Reviews & Opinions
Independent and trusted. Read before buy DSC PC4020!

DSC PC4020

Manual

Preview of first few manual pages (at low quality). Check before download. Click to enlarge.
Manual - 1 page  Manual - 2 page  Manual - 3 page 

Download (English)
DSC PC4020, size: 2.6 MB
Related manuals
DSC PC4020CF
DSC PC4020 V3.3
DSC PC4020 Manual 2

Instruction: After click Download and complete offer, you will get access to list of direct links to websites where you can download this manual.

About

DSC PC4020About DSC PC4020
Here you can find all about DSC PC4020 like programming manual and other informations. For example: install manual, manual.

DSC PC4020 manual (user guide) is ready to download for free.

On the bottom of page users can write a review. If you own a DSC PC4020 please write about it to help other people.

 

[ Report abuse or wrong photo | Share your DSC PC4020 photo ]

User reviews and opinions

<== Click here to post a new opinion, comment, review, etc.

No opinions have been provided. Be the first and add a new opinion/review.

 

Documents

doc1

If required, the system may have a global keypad. A global keypad can access any partition. When you enter your access code at a global keypad, you will be asked which partition you would like to arm. The keypad will only offer the partitions available for your access code. The keypad will display the message Enter Your Access Code when it is not in use. Sometimes, it may display the time and date. Whatever the display, entering a valid access code on an idle keypad will access the system.

1.2 How to Arm

Prepare the partition to be armed by closing all protected doors and windows. Also, cease any movement in areas covered by motion detectors. If the time and date appears on the LCD keypad display, press the [#] key. The Enter Code to Arm System message should appear. If the display reads Secure System Before Arming, ensure that all doors and windows have been shut and that all motion has ceased. Once the Enter Code to Arm System message has appeared, enter your 4- or 6-digit access code. If the access code was entered incorrectly, the keypad will beep steadily for two seconds. For Single-Partition Access Codes When a single-partition access code is entered, the system will select to arm the partition your code has access to. The Exit delay in Progress message will be displayed and the keypad will beep three times quickly. The exit delay will begin, providing a window of up to two minutes for you to exit the partition without causing an alarm. Exit the premises through the designated exit/entry door. A timer will appear in the right side of the LCD keypad display indicating the remaining time in the exit delay period. When the allowed exit time expires, the partition will be armed. The message Enter Code to Disarm System will appear on the keypad. For Multi-Partition Access Codes When a multi-partition access code is entered, you must tell the system which partition(s) you wish to arm. The system will only offer to arm the partitions for which your code is programmed. Once you have entered your code, the display will read: (0) TO ARM <> (Partition Label) R The lower right hand corner of the display will show the partition status using the letter R for the partitions which are Ready to be armed, A for the partitions which are already Armed and N for those partitions which are not yet secured. To arm the partition indicated on the display, press the number in parentheses (in this case, [0]) or press the [*] key. The exit delay will begin, providing a window of up to two minutes for you to exit the partition without causing an alarm. Once the exit delay has expired, the partition will be armed.

Section

General

System

Operation
If you wish to arm another partition, use the arrow (< >) keys to scroll though the partitions available to be armed by your access code. To select a partition, enter the number indicated in parentheses, or press the [*] key. If you have selected another partition, the keypad will display the following message: Select (0) <> Arm Partition R To arm the partition, enter the number indicated in parentheses, or press the [*] key. The exit delay will begin in the other partition and the keypad will read: Exit Delay In Progress This display will remain for a few seconds until the keypad returns to the previous (0) To Arm display.
1.3 Alternate Arming Methods
Away Arming Arming the system in the Away mode will have all interior zones and perimeter zones active. If motion is detected in the interior zones, or if one of the perimeter zones is violated, the alarm sequence will begin. To arm in the Away mode, enter your access code, select the partition(s) to be armed and exit the premises through a designated exit/entry door. The system will recognize that you have left the premises. Once the exit delay expires, the system will be armed in the Away mode. Stay Arming This feature, if enabled, will allow you to arm the perimeter zones while leaving some interior zones inactive so that you can remain on the premises while the system is armed. When you enter your access code to arm the system and do not exit the premises through a designated exit/ entry door, the system will arm in the Stay mode, automatically bypassing the interior zones. The interior zones can be reactivated at any time by entering [*][1] at any keypad. If you reactivate the interior zones, be sure to only inhabit areas not covered by motion detectors. To access areas protected by motion sensors, you must enter your security code to disarm the system. Arming Without Entry Delay The entry delay is the period during which someone may enter an armed area without causing an alarm, providing time to get to a keypad to disarm the system. If you wish to arm your system without the entry delay, enter [*][9] then your access code. The Armed light will flash as a reminder that the system is armed and has no entry delay. The system will bypass the interior zones. An entry through any exit/entry door will create an instant alarm.

1.7 Zone Bypassing

You can use zone bypassing when access is needed to part of the protected area while the system is armed. Zones which are temporarily out of service due to damaged wiring or contacts may be bypassed to allow system arming until repairs can be made. Armed zones cannot be bypassed. Bypassed zones will not cause an alarm. Zones cannot be bypassed once the system is armed. Bypassed zones are automatically canceled each time the system is disarmed and must be reapplied before the next arming. NOTE: For security reasons, your system administrator may program the system to prevent you from bypassing certain zones. Bypassing zones reduces your security protection. If you are bypassing a zone due to damaged wiring or contacts, please notify your system administrator or call a service technician immediately so that the problem can be resolved and your system returned to proper working order. NOTE: Your installer may have included the ability to bypass fire zones on your system. Ask your installer for more information. If fire zone bypassing is possible, when you bypass a fire zone the panel will indicate a fire trouble until the bypass is turned off. You cannot turn off fire zone bypasses by disarming and/or arming the system. You must turn off the bypass manually, as described below. To bypass zones, enter [*] [1]. You may be required to enter your access code. A menu will appear outlining the various bypassing options. Use the arrow (< >) keys to scroll through each option and press the [*] key to select it, or press the corresponding number in parentheses. The bypassing options are as follows: [0] Bypass Open Zones This section will only display the zones which are currently open or bypassed. Use the arrow (< >) keys to scroll through these zones. Zones that are open will be indicated by an exclamation (!) mark in the lower right hand side of the keypad display. To select a zone to be bypassed, press the [*] key. A * will appear next to the zone label to indicate that the zone has been bypassed. 7
[1] Bypass Zones This selection takes you immediately to bypassing zones. Use the arrow (< >) keys to find the zone to be bypassed and press the [*] key to select it. A * will appear next to the zone label to indicate that the zone has been bypassed. [2] Clear Bypasses This selection will allow you to turn bypassing off for all of the zones in your partition. [3] Recall Bypasses This selection will automatically bypass the same group of zones which were bypassed the last time the partition was armed. [4] Previous Menu This selection will return the display to Enter Code to Arm System. From here, you will be able to arm the system.

1.8 Trouble Conditions

The alarm control panel continuously monitors a number of possible trouble conditions. If one of these conditions occurs, the keypad Trouble light will turn on and a beeping sound will be heard every 10 seconds. Press the [#] key to silence the keypad. The Trouble light will stay on until the trouble is cleared. To view which trouble conditions are present, enter [*] [2] at any keypad. Use the arrow (< >) keys to scroll through the list of trouble conditions: If AC Trouble is present, the system has lost its power. This trouble may be due to a power outage and should be cleared once the power is restored. If the power on the premises is running normally and the trouble condition persists, call your installer for service. If TLM Trouble is present, the is a problem with the telephone line. If the telephones on the premises are running normally and the trouble condition persists, call your installer for service. Any other trouble condition will require the assistance of your installer. As soon as a trouble condition occurs, call your installer to have the problem corrected as soon as possible.
Access codes are used to arm and disarm the system as well as to access system functions. There are many different codes available on the system. The Grand System Master Code will be able to perform all system functions. This includes zone bypassing, activating outputs enabling user options and programming access codes. The Grand System Master Code is access code 0001. Normally, only your installer can change this code. Please ask your installer if you wish to be able to alter this code. The following sections explain how to program new codes and modify existing codes. All access code options will also be described.
2.1 Program A New Access Code
This section describes three basic aspects to programming an access code: How to select a new access code for programming How to program the 4- or 6-digit code How to program the users name to identify the code How to select the partitions the code will be active on To select a new access code for programming, perform the following steps: 1. Enter [*][5] followed by a Master Code. 2. The display will read:
Select (0) < > User No. Search
Press [0] or [*]. 3. The display will read:
Sel. Code (0001) < > User 1

User 1 (Access Code 0001) is the System Master Code. Your installer may already have programmed this code. Use the right arrow (>) key to scroll to the code you wish to program (for example, access code 0002). Press [*] to select the code. 4. The display will read:
Select (0) < > Program Code
This is the Program Code menu. Use the right arrow (>) key to scroll though each display in the Program Code menu. Each display pertains to a different aspect of access code programming, including the three listed below. To select any menu item for programming, press [*].
Program Code To program the code for the new access code, perform the following: 1. From the Program Code menu, use the arrow keys to scroll to the first message: Select (0) Program Code. Press [0] or [*] to program the access code. 2. The display will indicate Enter Digits followed by AAAA. This is the default setting for the access code. Enter four digits for the new code. 3. Press [#]. The display will return to Select (0) Program Code. The new code has been programmed. 6-digit access codes are available. Talk to your installer if you require 6digit access codes on your system. NOTE: Do not program access codes that can be easily guessed and will compromise the security of your system (e.g. 1111 or 1234). Edit User Name To program the user name for the new access code, perform the following: 1. From the Program Code menu, use the right arrow (>) key to scroll to the following display:
Select (2) < > Edit User Name
2. Press [2] or [*]. 3. The display will read Program Name. For access code 0002, the default name will be User 2. Enter the new access code name using the number keys in the following manner: The letters of the alphabet have been divided up among the 1 to 9 number keys on the keypad as follows: [1] = A, B, C, 1 [5] = M, N, O, 5 [9] = Y, Z, 9, 0 [2] = D, E, F, 2 [6] = P, Q, R, 6 [0] = Space [3] = G, H, I, 3 [7] = S, T, U, 7 [4] = J, K, L, 4 [8] = V, W, X, 8
For example, if you press the [4] key once, the letter J will appear above the cursor on the display. Press the [4] key again, the next letter K will appear, and so on. If a different number key is pressed, the cursor will automatically move to the right one space. To erase a character, use the [<] [>] keys to move the cursor under the character, then press the [0] key. (See section 2.4 for other options available when programming user names.) 4. Once the new name has been entered, press [#]. The display will return to Select (2) Edit User Name. Edit Partition Mask Your installer has divided the system into partitions. The system may contain one or more partitions. In order for an access code to function, you must program which partitions the code will be active on. If your system only has one partition, you must activate the code for partition 1. 10

Select (5) < > Edit User Opts
Press [5] or [*]. 4. Use the arrow (< >) keys to scroll through each option. Press [*] to turn each option on (Y) or off (N). 5. When the desired options have been programmed, press [#].
2.4 Access Code Label Options
In Section 2.1, you learned how to program the access code label (Program User Name). There are other options available when programming labels. When programming the label, press the [*] key for the options menu. Use the arrow (< >) keys to scroll through each option. Press the [*] key to select. The available options are: Clear Display: Selecting this option will clear the entire code label. Clear to End: This will clear the display from the character where the cursor was located to the end of the display. Change Case: This will toggle the letter entry between uppercase and lowercase letters. ASCII Entry: This is for entering uncommon characters. Use the arrow (< >) keys to scroll through the available characters. Each character will be displayed along with the corresponding 3-digit ASCII number. If you know the characters 3-digit number, enter it. Press the [*] key to enter the character into the code label. See Appendix A at the back of this manual for a list of the available ASCII characters.
Table 2-1: Access Code User Options System Master Select this option to program a System Master Code Supervisor Select this option to program a Supervisor code. You must also program the partition mask for this code. Arm Allows arming of the assigned partition(s). Disarm Allows disarming of the assigned partition(s). Bypass Allows bypassing of zones on the assigned partition(s). Command Output Allows activation of a [*][7][X] command output when an access code is required. For more information, ask your installer. Duress Pulse Select option for Duress codes only (See "Special Codes") One-Time Use Select option for One-Time Use codes only (see "Special Codes") Escort4580 Access Allows access to the Escort4580 Audio Assistant, if installed. Global Access Allows use of a Global keypad. Partition Select Menu Allows all accessible partitions to be viewed when the code is entered. Card Valid (For Access Control Systems only. See Section 4.2 "Access Card Programming") Privilege Card (same as previous) Wait for Prvl (same as previous)

Default Settings* GM 2M SM Yes Y 3 Yes es Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes S AC

Yes Yes Yes Yes Yes

Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Silence Fire Allows the user to silence and reset any Fire Alarms on the Yes Yes Yes Yes Yes selected partitions by entering their access code on the partition keypad.
* Code abbreviations: GM = Grand System Master; 2M = Second Master; SM = System Master; S = Supervisor; AC = Access Code (default). The options for the Grand System Master and Second Master codes cannot be changed from their default settings. 3For the System Master code, the supervisor option changes to Yes after you exit access code programming.
2.5 Delete an Existing Code
An access code may be erased in two parts. First, all data pertaining to the code may be deleted (access code, user options, partition access, etc.). The access code label is erased separately. To delete all access code data from an existing code, perform the following: 1. Enter [*][5] followed by a Master code. 2. Locate the code using one of the code-searching methods (see Section 2.2 Modifying an Existing Code). Press [*] to select. 3. Use the right arrow (>) key to scroll to the following display:
Select (1) < > Erase Data
4. Press [1] or [*]. All data pertaining to the access code, except the access code name, will be erased. To delete the access code name from an existing code, perform the following: 1. Enter [*][5] followed by a Master code. 2. Locate the code using one of the code-searching methods (see Section 2.2 Modifying an Existing Code). Press [*] to select. 3. Use the right arrow (>) key to scroll to the to Select (2) Edit User Name and press [*]. 4. The display will indicate the current name. Press [*]. 5. The display will read Select (0) Clear Display. Press [*]. The access code name will be erased. 6. Follow the instructions outlined in Section 2.1 to program a new label, or press [#] until you have exited access code programming.

2.6 Special Codes

The following four codes are special codes. Selecting the corresponding user option will program each code (see Section 2.3 Change User Code Options). System Master Codes System Master codes have access to all partitions on the system. These codes can be used to program other access codes, except for other System Master codes. For a list of the other user options that are enabled for this code, see Table 2-1. Supervisor Codes The supervisor code can be used to program other access codes that are only to be active on the supervisors partition. Users with Supervisor codes cannot program other Supervisor codes, or System Master codes. For a list of the other user options that are enabled for this code, see Table 2-1.

3.4 Setting the Time and Date
Keypad Command: [Master Code][9] To set the time and date on the system, perform the following: 1. Enter a Master code and press [9]. The display will read System Master Menu. 2. Use the keypad arrow keys (< >) to scroll to the display Set System Time. Press [*]. 3. Enter the current time in 24 hour format (HHMM). For instance, to program 3:51 p.m., type in 1551. 4. Next, use the keypad arrow keys to scroll to the display Set System Date. Press [*]. 5. Enter the current date (MMDDYY). For example, to program May 31, 1997 type 053197. 6. Once the date and time have been programmed, press [#] to return the partition to its normal disarmed state.
3.5 Activating Door Chime
Keypad Command: [*][4] When the door chime feature is enabled, the keypad will emit five quick beeps when a zone is opened or closed. The keypad will only beep for zones which have the door chime zone attribute enabled. Often this feature is applied to entry doors so that you are notified when someone enters or exits the premises. To enable door chime, enter [*] [4] at any keypad. To program the chime zone attribute for a particular zone, please ask your installer. NOTE: The door chime feature will not work on bypassed zones.

3.6 View Event Buffer

Keypad Command: [Master Code][9] Each system event is stored in an event buffer which can be viewed from any keypad. To view the event buffer, perform the following: 1. Enter a System Master code and press [9]. The display will read System Master Menu. 2. Use the keypad arrow keys (< >) to scroll to the display View Event Buffer. Press [*]. 3. The event buffer can now be viewed, starting with the most recent event. When an event is presented, the first line of the display will show the event number and the partition on which the event occurred; the second line of the display will show the date and time of the event. Press the [*] key to display a description of the event. Use the arrow keys to scroll through the list of all events in the event buffer. 4. To stop viewing events, press [#].
3.7 [*][7] Command Outputs 1-8

Select (3) < > User Card Number
Press [*] or [3]. 4. The display will read User Card Number Enter # followed by 0000000. Enter the access card number using the number keys. 5. Press [#] when the access card number has been entered. The display will return to Select (3) User Card Number. Programming Access Cards for New Users If there is the user has not yet been programmed on the system, follow the steps outlined in Section 2.1 Program a New Access Code. Once you have programmed such information as the user name, continue programming from steps 3-5 from above. Some access card numbers may have the letters A-F as either the first or second digits. To enter these letters into the access card number, press the [*] key followed by the number key corresponding to the letter. The corresponding number keys are the following: 1=A 2=B 3=C 4=D 5=E 6=F
Access Level Once the access card has been programmed, an access level can be assigned to the user. The access level will determine when the user has access to certain areas. Your installer will have to work with you to set up various access levels on the system, depending on the access times required. 22

Control

Your installer will customize access levels 02-63 to suit your purposes. Assigning access level 00 means that the user will never have access to a given area. Assigning access level 01 means that the user will always have access to a given area. To program access level, perform the following. Your starting point should be from the Program Code menu (from Step 3 above): 1. Use the right arrow (>) key to scroll to the following display:
Select (4) < > Access Level
Press [*] or [4]. 2. The display will read Access Level Enter 00-63. The numbers 01will be in the bottom right-hand corner of the display. This means that the system has assigned Access Level 01 by default to the user and the user will always have access. To assign another access level, enter a 2-digit number from 00-63, corresponding to the new access level. 3. Once the access level has been entered, press [#]. The display will return to Select (4) Access Level. User Options Once the access level has been programmed, three different user options must be programmed. These options are the following: Card Valid: This option allows the users access card to become active on the system. Make sure the access card number is also programmed. Prvleged Card: A privilege card user will be able to access areas via an access card entry point when general access is prohibited. This option, when enabled, will also give the user the ability to grant access to users who have a Wait for Privilege access card (see next option). Wait for Prvl: This option will restrict the users access to areas via an access card entry point when access is prohibited. A Wait for Privilege user, however, can gain access to the system under the following condition: A Privilege cardholder must present their card after the Wait for Privilege user swipes theirs. Table 2-1 shows which codes have these options turned on by default. To change the user option settings for these features, follow the directions outlined in Section 2.3 Change User Code Options.

6.3 Household Fire Safety Audit
Most fires occur in the home. To minimize this danger, a household fire safety audit should be conducted and a fire escape plan should be developed and practised. 1. Are all electrical appliances and outlets in a safe condition? Check for frayed cords, overloaded lighting circuits, etc. If you are uncertain about the condition of your electrical appliances or household service, have a professional evaluate these units. 2. Are all flammable liquids stored safely in closed containers in a well ventilated cool area? Cleaning with flammable liquids should be avoided. 3. Are fire hazardous materials (matches) well out of reach of children? 4. Are furnaces and wood burning appliances properly installed, clean and in good working order? Have a professional evaluate these appliances.

6.4 Fire Escape Planning

There is often very little time between the detection of a fire and the time it becomes deadly. It is thus very important that a fire escape plan be developed and rehearsed. 1. Every person who occupies the building should participate in developing the escape plan. 2. Study the possible escape routes from each location within the premises. In residential applications, special attention should be given to the escape routes from sleeping quarters since many fires occur at night. Escape from a bedroom must be possible without opening the interior door. Consider the following when making escape plans: Make sure that all perimeter doors and windows are easily opened. Ensure that they are not painted shut, and that their locking mechanisms operate smoothly. If opening or using the exit is too difficult for children, the elderly or handicapped, plans for rescue should be developed. This includes making sure that those who are to perform the rescue can promptly hear the fire warning signal. If the exit is above the ground level, an approved fire ladder or rope should be provided as well as training in its use. Exits on the ground level should be kept clear. Be sure to remove snow from exterior doors in winter; outdoor furniture or equipment should not block exits. Each person should know of a predetermined assembly point where everyone can be accounted for i.e.: across the street or at a neighboring building. Once everyone is out of the building, call the fire department.

A good plan emphasizes quick escape. Do not investigate or attempt to fight the fire, and do not gather belongings or pets as this wastes valuable time. Once outside, do not re-enter the house. Wait for the fire department. Write the fire escape plan down and rehearse it frequently so that should an emergency arise, everyone will know what to do. Revise the plan as conditions change, such as the number of people on the premises, or if there are changes to the buildings construction. Make sure your fire warning system is operational by conducting weekly tests (see Fire Alarm Operation above). If you are unsure about system operation, contact your alarm installer. Contact your local fire department to request further information on fire safety and escape planning. If available, have your local fire prevention officer conduct an on-site fire safety inspection.
Below is a chart indicating the available ASCII characters and the 3-digit number required for each character. Instructions on programming ASCII characters is outlined in Section 2 Access Codes.

LIMITED WARRANTY

Digital Security Controls Ltd. warrants the original purchaser that for a period of twelve months from the date of purchase, the product shall be free of defects in materials and workmanship under normal use. During the warranty period, Digital Security Controls Ltd. shall, at its option, repair or replace any defective product upon return of the product to its factory, at no charge for labour and materials. Any replacement and/or repaired parts are warranted for the remainder of the original warranty or ninety (90) days, whichever is longer. The original owner must promptly notify Digital Security Controls Ltd. in writing that there is defect in material or workmanship, such written notice to be received in all events prior to expiration of the warranty period. Digital Security Controls Ltd.s liability for failure to repair the product under this warranty after a reasonable number of attempts will be limited to a replacement of the product, as the exclusive remedy for breach of warranty. Under no circumstances shall Digital Security Controls Ltd. be liable for any special, incidental, or consequential damages based upon breach of warranty, breach of contract, negligence, strict liability, or any other legal theory. Such damages include, but are not limited to, loss of profits, loss of the product or any associated equipment, cost of capital, cost of substitute or replacement equipment, facilities or services, down time, purchasers time, the claims of third parties, including customers, and injury to property.

IMPORTANT INFORMATION

This equipment complies with Part 68 of the FCC Rules. On the side of this equipment is a label that contains, among other information, the FCC registration number of this equipment. NOTIFICATION TO TELEPHONE COMPANY The customer shall notify the telephone company of the particular line to which the connection will be made, and provide the FCC registration number and the ringer equivalence of the protective circuit. FCC Registration Number: F53CAN-20836-AL-E Ringer Equivalence Number: 0.1B USOC Jack: RJ-31X TELEPHONE CONNECTION REQUIREMENTS Except for the telephone company provided ringers, all connections to the telephone network shall be made through standard plugs and telephone company provided jacks, or equivalent, in such a manner as to allow for easy, immediate disconnection of the terminal equipment. Standard jacks shall be so arranged that, if the plug connected thereto is withdrawn, no interference to the operation of the equipment at the customers premises which remains connected to the telephone network shall occur by reason of such withdrawal. INCIDENCE OF HARM Should terminal equipment or protective circuitry cause harm to the telephone network, the telephone company shall, where practicable, notify the customer that temporary disconnection of service may be required; however, where prior notice is not practicable, the telephone company may temporarily discontinue service if such action is deemed reasonable in the circumstances. In the case of such temporary discontinuance, the telephone company shall promptly notify the customer and will be given the opportunity to correct the situation. ADDITIONAL TELEPHONE COMPANY INFORMATION The security control panel must be properly connected to the telephone line with a USOC RJ-31X telephone jack. The FCC prohibits customer-provided terminal equipment be connected to party lines or to be used in conjunction with coin telephone service. Interconnect rules may vary from state to state. CHANGES IN TELEPHONE COMPANY EQUIPMENT OR FACILITIES The telephone company may make changes in its communications facilities, equipment, operations or procedures, where such actions are reasonably required and proper in its business. Should any such changes render the customers terminal equipment incompatible with the telephone company facilities the customer shall be given adequate notice to the effect modifications to maintain uninterrupted service. RINGER EQUIVALENCE NUMBER (REN) The REN is useful to determine the quantity of devices that you may connect to your telephone line and still have all of those devices ring when your telephone number is called. In most, but not all areas, the sum of the RENs of all devices connected to one line should not exceed five (5.0). To be certain of the number of devices that you may connect to your line, you may want to contact your local telephone company. EQUIPMENT MAINTENANCE FACILITY If you experience trouble with this telephone equipment, please contact the facility indicated below for information on obtaining service or repairs. The telephone company may ask that you disconnect this equipment from the network until the problem has been corrected or until you are sure that the equipment is not malfunctioning. Digital Security Controls Ltd. 160 Washburn St., Lockport, NY 14094

which follow. The smoke detectors may have been improperly installed or positioned. Smoke may not be able to reach the smoke detectors, such as when the fire is in a chimney, walls or roofs, or on the other side of closed doors. Smoke detectors may not detect smoke from fires on another level of the residence or building. Every fire is different in the amount of smoke produced and the rate of burning. Smoke detectors cannot sense all types of fires equally well. Smoke detectors may not provide timely warning of fires caused by carelessness or safety hazards such as smoking in bed, violent explosions, escaping gas, improper storage of flammable materials, overloaded electrical circuits, children playing with matches or arson. Even if the smoke detector operates as intended, there may be circumstances when there is insufficient warning to allow all occupants to escape in time to avoid injury or death. s Motion Detectors Motion detectors can only detect motion within the designated areas as shown in their respective installation instructions. They cannot discriminate between intruders and intended occupants. Motion detectors do not provide volumetric area protection. They have multiple beams of detection and motion can only be detected in unobstructed areas covered by these beams. They cannot detect motion which occurs behind walls, ceilings, floor, closed doors, glass partitions, glass doors or windows. Any type of tampering whether intentional or unintentional such as masking, painting, or spraying of any material on the lenses, mirrors, windows or any other part of the detection system will impair its proper operation. Passive infrared motion detectors operate by sensing changes in temperature. However their effectiveness can be reduced when the ambient temperature rises near or above body temperature or if there are intentional or unintentional sources of heat in or near the detection area. Some of these heat sources could be heaters, radiators, stoves, barbeques, fireplaces, sunlight, steam vents, lighting and so on. s Warning Devices Warning devices such as sirens, bells, horns, or strobes may not warn people or waken someone sleeping if there is an intervening wall or door. If warning devices are located on a different level of the residence or premise, then it is less likely that the occupants will be alerted or awakened. Audible warning devices may be interfered with by other noise sources such as stereos, radios, televisions, air conditioners or other appliances, or passing traffic. Audible warning devices, however loud, may not be heard by a hearing-impaired person. s Telephone Lines If telephone lines are used to transmit alarms, they may be out of service or busy for certain periods of time. Also an intruder may cut the telephone line or defeat its operation by more sophisticated means which may be difficult to detect. s Insufficient Time There may be circumstances when the system will operate as intended, yet the occupants will not be protected from the emergency due to their inability to respond to the warnings in a timely manner. If the system is monitored, the response may not occur in time to protect the occupants or their belongings. s Component Failure Although every effort has been made to make this system as reliable as possible, the system may fail to function as intended due to the failure of a component. s Inadequate Testing Most problems that would prevent an alarm system from operating as intended can be found by regular testing and maintenance. The complete system should be tested weekly and immediately after a break-in, an attempted break-in, a fire, a storm, an earthquake, an accident, or any kind of construction activity inside or outside the premises. The testing should include all sensing devices, keypads, consoles, alarm indicating devices and any other operational devices that are part of the system. s Security and Insurance Regardless of its capabilities, an alarm system is not a substitute for property or life insurance. An alarm system also is not a substitute for property owners, renters, or other occupants to act prudently to prevent or minimize the harmful effects of an emergency situation.

 

Tags

SLV-R300 CF-VDW07 TPL-C01 HTC Tytn Edition 15HF5234 Datatraveler 120 LT17N13w1 Series FS370 EOC-3220- CMD-Z5 25415 White K-X Nokia 5220 Lifestudio Desk 32PFL9604H Bootmagic Seventy Five Bulldog AL 1404 PV-L501D DC T850 WF7602NAW PSC 2410 13 0 20-keyl HD200HJ MT600 Addenda CQ-C5401U GR-409GLQ AEG4580 SDM-M81 B Navigator 10 XL 340 Dondolino Manual Nokia 6680 BDP-BX2 KR-4500 CT-F950 Dvdr3452H HI-204III-USB ESC 550 14CC4RB WM-12336FD HP4696 CT-W550R KX-TG2357S LE32B450 Cayenne E-SBC TS4GMP840 EMP-1710 DSC-W80 Switch D22 SP-43T7HP Audioline 828 EX-FC100 PT-AE900U AWM-2800 Remote NV-HS820 E2607WS CZ-21A083N 2afxs K2927EZ PC-104 DCR-DVD905E S90 ES Urc 7562 Bucket CD535 DB-P70 Touch RF263aebp WD-1015FB 255 1 GTO6506CE SGH-Z170 Dual-S Eldorado 1994 Install Manual Gateway G2640SF1 Ixus 75 1050C Center Tycoon 2 LN32B550 DV-9819 Dvbt KDL-40NX500 Sv150S 550 DUO VP-D301 Altimax DVD-E235 Valve VGN-S4xp-B Frame 2 XR-C5090R

 

manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding

 

Sitemap

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101