
Evidence records
The site had a specific planning condition requiring continuous perimeter CCTV coverage throughout the construction period. the evidence system cameras on the hoarding were the primary compliance mechanism, with the PM able to demonstrate to the planning authority that coverage was maintained through the cloud recording archive.
CDM Regulations (UK) and equivalent frameworks in other jurisdictions require that construction site boundaries are secured and monitored — creating a baseline legal obligation that drives perimeter monitoring as a standard workflow on every project above a minimum size threshold.
Insurance requirements for contractors' all-risk (CAR) and public liability policies typically mandate perimeter security measures. the evidence system's cloud-archived perimeter monitoring provides documentary evidence of compliance that can support insurance renewals and claims.
ROI model
security theft
Evercam prevents security incidents or reduces their cost through deterrence, faster investigation, and evidence for insurance/police. The baseline is incident frequency × cost per incident.
saving = (incidents_prevented_pct × incidents_per_year × avg_incident_cost) + (investigation_time_saved_hours × hourly_rate × incidents_investigated_per_year)