1.1.6. Interaction with 3rd party security systems