When you’re responsible for a commercial site, be it a retail park, logistics hub, office complex, or public building, alarm monitoring is often the backbone of your security strategy. But when responsibility for that monitoring changes hands, whether it’s due to switching monitoring providers, changing site managers, or transferring control between departments, the continuity of your protection depends on one key thing: a thorough and up-to-date alarm monitoring handover document.
This guide breaks down exactly what to include in an alarm monitoring handover document to ensure seamless, compliant, and proactive alarm monitoring.
- Why an Alarm Monitoring Handover Document Matters
- What to Include in an Alarm Monitoring Handover Document
- A Strong Handover Protects Everyone
- Partner with RMS for Seamless Alarm Monitoring
Why an Alarm Monitoring Handover Document Matters
Too often, security monitoring providers receive minimal handover information, just a zone map, a couple of contacts, and a brief note about the alarm panel. That simply isn’t enough in today’s risk landscape. A weak handover increases false alarms, delays emergency response, and puts property and people at unnecessary risk.
According to the latest UK Government’s Cyber Security Breaches Survey, 43% of businesses and 30% of charities have reported experiencing a cyber security breach or attack in the last 12 months. Many of these began with simple oversights, such as misconfigured systems, incorrect user permissions, or outdated access protocols.
While this stat focuses on cyber security, the message applies across all forms of monitoring: when the handover is incomplete, the risk increases.
Alarm systems, whether intrusion detection, fire panels, or integrated with CCTV, are only as effective as the people and processes behind them. A good handover ensures operators have what they need to respond decisively.
What to Include in an Alarm Monitoring Handover Document
1. Site Details and Emergency Contact Structure
Start with the basics, clearly and in one place. Include:
- Full site name and postal address
- Site type and business function (e.g. data centre, retail, distribution)
- Primary site manager’s contact details
- Keyholder list with contact order, shift notes, and availability
- Escalation procedures: who gets contacted, in what order, and under what conditions
This helps monitoring operators act quickly, especially out of hours. If a zone is triggered at 3am, they should know exactly who to call, and in what order, without needing to double-check with the client.
2. Alarm System Specification
Your monitoring provider must understand how the system is configured to interpret events accurately. Include:
- Alarm panel make/model (e.g. Orisec, Texecom, Honeywell)
- Monitoring method (e.g. IP/GPRS, dual-path, single-path)
- Integrated systems: fire, access control, intruder, CCTV
- Signalling paths and back-up communication methods
- Any recent maintenance work, faults, or known issues
Without this information, an operator might receive a signal but lack the context to respond appropriately. For example, if a zone frequently triggers during windy weather, that needs noting.

3. Zoning Breakdown & Zone Map
Zones are at the heart of monitoring. They show operators where and why a signal is occurring. Your handover document should include:
- A clear, legible zone map
- A full list of zones with plain-English names (e.g. “Zone 5 – Staff Entrance Left Door”)
- Key zones to prioritise in escalation
- Details of any areas prone to false alarms
- Whether multiple zones trigger together to confirm an alarm
Operators don’t have time to guess whether “Zone 09” is a front door, warehouse roller shutter, or internal hallway. Clarity here reduces both response time and false positives.
4. Arming & Disarming Schedules
If the site uses automatic arming schedules or relies on staff to manually set/unset alarms, this must be included. Make sure to include:
- Normal business hours
- Typical alarm set/unset times
- Staff authorised to arm/disarm the system
- Known exceptions (e.g. early starts on Mondays, extended hours in December)
If an alarm activates at 7.30am but the system is usually disarmed at 8am, is that cause for concern, or just early staff? Your monitoring partner needs the context.
5. Site Access Instructions
If a responder, keyholder, or engineer needs site access during an activation, they need to know exactly how to get in, and what to expect. Therefore you should include:
- How to access the site (gate codes, key safes, door locks)
- Emergency access points
- Site hazards (e.g. dogs, low lighting, construction)
- Maps or annotated photos of entrances if needed
This section should be updated regularly. Nothing slows down a response like a missing gate code or a changed key safe combination.

6. Visual Verification Details
If your system includes CCTV or is set up for video verification, these details are essential. Therefore it’s important to include:
- List of monitored cameras and their field of view
- Whether any zones are linked to visual triggers
- Operator instructions for accessing live footage or reviewing clips
- Any camera blind spots
More UK sites are using video verification as police response policies tighten. If your monitoring provider can confirm activity visually, response is faster and more accurate.
7. Alarm History & Known Patterns
Provide recent context for the monitoring team. It helps them differentiate between business-as-usual and something truly suspicious. Include:
- The past 3–6 months of relevant alarm activity
- Frequent causes of false alarms
- Temporary changes to the system or site
- Any ongoing investigations or engineering work
An operator who knows “Zone 11” has triggered every Tuesday for a month during stormy weather will know to verify before escalating.
8. Police URNs & Private Response Info
If the system is police-registered, or if you have private keyholding or mobile response, this section is critical. You should include:
- Police URN (Unique Reference Number)
- Force area and response grade (e.g. Level 1)
- Details of private responders and SLAs
- Contact methods for responders (24/7 if applicable)
If a confirmed alarm triggers, your monitoring partner needs to act immediately, and in full compliance with regulations like BS 8243.

9. User Access & Permissions
List everyone who is authorised to interact with the system, and what they can do. Include:
- Staff authorised to arm/disarm or silence alarms
- Levels of access (e.g. full admin, limited zones)
- Temporary codes or contractor access
- Process for changing access permissions
Clear access records help prevent false alarms and reduce the chance of internal breaches or misuse.
10. Handover Sign-Off & Review Schedule
Once your alarm monitoring handover document is complete, it’s vital to formally sign it off and set a plan for regular reviews. Without this final step, even the most detailed document risks becoming outdated or overlooked over time. Make sure to include:
- Handover completion date – the day the document was finalised and shared with the monitoring provider.
- Names and roles of the individuals involved – both the person handing over and the one receiving the information.
- Formal approval or sign-off – to confirm that both parties agree on the contents and responsibilities.
- Next review date – typically every 6 to 12 months, or whenever a major change occurs (e.g. system upgrades, new zones added, personnel changes).
Setting a review schedule ensures that the handover document remains a living record. Alarm systems, contact details, and site access protocols often evolve, and if the document doesn’t reflect those changes, it loses its value.
By keeping the document current and routinely revisiting it with your monitoring partner, you reduce the risk of confusion or miscommunication down the line.

A Strong Handover Protects Everyone
A well-prepared alarm monitoring handover document is more than a formality, it’s a safeguard. It ensures your monitoring provider, whether internal or external, has everything needed to:
- Interpret signals correctly
- Act quickly in a real emergency
- Minimise false alarms
- Meet insurance, compliance, and service-level expectations
Partner with RMS for Seamless Alarm Monitoring
At Remote Monitoring Services (RMS), we work closely with installers, facilities teams, and end clients to ensure smooth transitions and secure operations. Whether you’re onboarding a new site or switching providers, we guide you through every step of the handover process.
Call us on 0330 002 1149 for a free quote.











