Disabled Refuge

Disabled refuge areas allow wheelchair-users and people with impaired mobility to await fire & rescue services in relative safety before being assisted in phased emergency evacuations.

Fire-safe communication systems are vital in these refuge locations, which can be a compartment, lobby, corridor or recess in a stairwell. London Fire & Security works to BS 5839 and the Equality Act (formerly DDA) in designing emergency voice communication (EVC) systems for disabled refuge areas.

UK regulations mandate that all new buildings of more than one storey with lift access provide disabled refuge areas. We specify, commission and maintain EVC for clients. Our designs allow disabled staff and visitors to summon help while enabling rescue workers to communicate with each other and reassure those awaiting assistance.

London Fire & Security understands the importance of vulnerable occupants having clear full duplex audio communication with first responders via fixed devices.

Good design of EVC in disabled refuge areas far exceeds normal intercom and communication systems should:
Avoid moving parts
Have oversize push buttons
Ideally be flush-mounted.

Disabled refuge areas must meet the criteria of BS999:2008 and London Fire & Security will work with clients to ensure our EVC solution meets your overall safety needs.

A compliant EVC system should in no way rely on a mobile signal or two-way radio. Good design elements include:
Photo luminescent front panels
Braille identification
Tactile text
Hearing aid setting

We have extensive knoweledge and experience of the following sectors:

Worried about your security? Get a free survey from one of experts

Contact us

With London Fire & Security’s Security Solutions You Can:

  • Qualify and quantify actual threats
  • Protect your assets, information and brand reputation
  • Ensure IT compliance with security, legal and other standards
  • Create a security infrastructure with the right security policies, processes, architecture and expertise in place
  • Clearly and accurately report risk status and return on security investments back to the business
  • Reduce the cost and complexity of managing multiple security vendors and support contracts. We will be your single point of contact and accountability
  • Make informed decisions about immediate priorities and strategic business plans to improve security
  • Implement effective cloud security and mobile security
  • Replace capex with opex through our outsourced and managed security services
  • Gain access to and leverage otherwise scarce and expensive security specialists
  • Engage security professionals that are recognised for their depth of expertise and passionate client delivery − our globally connected teams will deliver the best solutions to your security needs, anywhere in the world

Our security teams can assist you to realise your security objectives through the following services:

  • Technology Lifecycle Management Assessment: This engagement will give you complete understanding of, and visibility into, the security health of your networking environment.
  • Managed Security Services: Leave it to us to provide end-to-end operational management of your IT and security assets.
  • Our Security Architecture Assessment is a flexible engagement through which we undertake a detailed assessment of your security architecture, from policies to technical controls.
  • Uptime: We provide proactive, multi-vendor support and maintenance services to help you maximise the availability of your IT estate while optimising your total IT support spend.
  • ​Security has multiple touch-points across your business. Let us help you ensure that all your security needs are met, including
  • Infrastructure security: As new security threats continue to arise and evolve, a robust security posture is critical to protect your business, your assets and your reputation.
  • Secure mobile access: Accelerate the productivity of your workforce and embrace innovation… while protecting sensitive data.
  • Data leakage prevention: We assist you to protect the data that matters wherever it is in the organisation – at rest or on the move.