Windstorm Solutions for Hurricanes and Tornadoes

Various codes apply when preparing for the forces of nature

Adverts Every year, the country braces for Mother Nature and the havoc she unleashes with major windstorms. At one time, only coastal states like Florida seemed to be affected. In recent years, however, the destruction has veered beyond Florida, requiring many states to seek shelter from the storm. Consider this:

  • From 2010-2012, there were more than 3,900 tornadoes, resulting in 667 deaths in the United States.
  • Between 2010 and 2011, 31 hurricanes or tropical storms caused more than 387 deaths and more than $33 billion in damages.
  • Nearly every state is at risk for tornadoes or hurricanes.

It All Starts with Code

When it comes to windstorm solutions, it’s all code-driven as door, lock and hardware chosen for an opening are determined by hurricane or tornado codes. The challenge comes with knowing which codes apply.

“Windstorm solutions can be tricky because codes can vary by state, and even county,” said Lori Greene, manager of codes and resources at Allegion. “With hurricanes, for example, the old Southern Building Code (SBC) was the first code to include hurricane-resistance requirements in building construction design, and Miami-Dade County was the first state entity to enforce compliance of this code. However, these requirements and testing protocols to address the state of Florida have since been incorporated into the Florida Building Code.”

Additional requirements may apply to certain types of buildings for enhanced hurricane protection.

“Schools and hospitals, for example, may have additional hurricane code requirements in certain regions,” said Steven King, a specification writer with Allegion.

While most buildings in coastal states are subject to windstorm codes for hurricane protection, it’s a different story in tornado regions, namely the center of the United States.

“The current national codes are not specific about which facilities are required to have storm shelters,” Greene said.

Changes have been approved for the 2015 edition of the International Building Code that will require storm shelters in educational occupancies and emergency operations facilities in certain parts of the country. Green said that these new requirements will be adopted on a state-by-state basis, so it’s important to check with your state to know what is required. However, regardless of whether your state adopts them, Green advocates compliance with the new requirements because they reflect best practices nationwide.

The main codes and standards that apply to windstorm solutions are shown in Table 1.

Types of Buildings and Applications

In hurricane regions, many types of buildings are required to have windstorm solutions, including—but not limited to—schools, healthcare facilities, commercial buildings, retail locations and community storm shelters.

In tornado regions, typically schools and community shelters are subject to windstorm shelter requirements. Shelters, however, may be built in a variety of buildings.

According to Casey Cohorst, CSI, CDT, LEED GA, a specification consultant with Allegion, the type of application may also drive the final solution. “Like any other door solution, windstorm solutions have unique requirements based on the application,” Cohorst said. “What is done for an exterior door may be different than a door for a classroom wing or gymnasium used as a shelter. What you need may vary by building, or even door by door.”

Integrating Access Control

Openings equipped with windstorm solutions can still have access control. However, because of the unique windstorm assembly, there are special considerations.

“We can definitely provide access control for a hurricane or tornado door, and there are a couple ways to do that,” King said. “Because an electric strike can’t be used on these openings, we generally recommend an electronic lock.”

Electrifying a Von Duprin panic device is another way to add access control to an opening.

Proven to Perform

The last consideration for choosing a windstorm solution is performance testing. Allegion simulates wind speed and potential projectile impact to measure how its products hold up—individually and as an assembly, which includes doors, frames, locks and hinges.

For hurricanes, Allegion products are tested to resist windborne debris impact loads and cyclic, static wind pressures as prescribed by the Florida Building Code. With tornadoes, these products are tested to the most stringent FEMA 361/FEMA 320/ICC 500 requirements, withstanding 250 mph sustained winds and 15-lb projectile impacts at 100 mph.

This article originally appeared in the September 2014 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3