The SCEC Product Evaluation Program is closed.
The SCEC product evaluation program is closed, and will remain closed for the remainder of the 2020-21 financial year. SCEC is not accepting product evaluation applications during this period.
SCEC will re-assess the priority categories in the first-half of 2021, and will communicate those priorities via this website when they are available.
Any queries can be sent to email@example.com
Product Evaluation Program
The evaluation of security products is based on category priorities. This allows for the allocation of resources to evaluate the highest priority products as dictated by Government.
Manufacturers or suppliers who believe their product falls within one of the product categories listed below should read the SCEC Product Evaluation Policy and Contact Us to discuss their proposed application once the program is re-opened. In some cases, pre-acceptance criteria (PAC) may be provided to assist applicants in determining whether they wish to proceed in submitting an application.
For further information, please read our FAQs Evaluation Program.
This includes keys and their associated cylinders (keying system) that are typically installed into SCEC approved locking devices such as mortice locks, rim locks, and pad locks for use in Security Zone 3, 4, and 5 applications. Keying systems may or may not include the locking device as an integrated component, such as some deadbolts, cam locks, and push locks.
Keying Systems – Class C
This includes keying systems used exclusively on Australian Government Class C applications.
This includes any mechanism designed to keep a door closed; such as a mortice lock (mechanical or electromechanical), rim lock, lockable bolt, or padlock. These devices may or may not include the keying system as an integrated component of the device.
This includes electromagnetic locking devices designed to secure doors or access-control portals in Security Zones 4 and 5. These products may be activated by a variety of methods such as a SCEC approved keying system, physical tokens (keys, RFID tokens, smart cards), PIN codes/combinations, biometrics or external, or access control system signals.
This includes devices that are designed to work in tandem with a locking device, typically a mortice lock, and allow the integration of electronic access control systems.
Security Microswitch Boxes (SMB)
This includes strike hardware that incorporates electronic monitoring of the locking devices condition.
This includes devices such as hasp & staples, panic bolts, and security chain.
Panic Exit Devices (PED)
This includes any mechanism designed to keep a door closed, where fire regulations demand the use of panic exit hardware. This is particularly common on high volume areas, such as auditoriums.
Electronic key cabinets
This includes cabinets used to store and manage keys. Cabinets considered for this category are required to be highly resistant to covert and forcible attacks on the cabinet or attacks against any data communications link interfacing to the cabinet.
Gunshot Detection System (GDS)
This includes systems that provide notification of a firearm discharge and facilitate a faster response to active shooter incidents. These systems can be deployed anywhere, but may be most effective at public entrances and first points of challenge. GDS may be integrated into other systems such as: Electronic Access Control System, public address systems, or SMS/email systems.
Type 1A Security Alarm System (SAS)
This includes SAS built to meet specific design requirements set out by SCEC.
Alarm system protective switches
This includes door switches and devices used for high security applications that interface to a Type 1 or Type 1A security alarm system. Traditionally, this has included devices such as balanced magnetic reed switches.
Indoor motion detectors
This includes volumetric detectors for use in high security applications that interface with a Type 1 or Type 1A security alarm system.
Special purpose detectors, such as those used for intrinsically safe applications, are included in this category.
This includes Class A, B, and C security containers for storing classified information.
Class A and Class B high security combination locks
This includes combination locks used on Australian Government security containers. Locks in this category must be highly resistant to covert and surreptitious opening techniques.
Class B and Class C 19” server racks
The Class B and Class C 19” rack security containers function in a similar manner to a conventional IT equipment rack, but are manufactured to an Australian Government specification. These products are used to store ICT equipment which processes classified information.
Pre-Constructed Door and Frame Systems (DAFS)
At the SL3 level, DAFS are pre-fabricated sets which form a Zone 5 perimeter door, compliant to the ASIO Technical Note 5/12 Zone 5 (Top Secret) Areas. Products within this category are factory fitted to reduce the number of trades at the door; therefore, DAFS will include locking and access-control devices, door hardware, intrusion detection devices, etc. Keying systems are typically not provided.
At the SL4 level, DAFS will meet all requirements for an SL3 DAFS, plus receive a forcible attack resistance rating.
Forcible Attack doors
This includes products to suit high threat environments. Products within this category must be highly resistant to covert and forcible attack.
Forcible Attack Glazing
This includes products used to provide a transparent barrier separating publicly accessible areas from internal secured areas. The glazing will provide resistance and delay to forcible attacks using a variety of hand and power tools in Security Zone 3, 4, and 5 applications.
Perimeter Intrusion Detection Systems (PIDS)
This includes all PIDS products for outdoor perimeter applications. Products within this category must meet specified false, nuisance, and detection rates through prescribed periods of in-situ “soak testing”.
Tamper evident seals
This includes various types of seals that provide a high level of tamper evidence.
Manufacturers or suppliers with security products that are not included in any of the above categories, please Contact Us to discuss potential evaluations.