Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Stop Nuisance Alarms!

By Joel Jensen
April 1, 2010

Access control systems, burglar alarm systems, fire alarm systems, electronic integrated security systems, video based alarm systems – add the word alarm to just about any system and you will get complaints of “false alarms.” To be clear, an actual false alarm is very rare. What we typically face are nuisance alarms. The alarm system detects motions or someone triggers a pull station in a fire alarm system – the system is doing its job and reporting a genuine alarm. 
 
Nuisance alarms are typically caused by people, animals, insects, moving objects, improper hardware selection, placement, adjustment or application. This article will focus on hardware selection and application and for purists, adjustment.

I would be remiss in a discussion regarding hardware selection and nuisance alarms without addressing the long-lived passive infrared motion detector, or PIR. They have been a burglar alarm staple for decades, a device to sense occupancy to trigger HVAC systems and lighting and they see regular duty as a request to exit device in access control systems. When deployed in a burglar alarm and/or access control environment, they can be the source of many nuisance alarms.

As with many sources of nuisance alarms, it isn’t the actual PIR that is the culprit. In access control applications, the sensor may not be aimed properly or perhaps the reaction/sense time isn’t quite right. There is a human factor that can’t be ignored as well. “The lingering goodbye alarm” is a classic example. Someone is leaving a room or building, and stops at the door to carry on an extended conversation, perhaps some last minute instructions or a “lingering goodbye” to a colleague. The motion sensing request to exit or REX device is no longer sensing motion as this chatty person is lingering beneath it. The conversation ends, the door is opened, the magnetic contact switch senses the door opening prior to the REX sensing motion and a door forced alarm is generated. The motion sensing REX as doing its job as best it can.

With existing installations, once the aiming and timing have been checked, the only practical no-cost solution is training users not to linger while leaving an area. My best practices call for a sounder, appropriate for the application, and they are typically placed directly above the spot where the “lingering goodbye” takes place. In the case of a very loud piezoelectric sounder, the sounder itself may be the training medium.

My choice for most new installations (existing applications as well) is to deploy a REX switch that is integral to the door hardware, typically in the form of an electrically operated lever-set or retractable panic device. Since this type of installation requires an electric transfer hinge or similar device to connect to the lever-set, it’s most practical to add the additional hardware and wiring to accommodate more than a simple REX switch. It may also be time to consider a latch bolt monitor as well, to catch cases of duct taped latches and other workarounds.

I’ve introduced yet another source for a nuisance alarm, as if the timing isn’t adjusted properly, the latch bolt monitor can become a frequent source of alarms. The “lingering goodbye” can come into play in this installation as well, for example, if the converser holds the lever down for an extended period of time, and then opens the door, there’s another nuisance alarm.

Regarding existing installations, windows are a potential weakness in many access control and even some burglar alarm applications. Window alarms employ a simple electric circuit. Break the window, which breaks the wire, which breaks the circuit and an alarm activates. The industry has advanced to include sensors placed on the windows to the now commonplace glass breakage sensor placed inside a secure area. The device responds to the compression of air caused by a breaking window, along with a sensing of the actual frequency of the sound of breaking glass. Often, a PIR motion detector will be placed in the secure area to detect intruders that enter via a window or hide in an area until after hours. 
Not all access control systems are deployed with burglar alarm type features, unfortunately. They’re often thought of as an enhanced lock with an audit trail. 

Are you experiencing an increase in crime at your facilities? First, take note of your existing resources. You may find that you already have devices in your system that can be “assigned” multiple tasks. It may be a matter of a software purchase or adding additional licenses. This is where I often consider seeking additional resources to review existing systems. I may utilize internal staff, security consultants, or a security integrator. Frontline security officers and system monitors often provide fresh ideas for utilizing existing resources, changes in procedures and suggestions for future purchases, if they are asked. They are also a great source to learn of nuisance alarms that are not being reported, or minor changes and improvements in physical security that have fallen off of your radar.

Be sure to assess all of your existing tools on a regular basis. Chart the number of nuisance alarms that officers are responding to. Replacing a few traditional PIR motion sensors with an IP video solution may pay for themselves by an increase in resources that results when nuisance alarms are reduced. If your nuisance alarms are an extensive diversion to your core mission, you might consider a more formal ROI study. You might be surprised that you can still do more with what you have, and hopefully, before you are forced to do so.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Video Verification: Use it Wisely!

    See More
  • Sensors Help Utility Substations Defeat Nuisance Alarms

    See More
  • Avoiding Nuisance Alarms with Automatic Threat Assessment

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Database Hacker's Handboo

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing