PC4020 v3.3 - Instruction Manual: WARNING: This Manual Contains Information On Limitations
PC4020 v3.3 - Instruction Manual: WARNING: This Manual Contains Information On Limitations
IMPORTANT INFORMATION
This equipment complies with Part 68 of the FCC Rules. On the side of this equipment is a label that contains,
among other information, the FCC registration number of this equipment.
NOTIFICATION TO TELEPHONE COMPANY The customer shall notify the telephone company of the
particular line to which the connection will be made, and provide the FCC registration number and the ringer
equivalence of the protective circuit.
FCC Registration Number: F53CAN-20836-AL-E
Ringer Equivalence Number: 0.1B
USOC Jack: RJ-31X
TELEPHONE CONNECTION REQUIREMENTS Except for the telephone company provided ringers, all
connections to the telephone network shall be made through standard plugs and telephone company provided
jacks, or equivalent, in such a manner as to allow for easy, immediate disconnection of the terminal equipment.
Standard jacks shall be so arranged that, if the plug connected thereto is withdrawn, no interference to the
operation of the equipment at the customer’s premises which remains connected to the telephone network shall
occur by reason of such withdrawal.
INCIDENCE OF HARM Should terminal equipment or protective circuitry cause harm to the telephone
network, the telephone company shall, where practicable, notify the customer that temporary disconnection of
service may be required; however, where prior notice is not practicable, the telephone company may
temporarily discontinue service if such action is deemed reasonable in the circumstances. In the case of such
temporary discontinuance, the telephone company shall promptly notify the customer and will be given the
opportunity to correct the situation.
ADDITIONAL TELEPHONE COMPANY INFORMATION The security control panel must be properly
connected to the telephone line with a USOC RJ-31X telephone jack.
The FCC prohibits customer-provided terminal equipment be connected to party lines or to be used in
conjunction with coin telephone service. Interconnect rules may vary from state to state.
CHANGES IN TELEPHONE COMPANY EQUIPMENT OR FACILITIES The telephone company may
make changes in its communications facilities, equipment, operations or procedures, where such actions are
reasonably required and proper in its business. Should any such changes render the customer’s terminal
equipment incompatible with the telephone company facilities the customer shall be given adequate notice to
the effect modifications to maintain uninterrupted service.
RINGER EQUIVALENCE NUMBER (REN) The REN is useful to determine the quantity of devices that you
may connect to your telephone line and still have all of those devices ring when your telephone number is called.
In most, but not all areas, the sum of the RENs of all devices connected to one line should not exceed five (5.0).
To be certain of the number of devices that you may connect to your line, you may want to contact your local
telephone company.
EQUIPMENT MAINTENANCE FACILITY If you experience trouble with this telephone equipment, please
contact the facility indicated below for information on obtaining service or repairs. The telephone company
may ask that you disconnect this equipment from the network until the problem has been corrected or until you
are sure that the equipment is not malfunctioning.
Digital Security Controls Ltd. 160 Washburn St., Lockport, NY 14094
Table of Contents
Introduction 3
Section 1: General System Operation 4
1.1 Getting to Know Your System ........................................... 4
1.2 Arming Your System ........................................................... 5
1.3 Alternate Arming Methods ................................................ 6
1.4 Disarming Your System ...................................................... 7
1.5 Alarm Memory ..................................................................... 8
1.6 What to Do If An Alarm Sounds ....................................... 8
1.7 Bypassing Zones .................................................................. 9
1.8 Viewing Trouble Conditions ............................................ 10
Section 2: Access Codes 11
2.1 Programming A New Access Code ................................. 11
2.2 Modifying an Existing Code ............................................ 13
2.3 Changing User Code Options .......................................... 14
2.4 Access Code Label Options .............................................. 14
2.5 Deleting an Existing Code ................................................ 16
2.6 Special Codes ...................................................................... 16
2.7 Installer Programmed Codes ........................................... 17
Section 3: System Administration 18
3.1 Turning on Quick Arm ...................................................... 18
3.2 Turning on Quick Exit ....................................................... 18
3.3 Controlling Automatic Arming ....................................... 18
3.4 Setting the Time and Date ................................................ 19
3.5 Activating Door Chime ..................................................... 20
3.6 Viewing the Event Buffer .................................................. 20
3.7 [*][7] Command Outputs 1-8 ........................................... 20
3.8 Changing Keypad Settings ............................................... 21
3.9 Downloading Options ...................................................... 21
3.10 PC-LINK Enable Option ................................................... 22
3.11 Audio Options .................................................................... 22
3.12 Turning Background Music On or Off ........................... 22
Section 4: Access Control 23
4.1 About Access Card Readers (PC4820 Modules) ............ 23
4.2 Programming Access Cards (PC4820 Modules) .......... 24
4.3 Searching Using Access Card Numbers
(PC4820 Modules) ............................................................. 26
4.4 Adding User Telephone Numbers
(PC4850 Modules) ............................................................. 26
4.5 Adding Tenant Codes for Users (PC4850 Modules) ..... 27
1
Table of Contents
2
Introduction
About Your Security System
Your DSC security equipment has been designed to give you the greatest
possible flexibility and convenience. The LCD keypad will guide you
through each operation with English language prompts. The keypad
provides audible feedback each time a key is pressed; with unique audible
sequences, it will also signal system troubles and other indications of
system status.
Read this manual carefully and have your installer instruct you on your
system’s operation. Become familiar with the features that have been
implemented on your system. All users of this system should be equally
instructed in its use.
About this Manual
This manual is a thorough explanation of all system functions, including
troubleshooting and programming access codes in addition to performing
basic system functions. Most users of the system will not need to know
all of this information. The first section of this manual, titled “General
System Operation,” explains general system concepts and instructs the
user on how to arm and disarm the system and bypass zones. Photocopy
this section and distribute it to general users of the system. The remaining
sections of the manual are reserved for more detailed system information.
Fire Detection
This equipment is capable of monitoring fire detection devices such as
smoke detectors and providing a warning alarm if a fire condition is
detected. Good fire detection depends on having adequate numbers of
fire detectors placed in appropriate locations. This equipment should be
installed in accordance with NFPA 72 (NFPA, 1 Batterymarch Park,
Quincey MA 02269). Carefully review the “Fire Escape Planning”
guidelines in this manual.
NOTE: Your installer must enable the fire detection portion of this
equipment before it will work.
Monitoring
This system is capable of transmitting alarms, troubles, and emergency
information over telephone lines to a monitoring station. If you
inadvertently initiate an alarm, immediately call the monitoring station
to prevent an unnecessary response.
NOTE: Your installer must enable the monitoring function before it
will work.
3
Section 1: General System
Operation
4
Section 1: General System Operation
Keypads
Several LCD keypads will be installed throughout the protected premises,
usually one at each entry/exit door. Some keypads are programmed only
to access a single partition. These are called partition keypads.
keypad. A global keypad can
If required, the system may have a global keypad
access any partition. When you enter your access code at a global keypad,
you will be asked which partition you would like to arm. The keypad
will only offer the partitions available for your access code.
The keypad will display the message “Enter Your Access Code” when it
is not in use. Sometimes, it may display the time and date. Whatever the
display, enter a valid access code on the keypad to access the system.
Audio Help
If your security system has an audio matrix module (PC49XX and intercom
stations) and an Escort4580 connected, it can provide step-by-step audio
instructions through the intercom stations. Access the help function by
pressing and holding for 2 seconds the "Help" button on any system
keypad. The system will prompt you over the intercom stations.
NOTE: If a user is accessing the Escort locally over the telephone line,
the Help button will not work.
5
For Multi-Partition Access Codes
When a multi-partition access code is entered, you must tell the system
which partition(s) you wish to arm. The system will only offer to arm the
partitions for which your code is programmed. Once you have entered
your code, the display will read:
(0) TO ARM <>
(Partition Label) R
The lower right hand corner of the display will show the partition status
using the letter “R” for the partitions which are Ready to be armed, “A”
for the partitions which are already Armed and “N” for those partitions
which are not yet secured. To arm the partition indicated on the display,
press the number in parentheses (in this case, [0]) or press the [*] key. The
exit delay will begin, providing a period of time for you to exit the partition
without causing an alarm. Once the exit delay has expired, the partition
will be armed.
If you wish to arm another partition, use the arrow (< >) keys to scroll
though the partitions available to be armed by your access code. To select
a partition, enter the number indicated in parentheses, or press the [*]
key. If you have selected another partition, the keypad will display the
following message:
Select (0) <>
Arm Partition R
To arm the partition, enter the number indicated in parentheses, or press
the [*] key. The exit delay will begin in the other partition and the keypad
will read:
Exit Delay
In Progress
This display will remain for a few seconds until the keypad returns to the
previous “(0) To Arm…” display.
6
Section 1: General System Operation
Stay Arming
This feature, if enabled, will allow you to arm the perimeter zones while
leaving some interior zones inactive so that you can remain on the premises
while the system is armed. When you enter your access code to arm the
system and do not exit the premises through a designated exit/entry door,
the system will arm in the Stay mode, automatically bypassing the interior
zones.
The interior zones can be reactivated at any time by entering [*][1] at any
keypad. If you reactivate the interior zones, be sure that you do not enter
areas not protected by motion detectors. To access areas protected by
motion sensors, you must enter your security code to disarm the system.
Arming Without Entry Delay
The entry delay is the period during which someone may enter an armed
area without causing an alarm, providing time to get to a keypad to disarm
the system. If you wish to arm your system without the entry delay, enter
[*][9] then your access code. The Armed light will flash as a reminder
that the system is armed and has no entry delay. The system will bypass
the interior zones. An entry through any exit/entry door will create an
instant alarm.
Quick Arm
When the Quick Arm feature is enabled, you can arm the system by
pressing [*][0], instead of your access code.
Please note that pressing [*][0] will only allow you to arm the system; to
disarm, you must enter a valid access code. Your system administrator
will inform you if the Quick Arm feature has been enabled on your system.
7
Disarming Another Partition
If you have a multi-partition access code, you can disarm other partitions
before entering them. To disarm another partition, enter your access code.
The keypad display will read:
(0) TO ARM <>
(Partition Label) R
Use the arrow (< >) keys to scroll to the partition you wish to disarm.
Remember that only partitions to which your access code is assigned will
be displayed. If the partition you have selected is armed, the letter “A”
will appear on the bottom right-hand corner of the display, as in the
following example:
(2) TO SELECT < >
(Partition Label) A
To disarm the partition, press the number in parentheses (in this case, [2])
or press the [*] key.
8
Section 1: General System Operation
9
1.8 Viewing Trouble Conditions
The alarm control panel continuously monitors a number of possible
trouble conditions. If one of these conditions occurs, the keypad Trouble
light will turn on and a beeping sound will be heard every 10 seconds.
Press the [#] key to silence the keypad. The Trouble light will stay on until
the trouble is cleared.
To view which trouble conditions are present:
1. Enter [*] [2] at any keypad.
2. Use the arrow (< >) keys to scroll through the list of trouble
conditions:
If AC T Trrouble is present, the system has lost its power. This trouble may
be due to a power outage and should be cleared once the power is restored.
If the power on the premises is running normally and the trouble condition
persists, call your installer for service.
If TLM TTrrouble is present, there is a problem with the telephone line. If
the telephones on the premises are running normally and the trouble
condition persists, call your installer for service.
Any other trouble condition will require the assistance of your installer.
As soon as a trouble condition occurs, call your installer to have the
problem corrected as soon as possible.
10
Section 2: Access Codes
Access codes are used to arm and disarm the system as well as to access
system functions. There are many different codes available on the system.
The Grand System Master Code will be able to perform all system
functions. This includes zone bypassing, activating outputs enabling user
options and programming access codes. The Grand System Master Code
is access code 0001. Normally, only your installer can change this code.
Please ask your installer if you wish to be able to alter this code.
The following sections explain how to program new codes and modify
existing codes. All access code options will also be described.
11
Program Code
You will need to program a four-digit code for each user. Six-digit
access codes are also available. Talk to your installer if you require six-
digit access codes on your system.
To program the code for the new access code, perform the following:
1. From the Program Code menu, use the arrow keys to scroll to the
first message: “Select (0) Program Code.” Press [0] or [*] to program
the access code.
2. The display will indicate “Enter Digits” followed by “AAAA.” This
is the default setting for the access code. Enter a new four- or six-
digit code.
3. Press [#]. The display will return to “Select (0) Program Code.” The
new code has been programmed.
NOTE: Do not program access codes that can be easily guessed and
will compromise the security of your system (e.g. 1111 or 1234).
NOTE: Your installer may have set up your system to prevent you
from programming the same access code for more than one user.
Edit User Name
You can program a name for each user. This name is displayed on the
keypad when you are editing access codes, and is also shown in the event
buffer for the system. If a PC4850 Telephone Access module is connected
to the system, the User Name will be displayed on the PC4850 LCD screen
for visitors.
To program the user name for the new access code, perform the following:
1. From the Program Code menu, use the right arrow (>) key to scroll
to the following display:
Select (2) < >
Edit User Name
2. Press [2] or [*].
3. The display will read “Program Name.” For access code 0002, the
default name will be “User 2.” Enter the new access code name using
the number keys in the following manner:
The letters of the alphabet have been divided up among the 1 to 9 number
keys on the keypad as follows:
[1] = A, B, C, 1 [2] = D, E, F, 2 [3] = G, H, I, 3 [4] = J, K, L, 4
[5] = M, N, O, 5 [6] = P, Q, R, 6 [7] = S, T, U, 7 [8] = V, W, X, 8
[9] = Y, Z, 9, 0 [0] = Space
For example, if you press the [4] key once, the letter “J” will appear above
the cursor on the display. Press the [4] key again, the next letter “K” will
appear, and so on. If a different number key is pressed, the cursor will
automatically move to the right one space. To erase a character, use the [<]
[>] keys to move the cursor under the character, then press the [0] key. (See
section 2.4 for other options available when programming user names.)
12
Section 2: Access Codes
NOTE: If a user does not want their name listed on the PC4850 display,
but does want to have an access code, you can put a “!” at the
beginning of the user name. To enter a “!”, press [*], then scroll to
the message “ASCII Entry”. Press [*], then enter [033*].
4. Once the new name has been entered, press [#]. The display will
return to “Select (2) Edit User Name.”
Edit Partition Mask
Your installer has divided the system into partitions. The system may
contain one or more partitions. In order for an access code to function,
you must program which partitions the code will be active on. If your
system only has one partition, you must activate the code for partition 1.
To program partition access for the new access code, perform the following:
1. From the Program Code menu, use the right arrow (>) key to scroll
to the following display:
Select (6) < >
Edit Part. Mask
2. Press [6] or [*]. The display will read “Select Toggle < >.” Partition 1
will be displayed, followed by the letter “N.” This means that
Partition 1 is not available for that code. Press [*] to select Partition 1
(Y). The [*] key will alternately enable (Y) and disable (N) the partition
for the selected code.
3. Use the right arrow (>) key to scroll to the next partition on the system.
Press [*] to enable or disable the partition. Repeat this step for the
rest of the partitions on the system until the desired partition access
has been granted for the selected code.
4. Press [#] once you have finished programming the partition mask
for the code. The display will return to “Select (6) Edit Part. Mask.”
13
Select (1) for
User Name Search
Press [1] or [*].
3. The first letter of the access code name using the corresponding
number key. For example, for John, enter the letter “J” by pressing
the [4] key once.
4. The keypad will display the first available name starting with the
selected letter. Use the right arrow (>) key to scroll through
subsequent names.
5. Once the appropriate user name is displayed, press [*] to continue
programming.
Once the code has been selected, the Program Code menu will be shown.
Reprogram the access code, code label or partition access using the steps
outlined in Section 2.1 “Program a New Code”.
14
Section 2: Access Codes
15
• ASCII Entry: This is for entering uncommon characters. Use the
arrow (< >) keys to scroll through the available characters. Each
character will be displayed along with the corresponding 3-digit
ASCII number. If you know the character’s 3-digit number, enter it.
Press the [* ] key to enter the character into the code label. See
Appendix A at the back of this manual for a list of the available ASCII
characters.
2.5 Deleting an Existing Code
An access code may be erased in two parts. First, all data pertaining to
the code may be deleted (access code, user options, partition access, etc.).
The access code label is erased separately.
To delete all access code data from an existing code, perform the following:
1. Enter [*][5] followed by a Master code.
2. Locate the code using one of the code-searching methods (see Section
2.2 “Modifying an Existing Code”). Press [*] to select.
3. Use the right arrow (>) key to scroll to the following display:
Select (1) < >
Erase Data
4. Press [1] or [*]. All data pertaining to the access code, except the
access code name, will be erased.
To delete the access code name from an existing code, perform the
following:
1. Enter [*][5] followed by a Master code.
2. Locate the code using one of the code-searching methods (see Section
2.2 “Modifying an Existing Code”). Press [*] to select.
3. Use the right arrow (>) key to scroll to the to “Select (2) Edit User
Name” and press [*].
4. The display will indicate the current name. Press [*].
5. The display will read “Select (0) Clear Display.” Press [*]. The access
code name will be erased.
6. Follow the instructions outlined in Section 2.1 to program a new
label, or press [#] until you have exited access code programming.
2.6 Special Codes
The following are special codes. Selecting the corresponding user option
will program each code (see Section 2.3 “Change User Code Options”).
System Master Codes
System Master codes have access to all partitions on the system. These
codes can be used to program other access codes, except for other System
Master codes. For a list of the other user options that are enabled for this
code, see Table 2-1.
Supervisor Codes
The supervisor code can be used to program other access codes that are
only to be active on the supervisor’s partition. Users with Supervisor codes
cannot program other Supervisor codes, or System Master codes. For a list
of the other user options that are enabled for this code, see Table 2-1.
16
Section 2: Access Codes
Duress Codes
If the “Duress” user option is enabled, the code will become a Duress
code. When this code is entered, the system will send a duress signal to
the monitoring station. Make sure that the Arm and Disarm user options
are also enabled for this code.
One-time Use Codes
If the “One-time Use” option is enabled, the code will become a One-time
Use code. The code can be used to disarm assigned partitions. When a
user arms the system using a One -Time Use code, the panel will erase the
code once the Exit Delay expires; after this time, the code cannot be used
again. Make sure that the Arm and Disarm user options are also enabled
for this code.
Log Only Codes
A “Log Only” code will only create an entry in the event buffer when
entered at a keypad. Example: a log-only code may be used by a guard to
record the time that they checked each area of the premises.
To create a log-only code, disable all the access code options for the code.
Temporary Codes
A “Temporary code” is an access code that can be turned on or off by
partition using the “T-Code” function key. Any code with the temporary
code attribute enabled will work this way.
To turn temporary codes on for a partition, press and hold the “T-Code”
function key at a keypad assigned to the partition. You may need to enter
an access code after pressing the “T-Code” key.
If enabled for your access code, you can also turn temporary codes on
and off for any partition by entering [*][6][access code][0][3].
17
Section 3: System Administration
NOTE: To enter the [*][6] menu, you may need to enter an access
code that has the “System Master” or “Supervisor” option enabled.
19
4. Next, use the keypad arrow keys to scroll to the display “Set System
Date.” Press [*].
5. Enter the current date (MMDDYY). For example, to program May
31, 2000 type “053100.”
6. Once the date and time have been programmed, press [#] twice to
return the partition to its normal disarmed state.
20
Section 3: System Administration
21
3.10 PC-LINK Enable Option
Keypad Command: [Master Code][9]
If you are using the DLS-3 software with your system, your computer
will be connected to the system with a PC-LINK module. If the module is
disconnected from your system for any reason, after it is reconnected,
you must select the PC-LINK enable option. Please see your DLS-3
Instruction Manual for more information.
22
Section 4: Access Control
NOTE: This section only applies to systems that have PC4820 Access
Control modules, or PC4850 Telephone Entry modules installed. Talk
to your installer for information regarding the access control
capabilities of your system.
23
4.2 Programming Access Cards (PC4820 Modules)
Access card programming is a part of access code programming. An access
card is assigned to a single user of the system. A user can have both an
access code and an access card to provide two different means of accessing
the system.
Two methods of programming access cards are described below:
• Programming access cards for existing users
• Programming access cards for new users
Three different areas require programming for each access card: the access
card number, the user’s access level and the access code user options that
pertain to access card operation.
The access card number is a serial number printed on the back of each
card. This number is usually between five and seven digits.
Programming Access Cards for Existing Users
1. Enter [*][5] followed by a Master code.
2. Search for existing access code by user number or user name (methods
outlined in Section 2.2 “Modify and Existing Code”). Once you have
found the correct access code, press [*].
3. The display will read “Select (0) Program Code.” Using the right
arrow (>) key, scroll to the following display:
Select (3) < >
User Card Number
Press [*] or [3].
4. The display will read “User Card Number Enter #” followed by
“000000000.” Enter the access card number using the number keys.
5. Press [#] when the access card number has been entered. The display
will return to “Select (3) User Card Number.”
Programming Access Cards for New Users
If there is the user has not yet been programmed on the system, follow
the steps outlined in Section 2.1 “Program a New Access Code.” Once
you have programmed such information as the user name, continue
programming from steps 3-5 from above.
Some access card numbers may have the letters A-F as either the first,
second, third or fourth digits. To enter these letters into the access card
number, press the [*] key followed by the number key corresponding to
the letter. The corresponding number keys are the following:
1=A 2=B 3=C 4=D 5=E 6=F
Access Level
Once the access card has been programmed, an access level can be
assigned to the user. The access level will determine when the user has
access to certain areas. Your installer will have to work with you to set
up various access levels on the system, depending on the access times
required.
24
Section 4: Access Control
Your installer will customize access levels 02-63 to suit your purposes.
Assigning access level 00 means that the user will never have access to
a given area. Assigning access level 01 means that the user will always
have access to a given area.
To program access level, perform the following. Your starting point
should be from the Program Code menu (from Step 3 above):
1. Use the right arrow (>) key to scroll to the following display:
Select (4) < >
Access Level
Press [*] or [4].
2. The display will read “Access Level Enter 00-63.” The numbers
“01”will be in the bottom right-hand corner of the display. This means
that the system has assigned Access Level 01 by default to the user
and the user will always have access. To assign another access level,
enter a 2-digit number from 00-63, corresponding to the new access
level.
3. Once the access level has been entered, press [#]. The display will
return to “Select (4) Access Level.”
User Options
Once the access level has been programmed, three different user
options must be programmed. These options are the following:
Car
CarddV alid
Valid
alid: This option allows the user’s access card to become active
on the system. Make sure the access card number is also programmed.
Prvleged Car d: A privilege card user will be able to access areas via an
Card
access card entry point when general access is prohibited. This option,
when enabled, will also give the user the ability to grant access to users
who have a “Wait for Privilege” access card (see next option).
Wait for Prvl
Prvl: This option will restrict the user’s access to areas via an
access card entry point when access is prohibited. A Wait for Privilege
user, however, can gain access to the system under the following
condition: A Privilege cardholder must present their card after the Wait
for Privilege user swipes theirs.
Table 2-1 shows which codes have these options turned on by default.
To change the user option settings for these features, follow the
directions outlined in Section 2.3 “Change User Code Options.”
25
4.3 Searching Using Access Card Numbers
(PC4820 Modules)
In Section 2.2 “Modify an Existing Code,” two methods were outlined for
searching for existing users: by access code number and by user name.
You may also search by access card number. To do so, perform the
following:
1. Enter [*][5] followed by a Master code.
2. The display will read “Select (0) for User Number Search.” Use the
right arrow (>) key to scroll to the following display:
Select (2) for
User Card Search
Press [2] or [*].
3. Enter the access card number. If the first, second, third or fourth
digits are letters, press [*] followed by the number key corresponding
to that letter (A = 1, B = 2, etc.).
4. Once you have entered the access card number, press [*]. If the
number is not available, the keypad will sound an error tone and
ask you to enter a new number.
26
Section 4: Access Control
27
Section 5: Testing and Maintenance
IMPORTANT NOTE: Test your system on a weekly basis and have any system
trouble conditions corrected by your installer or service technician.
28
Section 5: Te s t i n g and Maintenance
29
Section 6: Fire Safety
30
Section 6: Fire Safety
Do not locate smoke detectors at the top of peaked or gabled ceilings; the
dead air space in these locations may prevent the unit from detecting smoke.
Avoid areas with turbulent air flow, such as near doors, fans or windows.
Rapid air movement around the detector may prevent smoke from
entering the unit.
Do not locate detectors in areas of high humidity.
Do not locate detectors in areas where the temperature rises above 38oC
(100oF) or falls below 5oC (41oF).
31
6.3 Household Fire Safety Audit
Most fires occur in the home. To minimize this danger, a household fire
safety audit should be conducted and a fire escape plan should be
developed and practised.
1. Are all electrical appliances and outlets in a safe condition? Check
for frayed cords, overloaded lighting circuits, etc. If you are uncertain
about the condition of your electrical appliances or household service,
have a professional evaluate these units.
2. Are all flammable liquids stored safely in closed containers in a well
ventilated cool area? Cleaning with flammable liquids should be
avoided.
3. Are fire hazardous materials (matches) well out of reach of children?
4. Are furnaces and wood burning appliances properly installed, clean
and in good working order? Have a professional evaluate these
appliances.
32
Section 6: Fire Safety
33
Appendix A – Special Characters
Below is a chart indicating the available ASCII characters and the 3-digit number
required for each character. Instructions on programming ASCII characters is
outlined in Section 2 “Access Codes.”
032 048 064 080 096 112 160 176 192 208 224 240
033 049 065 081 097 113 161 177 193 209 225 241
034 050 066 082 098 114 162 178 194 210 226 242
035 051 067 083 099 115 163 179 195 211 227 243
036 052 068 084 100 116 164 180 196 212 228 244
037 053 069 085 101 117 165 181 197 213 229 245
038 054 070 086 102 118 166 182 198 214 230 246
039 055 071 087 103 119 167 183 199 215 231 247
040 056 072 088 104 120 168 184 200 216 232 248
041 057 073 089 105 121 169 185 201 217 233 249
042 058 074 090 106 122 170 186 202 218 234 250
043 059 075 091 107 123 171 187 203 219 235 251
044 060 076 092 108 124 172 188 204 220 236 252
045 061 077 093 109 125 173 189 205 221 237 253
046 062 078 094 110 126 174 190 206 222 238 254
047 063 079 095 111 127 175 191 207 223 239 255
34
LIMITED WARRANTY
Digital Security Controls Ltd. warrants the original able number of attempts will be limited to a replace-
purchaser that for a period of twelve months from the date ment of the product, as the exclusive remedy for breach
of purchase, the product shall be free of defects in materials of warranty. Under no circumstances shall Digital Se-
and workmanship under normal use. During the warranty curity Controls Ltd. be liable for any special, incidental,
period, Digital Security Controls Ltd. shall, at its option, or consequential damages based upon breach of
repair or replace any defective product upon return of the warranty, breach of contract, negligence, strict liability,
product to its factory, at no charge for labour and materials. or any other legal theory. Such damages include, but
Any replacement and/or repaired parts are warranted for are not limited to, loss of profits, loss of the product or
the remainder of the original warranty or ninety (90) days, any associated equipment, cost of capital, cost of sub-
whichever is longer. The original owner must promptly no- stitute or replacement equipment, facilities or services,
tify Digital Security Controls Ltd. in writing that there is down time, purchaser’s time, the claims of third parties,
defect in material or workmanship, such written notice to including customers, and injury to property.
be received in all events prior to expiration of the warranty Disclaimer of Warranties
period. This warranty contains the entire warranty and shall
International Warranty be in lieu of any and all other warranties, whether
The warranty for international customers is the same as expressed or implied (including all implied warranties
for any customer within Canada and the United States, of merchantability or fitness for a particular purpose)
with the exception that Digital Security Controls Ltd. shall And of all other obligations or liabilities on the part of
not be responsible for any customs fees, taxes, or VAT Digital Security Controls Ltd. Digital Security Con-
that may be due. trols Ltd. neither assumes nor authorizes any other per-
Warranty Procedure son purporting to act on its behalf to modify or to change
To obtain service under this warranty, please return the this warranty, nor to assume for it any other warranty
item(s) in question to the point of purchase. All autho- or liability concerning this product.
rized distributors and dealers have a warranty program. This disclaimer of warranties and limited warranty are
Anyone returning goods to Digital Security Controls Ltd. governed by the laws of the province of Ontario,
must first obtain an authorization number. Digital Secu- Canada.
rity Controls Ltd. will not accept any shipment whatso- WARNING: Digital Security Controls Ltd. recommends
ever for which prior authorization has not been obtained. that the entire system be completely tested on a regu-
Conditions to Void Warranty lar basis. However, despite frequent testing, and due
This warranty applies only to defects in parts and work- to, but not limited to, criminal tampering or electrical
manship relating to normal use. It does not cover: disruption, it is possible for this product to fail to per-
• damage incurred in shipping or handling; form as expected.
• damage caused by disaster such as fire, flood, wind, earth- Out of Warranty Repairs
quake or lightning; Digital Security Controls Ltd. will at its option repair or
• damage due to causes beyond the control of Digital replace out-of-warranty products which are returned to
Security Controls Ltd. such as excessive voltage, me- its factory according to the following conditions. Anyone
chanical shock or water damage; returning goods to Digital Security Controls Ltd. must
• damage caused by unauthorized attachment, alterations, first obtain an authorization number. Digital Security
modifications or foreign objects; Controls Ltd. will not accept any shipment whatsoever
• damage caused by peripherals (unless such peripherals for which prior authorization has not been obtained.
were supplied by Digital Security Controls Ltd.); Products which Digital Security Controls Ltd. determines
• defects caused by failure to provide a suitable installa- to be repairable will be repaired and returned. A set fee
tion environment for the products; which Digital Security Controls Ltd. has predetermined
• damage caused by use of the products for purposes other and which may be revised from time to time, will be
than those for which it was designed; charged for each unit repaired.
• damage from improper maintenance; Products which Digital Security Controls Ltd. determines
• damage arising out of any other abuse, mishandling or not to be repairable will be replaced by the nearest
improper application of the products. equivalent product available at that time. The current
market price of the replacement product will be charged
Digital Security Controls Ltd.’s liability for failure to
for each replacement unit.
repair the product under this warranty after a reason-
alert occupants of a fire for a number of reasons, some of which
WARNING Please Read Carefully follow. The smoke detectors may have been improperly installed
or positioned. Smoke may not be able to reach the smoke de-
Note to Installers tectors, such as when the fire is in a chimney, walls or roofs, or
This warning contains vital information. As the only individual in on the other side of closed doors. Smoke detectors may not
contact with system users, it is your responsibility to bring each detect smoke from fires on another level of the residence or
item in this warning to the attention of the users of this system. building.
System Failures Every fire is different in the amount of smoke produced and the
This system has been carefully designed to be as effective as pos- rate of burning. Smoke detectors cannot sense all types of fires
sible. There are circumstances, however, involving fire, burglary, equally well. Smoke detectors may not provide timely warning
or other types of emergencies where it may not provide protection. of fires caused by carelessness or safety hazards such as smoking
Any alarm system of any type may be compromised deliberately or in bed, violent explosions, escaping gas, improper storage of
may fail to operate as expected for a variety of reasons. Some but flammable materials, overloaded electrical circuits, children
not all of these reasons may be: playing with matches or arson.
■ Inadequate Installation Even if the smoke detector operates as intended, there may be
A security system must be installed properly in order to provide circumstances when there is insufficient warning to allow all oc-
adequate protection. Every installation should be evaluated by a cupants to escape in time to avoid injury or death.
security professional to ensure that all access points and areas are ■ Motion Detectors
covered. Locks and latches on windows and doors must be secure Motion detectors can only detect motion within the designated
and operate as intended. Windows, doors, walls, ceilings and other areas as shown in their respective installation instructions. They
building materials must be of sufficient strength and construction cannot discriminate between intruders and intended occupants.
to provide the level of protection expected. A reevaluation must be Motion detectors do not provide volumetric area protection. They
done during and after any construction activity. An evaluation by have multiple beams of detection and motion can only be detected
the fire and/or police department is highly recommended if this in unobstructed areas covered by these beams. They cannot detect
service is available. motion which occurs behind walls, ceilings, floor, closed doors,
■ Criminal Knowledge glass partitions, glass doors or windows. Any type of tampering
This system contains security features which were known to be whether intentional or unintentional such as masking, painting, or
effective at the time of manufacture. It is possible for persons with spraying of any material on the lenses, mirrors, windows or any
criminal intent to develop techniques which reduce the effective- other part of the detection system will impair its proper operation.
ness of these features. It is important that a security system be Passive infrared motion detectors operate by sensing changes in
reviewed periodically to ensure that its features remain effective temperature. However their effectiveness can be reduced when
and that it be updated or replaced if it is found that it does not the ambient temperature rises near or above body temperature or if
provide the protection expected. there are intentional or unintentional sources of heat in or near the
■ Access by Intruders detection area. Some of these heat sources could be heaters, radia-
Intruders may enter through an unprotected access point, circum- tors, stoves, barbeques, fireplaces, sunlight, steam vents, lighting
vent a sensing device, evade detection by moving through an area and so on.
of insufficient coverage, disconnect a warning device, or interfere ■ Warning Devices
with or prevent the proper operation of the system. Warning devices such as sirens, bells, horns, or strobes may not
■ Power Failure warn people or waken someone sleeping if there is an interven-
Control units, intrusion detectors, smoke detectors and many other ing wall or door. If warning devices are located on a different
security devices require an adequate power supply for proper op- level of the residence or premise, then it is less likely that the
eration. If a device operates from batteries, it is possible for the occupants will be alerted or awakened. Audible warning devices
batteries to fail. Even if the batteries have not failed, they must be may be interfered with by other noise sources such as stereos,
charged, in good condition and installed correctly. If a device op- radios, televisions, air conditioners or other appliances, or
erates only by AC power, any interruption, however brief, will passing traffic. Audible warning devices, however loud, may
render that device inoperative while it does not have power. Power not be heard by a hearing-impaired person.
interruptions of any length are often accompanied by voltage fluc- ■ Telephone Lines
tuations which may damage electronic equipment such as a secu- If telephone lines are used to transmit alarms, they may be out of
rity system. After a power interruption has occurred, immediately service or busy for certain periods of time. Also an intruder may
conduct a complete system test to ensure that the system operates cut the telephone line or defeat its operation by more sophisticated
as intended. means which may be difficult to detect.
■ Failure of Replaceable Batteries ■ Insufficient Time
This system’s wireless transmitters have been designed to provide There may be circumstances when the system will operate as
several years of battery life under normal conditions. The expected intended, yet the occupants will not be protected from the emer-
battery life is a function of the device environment, usage and type. gency due to their inability to respond to the warnings in a
Ambient conditions such as high humidity, high or low tempera- timely manner. If the system is monitored, the response may not
tures, or large temperature fluctuations may reduce the expected occur in time to protect the occupants or their belongings.
battery life. While each transmitting device has a low battery moni- ■ Component Failure
tor which identifies when the batteries need to be replaced, this Although every effort has been made to make this system as
monitor may fail to operate as expected. Regular testing and main- reliable as possible, the system may fail to function as intended
tenance will keep the system in good operating condition. due to the failure of a component.
■ Compromise of Radio Frequency ■ Inadequate Testing
(Wireless) Devices Most problems that would prevent an alarm system from oper-
Signals may not reach the receiver under all circumstances which ating as intended can be found by regular testing and mainte-
could include metal objects placed on or near the radio path or nance. The complete system should be tested weekly and im-
deliberate jamming or other inadvertent radio signal interference. mediately after a break-in, an attempted break-in, a fire, a storm,
■ System Users an earthquake, an accident, or any kind of construction activity
A user may not be able to operate a panic or emergency switch inside or outside the premises. The testing should include all
possibly due to permanent or temporary physical disability, inability sensing devices, keypads, consoles, alarm indicating devices
to reach the device in time, or unfamiliarity with the correct opera- and any other operational devices that are part of the system.
tion. It is important that all system users be trained in the correct ■ Security and Insurance
operation of the alarm system and that they know how to respond Regardless of its capabilities, an alarm system is not a substitute
when the system indicates an alarm. for property or life insurance. An alarm system also is not a substitute
■ Smoke Detectors for property owners, renters, or other occupants to act prudently to
Smoke detectors that are a part of this system may not properly prevent or minimize the harmful effects of an emergency situation.
AVIS: L’étiquette de l’Industrie Canada identifie ne dépasse pas 100.
le matériel homologué. Cette étiquette certifie que L’Indice de charge de ce produit est 0.1B.
le matériel est conforme à certaines normes de NOTICE: The Industry Canada label identifies
protection, d’exploitation et de sécurité des certified equipment. This certification means that
réseaux de télécommunications. Industrie Canada the equipment meets certain telecommunications
n’assure toutefois pas que le matériel fonctionnera network protective, operational and safety
à la satisfaction de l’utilisateur. requirements. Industry Canada does not guarantee
Avant d’installer ce matériel, l’utilisateur doit the equipment will operate to the user ’s
s’assurer qu’il est permis de le raccorder aux satisfaction.
installations de l’entreprise locale de Before installing this equipment, users should
télécommunication. Le matériel doit également ensure that it is permissible to be connected to the
être installé en suivant une méthode acceptée de facilities of the local telecommunications company.
raccordement. L’abonné ne doit pas oublier qu’il The equipment must also be installed using an
est possible que la conformité aux conditions acceptable method of connection. The customer
énoncées ci-dessus n’empêchent pas la should be aware that compliance with the above
dégradation du service dans certaines situations. conditions may not prevent degradation of service
Les réparations de matériel homologué doivent in some situations.
être effectuées par un centre d’entretien canadien Repairs to certified equipment should be made by
autorisé désigné par le fournisseur. La compagnie an authorized Canadian maintenance facility
de télécommunications peut demander à designated by the supplier. Any repairs or
l’utilisateur de débrancher un appareil à la suite alterations made by the user to this equipment, or
de réparations ou de modifications effectuées par equipment malfunctions, may give the
l’utilisateur ou à cause de mauvais telecommunications company cause to request the
fonctionnement. user to disconnect the equipment.
Pour sa propre protection, l’utilisateur doit User should ensure for their own protection that
s’assurer que tous les fils de mise à la terre de la the electrical ground connections of the power
source d’énergie électrique, les lignes utility, telephone lines and internal metallic water
téléphoniques et les canalisations d’eau pipe system, if present, are connected together.
métalliques, s’il y en a, sont raccordés ensemble. This precaution may be particularly important in
Cette précaution est particulièrement importante rural areas.
dans les régions rurales.
CAUTION: Users should not attempt to make
AVER TISSEMENT
TISSEMENT:: L’utilisateur ne doit pas
VERTISSEMENT such connections themselves, but should contact
tenter de faire ces raccordements lui-même; il doit the appropriate electric inspection authority, or
avoir recours à un service d’inspection des electrician, as appropriate.
installations électriques, ou à un électricien, selon
le cas. The Load Number (LN) assigned to each terminal
device denotes the percentage of the total load to
L’indice de charge (IC) assigné a chaque dispositif be connected to a telephone loop which is used
terminal indique, pour éviter toute surcharge, le by the device, to prevent overloading. The
pourcentage de la charge totale qui peut être termination on a loop may consist of any
raccordée à un circuit téléphonique bouclé utilisé combination of devices subject only to the
par ce dispositif. La terminaison du circuit bouclé requirement that the total of the Load Numbers of
peut être constituée de n’importe quelle all the devices does not exceed 100.
combinaison de dispositifs, pourvu que la somme
des indices de charge de l’ensemble des dispositifs The Load Number of this unit is 0.1B.
©2000 Digital Security Controls Ltd.
Toronto, Canada • www
oronto, .dsc.com
www.dsc.com
Printed in Canada 29005777 R001