{"id":599,"date":"2020-08-31T06:31:00","date_gmt":"2020-08-31T06:31:00","guid":{"rendered":"http:\/\/www.klsecurity.com\/blog\/?p=599"},"modified":"2020-08-26T15:58:42","modified_gmt":"2020-08-26T15:58:42","slug":"scif-container-series-part-3-perimeter-wall-construction-wall-a","status":"publish","type":"post","link":"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-3-perimeter-wall-construction-wall-a\/","title":{"rendered":"SCIF Container Series | Part 3: Perimeter Wall Construction &#8211; Wall A"},"content":{"rendered":"<h5>Wall A is suggested to be used for these Fixed Facility SCIFs: Closed Storage, Secure Working Area (SWA), Continuous Operation, or Open Storage with SID. The list below and accompanying diagram list all construction specifications for Wall A.<\/h5>\n\n\n<ul><li>Three layers of Gypsum Wall Board (GWB) \u215d inch-thick<ul><li>One layer on the uncontrolled side<\/li><li>Two layers on the controlled side<\/li><li>Acoustic protection: Sound Class 3<\/li><\/ul><\/li><li>Wallboard must be attached to 3 \u215d inch-wide 16 gauge metals studs or wooden 2&#215;4 studs placed no less than 16\u201d on center<\/li><li>16 gauge continuous track (top and bottom) with anchors at 32\u201d on center maximum in continuous bead of acoustical sealant<\/li><li>Interior two layers of wallboard must be mounted so seams do not align<\/li><li>Acoustic fill 3 \u00bd\u201d (89 mm) sound attenuation material, fastened to prevent sliding down and leaving void at the top<\/li><li>Top and bottom of each wall must be sealed with acoustic sealant where it meets the slab<\/li><li>Fire safe non-shrink grout or acoustic sealant in all voids above\/below track both sides of partition<\/li><li>Entire wall must be finished and painted from floor to ceiling<\/li><li>Any electrical or communications outlets required on the perimeter wall must be surface mounted<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA-1024x768.png\" alt=\"\" class=\"wp-image-619\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA-1024x768.png 1024w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA-300x225.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA-768x576.png 768w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA-1536x1152.png 1536w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA-1200x900.png 1200w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/KLSecurityWallA.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<br>\n<br>\n<p>Does your facility require a <a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/index.php\/products\/safes\/gsa-approved-safes.html?applications=40\" target=\"_blank\">SCIF<\/a>? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, &amp; mobile requirements. \u00a0We assist in the acquisition of modular facilities for DoD &amp; Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access <a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/index.php\/consulting\" target=\"_blank\">control planning and commercial business security<\/a>.<\/p>\n\n\n\n<p><br><p>Call 866-867-0306 or email <a href=\"mailto:contact@klsecurity.com\">contact@klsecurity.com<\/a> to see how the experts at KL Security can assist your facility in security needs.<\/p><\/p>\n\n\n\n<h6><a rel=\"noreferrer noopener\" href=\"https:\/\/www.dni.gov\/files\/NCSC\/documents\/Regulations\/Technical-Specifications-SCIF-Construction.pdf\" target=\"_blank\">Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities<\/a><\/h6>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-1-site-evaluation\/\" target=\"_blank\">SCIF Container Series | Part 1: Site Evaluation<\/a><\/h5>\n\n\n\n<h5><a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-2-design-planning-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">SCIF Container Series | Part 2: Design Planning Checklist<\/a><\/h5>\n\n\n\n<p><p>Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.<\/p><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"980\" height=\"557\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Initialisms-and-Anagrams-Chart-1.jpg\" alt=\"\" class=\"wp-image-610\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Initialisms-and-Anagrams-Chart-1.jpg 980w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Initialisms-and-Anagrams-Chart-1-300x171.jpg 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Initialisms-and-Anagrams-Chart-1-768x437.jpg 768w\" sizes=\"(max-width: 980px) 100vw, 980px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Wall A is suggested to be used for these Fixed Facility SCIFs: Closed Storage, Secure Working Area (SWA), Continuous Operation, or Open Storage with SID. The list below and accompanying diagram list all construction specifications for Wall A. Three layers of Gypsum Wall Board (GWB) \u215d inch-thick One layer on the uncontrolled side Two layers &hellip; <a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-3-perimeter-wall-construction-wall-a\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SCIF Container Series | Part 3: Perimeter Wall Construction &#8211; Wall A<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":596,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[242],"tags":[246,243,248,247,244,142,245],"_links":{"self":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/599"}],"collection":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=599"}],"version-history":[{"count":8,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/599\/revisions"}],"predecessor-version":[{"id":649,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/599\/revisions\/649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media\/596"}],"wp:attachment":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}