Understanding Carbon Monoxide Laws Codes and Standards

Understanding Carbon Monoxide Laws Codes and Standards

Choosing the right products to effectively serve the needs of the client

It’s known as the “silent killer,” a poisonous, colorless, odorless, tasteless gas that moves through the air and when breathed, it displaces oxygen in the blood and deprives the heart, brain and other vital organs of oxygen, ultimately causing the loss of consciousness and suffocation. In the United States alone, this invisible intruder, carbon monoxide (CO), is responsible for sending thousands of people to the emergency room each year with CO poisoning, some resulting in death.

Due to this serious public health concern, many state legislatures have begun and continue to adopt various laws that mandate the use of carbon monoxide detectors in addition to fire codes and standards. Therefore, security dealers and integrators dealing with fire, smoke and CO in the United States must know each state’s laws regarding CO as well as the National Fire Protection Association’s (NFPA) and UL codes and standards to be able to choose the best products on the market that adhere to all requirements and ensure overall compliance.

As of January 2015, there are 29 states that have laws regarding carbon monoxide detectors in various commercial and residential situations. For example, Illinois requires a CO detector within 15 feet of every sleeping room, while Massachusetts and Minnesota require them within 10 feet. States such as Delaware, Maryland and Virginia have laws prohibiting the tampering of detectors installed by landlords whereas Tennessee requires CO detectors in rented or leased recreational vehicles. Even more, Texas requires a CO detector in day care centers; Montana requires them in rental units; and Wisconsin requires them in public buildings in which people sleep.

With such variance between each state’s CO laws, it is the dealer’s responsibility to be knowledgeable so that customers get properly educated not only regarding carbon monoxide and poisoning, smoke and fire safety but as to what products will efficiently and effectively serve their needs.

Taking a Look at NFPA

Fire codes and standards have a deep-rooted history, beginning in 1896 when a small group of concerned professionals met in Boston to address the nine different standards for piping size and sprinkler spacing of fire sprinkler systems. Working together, this group created a standard for the uniform installation of sprinkler systems. Thus, the National Fire Protection Association, an advocate of fire prevention and public safety, was established, and since then develops, publishes and distributes more than 300 codes and standards intended to minimize the possibility and effects of fire and other risks.

These standards and codes are created with the help of more than 250 technical committees, totaling approximately 8,000 volunteers who participate in the NFPA’s standards development process, a “full, open, consensusbased process,” meaning that anyone can participate, and will be treated fairly and equally. In fact, public participation is encouraged, and all standards are revised and updated every three to five years. Issuance or revision of an NFPA standard is a process containing the following four basic steps:

Step 1: Input Stage

Public input is considered before the writing of the first draft of the new standard or standard revision; after which, the text of the standard is put onto a ballot for approval by the committee. Once approved, the first draft is posted on the NFPA website.

Step 2: Comment Stage

Once the first draft is posted, it is open for public comment in which all comments are reviewed and taken into consideration. A second draft is created and put onto a ballot for committee approval. Once approved, the second draft is posted on the NFPA website. If no comments are made, the standard is sent directly to be issued.

Step 3: NFPA Technical Meeting

Anyone who is not satisfied with the second draft can submit a “Notice of Intent to Make a Motion” (NITMAM), indicating an attempt to change the second draft of the standard. This second draft is taken to the NFPA Conference and Expo each June for further debate, discussion and consideration. A majority vote is taken for all changes to be approved. Standards with no NITMAM move directly to the final step for approval and issuance.

Step 4: Council App eals and Issuance of Standard

All appeals must be heard before the final issuance of a standard. After all appeals have been decided and the council deems the standard to be aligned with NFPA beliefs, the standard is issued.

Dealers who have a basic understanding of the NFPA, their standards and codes as well as how they are developed and revised can volunteer their knowledge gained from hands-on, field experience to enhance and improve these codes and standards. This is an additional way for dealers to position themselves ahead of their competition.

The Importance of UL Certification

In addition to NFPA, as a way for manufacturers to set the safety of their products apart from their competitors’, Underwriters Laboratory (UL), an independent, not-for-profit, nongovernmental compliance-testing laboratory, has been analyzing field data and conducting live experiments with products from various manufacturers for over a century. Specific to fire safety, UL’s goals are to help prevent fires, injury and loss of life as well as minimize property damage, all of which can be done with UL-certified, fire-specific safety products.

Their testing process is rigorous for those who seek to have their products marked with the official UL-listed logo, the Mark; however, some municipalities have laws, codes or regulations that require a product to be tested by a nationallyrecognized testing laboratory before it can be sold in their jurisdiction. The following steps outline the submittal process:

Step 1: Request Quote Form

Because product manufacturers are responsible for all fees incurred with the UL certification, this form will act as a guide identifying the specific information needed for a quote.

Step 2: Quote for Services

A UL associate will send the product manufacturer a quote for services that includes project pricing based on standard assumptions. Step 3: Confirmation Once the manufacturer accepts the quote, an UL engineer will be in contact to confirm needs, discuss the scope of the project and review other important details which could include test planning, sample requirements and production dates.

Step 4: Product Evaluation

Once UL receives the product manufacturer’s signed application forms, agreements, preliminary deposit, required testing samples and technical information, UL engineering staff begins the actual investigation of the product.

Step 5: Meeting UL Requirements

After a thorough testing procedure, UL will inform the product manufacturer if their product complies with UL’s requirements by developing a formal report, the Follow-up Procedure document. This document describes the construction of the product and will serve as the guide when conducing periodic examinations of UL-certified products in the manufacturer’s facility.

A Viable Manufacturer

Perhaps most valuable is the component of education in building a trusted partnership between dealers and manufacturers. As dealers receive training on products directly from the manufacturer, they are better equipped to educate the end-user and provide exactly what customers want and need.

Wading through laws, codes and standards can be a timeconsuming process for dealers; however, it can prove to be extremely valuable. The more dealers know and understand, the better equipped they are in their chosen verticals. A knowledgeable dealer who is willing to take the time to educate their customers not only demonstrates competence but a willingness to go above and beyond for their clients.

This article originally appeared in the April 2015 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities