Tyco Safety Canada 09PC9155 Wireless Security System User Manual 29007528R001 PC9155 1 0DSC UM ENG

Digital Security Controls Ltd. Wireless Security System 29007528R001 PC9155 1 0DSC UM ENG

User Manual

N114279032PC9155 Wireless Alarm SystemUser ManualWARNING: This manual contains information on limitations regarding product use andfunction and information on the limitations as to liability of the manufacturer. The entire manualshould be carefully read.
FCC COMPLIANCE STATEMENTCAUTION: Changes or modifications not expressly approved by Digit-al Security Controls could void your authority to use this equipment.This equipment has been tested and found to comply with the limits for a ClassB digital device, pursuant to Part 15 of the FCC Rules. These limits are designedto provide reasonable protection against harmful interfer-ence in a residential in-stallation. This equipment generates, uses and can radiate radio frequency ener-gy and, if not installed and used in accordance with the instructions, may causeharmful interference to radio communications. However, there is no guaranteethat interference will not occur in a particular installation. If this equipment doescause harmful interference to radio or television reception, which can be deter-mined by turning the equipment off and on, the user is encouraged to try to cor-rect the interference by one or more of the following measures:• Re-orient the receiving antenna.• Increase the separation between the equipment and receiver.• Connect the equipment into an outlet on a circuit different from that to whichthe receiver is connected.• Consult a dealer or experienced radio/television technician for help.The user may find the following booklet prepared by the FCC useful: ’How toIdentify and Resolve Radio/Television Interference Problems’. This booklet isavailable from the U.S. Government Printing Office, Washington D.C. 20402,Stock # 004-000-00345-4.IMPORTANT INFORMATIONThis equipment complies with Part 68 of the FCC Rules and, if the product wasapproved July 23, 2001 or later, the requirements adopted by the ACTA. On thetop side of this equipment is a label that contains, among other information, aproduct identifier. If requested, this number must be provided to the TelephoneCompany.  Product Identifier: US:F53AL01B9155  USOC Jack: RJ-31XTelephone Connection Requirements A plug and jack used to connect this equipment to the premises wiring and tele-phone network must comply with the applicable FCC Part 68 rules and require-ments adopted by the ACTA. A compliant telephone cord and modular plug isprovided with this product. It is designed to be connected to a compatible mod-ular jack that is also compliant. See installation instructions for details.Ringer Equivalence Number (REN)The REN is used to determine the number of devices that may be connected toa telephone line. Excessive RENs on a telephone line may result in the devicesnot ringing in response to an incoming call. In most but not all areas, the sum ofRENs should not exceed five (5.0). To be certain of the number of devices thatmay be connected to a line, as determined by the total RENs, contact the localTelephone Company. For products approved after July 23, 2001, the REN forthis product is part of the product identifier that has the format US:AAAEQ##TXXXX. The digits represented by ## are the REN without a deci-mal point (e.g., 03 is a REN of 0.3). For earlier products, the REN is separatelyshown on the label.        REN = 0.1BIncidence of HarmIf this equipment (PC9155-433) causes harm to the telephone network, the tel-ephone company will notify you in advance that temporary discontinuance ofservice may be required. But if advance notice is not practical, the TelephoneCompany will notify the customer as soon as possible. Also, you will be advisedof your right to file a complaint with the FCC if you believe it is necessary.Changes in Telephone Company Equipment or FacilitiesThe Telephone Company may make changes in its facilities, equipment, opera-tions or procedures that could affect the operation of the equipment. If this hap-pens the Telephone Company will provide advance notice in order for you tomake necessary modifications to maintain uninterrupted service.Equipment Maintenance FacilityIf trouble is experienced with this equipment (PC9155/WT5500) for repair orwarranty information, contact the facility indicated below. If the equipment iscausing harm to the telephone network, the Telephone Company may requestthat you disconnect the equipment until the problem is solved. This equipmentis of a type that is not intended to be repaired by the end user.DSC c/o APL Logistics 757 Douglas Hill Rd., Lithia Springs, GA 30122Additional InformationConnection to party line service is subject to state tariffs. Contact the state publicutility commission, public service commission or corporation commission forinformation.Alarm dialling equipment must be able to seize the telephone line and place acall in an emergency situation. It must be able to do this even if other equipment(telephone, answering system, computer modem, etc.) already has the telephoneline in use. To do so, alarm dialling equipment must be connected to a properlyinstalled RJ-31X jack that is electrically in series with and ahead of all otherequipment attached to the same telephone line. Proper installation is depicted inthe figure below. If you have any questions concerning these instructions, youshould consult your telephone company or a qualified installer about installingthe RJ-31X jack and alarm dialling equipment for you.INDUSTRY CANADA STATEMENTNOTICE: This product meets the applicable Industry Canada technical spec-ifications.Le présent materiel est conforme aux specifications techniques applicables d’In-dustrie Canada.The Ringer Equivalence Number (REN) for this terminal equipment is 0.1 .L'indice d'équivalence de la sonnerie (IES) du présent matériel est de 0.1.The Ringer Equivalence Number is an indication of the maximum number of de-vices allowed to be connected to a telephone interface. The termination on an in-terface may consist of any combination of devices subject only to therequirement that the sum of the RENs of all the devices does not exceed five.L’indice d’équivalence de la sonnerie(IES) sert à indiquer le nombre maximal de terminaux qui peuvent être raccordésà une interface téléphonique. La terminaison d’une interface peut consister enune combinaison quelconque de dispositifs, à la seule condition que la sommed’indices d’équivalence de la sonnerie de tous les dispositifs n’excède pas 5.The term ’IC:’ before the radio certification number only signifies that IndustryCanada technical specifications were met.Certification Number IC: 160A-PC9155This Class B digital apparatus complies with Canadian ICES-003.Cet appareil numérique de la classe B est conforme à la norme NMB-003 duCanada.TelephoneComputerTelephoneTelephoneFax MachineAlarm DialingEquipmentRJ-31XJack UnusedRJ-11 JackTelephoneLineNetworkServiceProvider'sFacilitiesCustomer Premises Equipment and WiringUnusedRJ-11 JackNetworkDemarcationPoint AnsweringSystemNew Zealand - The following is a list of warnings applicable when this equipment is connected to the New Zealand Telecom Network. General WarningThe grant of a Telepermit for any item of terminal equipment indicates only that Telecom has accepted that the item com-plies with minimum conditions for connection to its network. It indicates no endorsement of the product by Telecom, nordoes it provide any sort of warranty. Above all, it provides no assurance that any item will work correctly in all respectswith another item of Telepermitted equipment of a different make or model, nor does it imply that any product is com-patible with all of Telecom's network services.Reverse Numbering (decadic signalling)Decadic signalling should not be used as it is being progressively phased out of the network. DTMF dialling is 100%available and it should always be used.Line Grabbing EquipmentThis equipment is set up to carry out test calls at pre-determined times. Such test calls will interrupt any other calls thatmay be set up on the line at the same time. The timing set for such test calls should be discussed with the installer.The timing set for test calls from this equipment may be subject to 'drift'. If this proves to be inconvenient and your callsare interrupted, then the problem of timing should be discussed with the equipment installer. The matter should NOT bereported as a fault to Telecom Faults Service.D.C. Line Feed to Other DevicesDuring dialling, this device unit does not provide DC voltage to the series port connection and this may cause loss ofmemory functions for the terminal devices (local telephone) connected to T-1, R-1.General Operation (ringer sensitivity and loading)This device only responds to Distinctive Alert cadences DA1 and DA2.
iTable of ContentsAbout Your Security System  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Fire Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1General System Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Controls & Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Language Selection   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Arming & Disarming the System  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Stay Arming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Night Arming. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Silent Exit Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Away Arming  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Quick Exit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Bell/Siren Sounds After Away Arming  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Disarming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Remote Arming and Disarming  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Emergency Keys  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4When Alarm Sounds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Intrusion (Burglar) Alarm Continuous Siren . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Fire Alarm Pulsed Siren . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Time & Date Programming  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Bypassing Zones   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Trouble Conditions  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Alarm Memory  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Door Chime (Entry/Exit Beeps)  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Access Code Programming  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Access Codes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7User Code Attributes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Zone Bypassing Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Bell Squawk Attribute   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Erasing an Access Code  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8User Function Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Changing Brightness/Contrast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Changing the Buzzer Level  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Viewing the Event Buffer  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Late to Open. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Proximity Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92-Way Wireless Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Function Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Display Icons  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Buzzer  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Keylock Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Testing Your System   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Sounder and Display Test  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Walk Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Allowing Computer Access To Your System  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
iiReference Sheets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11System Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Access Codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Sensor / Zone Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Guidelines for Locating Smoke Detectors  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  14Household Fire Safety Audit   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Fire Escape Planning  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Always ensure you obtain the latest version of the User Guide. Updated versions of thisUser Guide are available by contacting your distributor.IMPORTANT SAFETY INSTRUCTIONSTo reduce the risk of fire, electric shock and/or injury, observe the following:• Do not spill any type of liquid on the equipment.• Do not attempt to service this product yourself. Opening or removing the cover may expose you to dangerous voltage or other risk. Refer servicing to qualified service per-sonnel. Never open the device yourself.• Do not touch the equipment and its connected cables during an electrical storm; there may be a risk of electric shock from lightening.• Do not use the Alarm System to report a gas leak if it is near the leak.REGULAR MAINTENANCE AND TROUBLESHOOTINGKeep your Alarm Controller in optimum condition by following all the instructions that areincluded within this manual and/or marked on the product.CLEANING• Clean the enclosure (case) by wiping with a damp cloth only.• Do not use abrasives, thinners, solvents or aerosol cleaners (spray polish) that may enter through holes in the enclosure (case) of the Alarm Controller and cause damage.• Do not use any water or any other liquid.• Do not wipe the front cover with alcohol.TROUBLESHOOTINGOccasionally, you may have a problem with your Alarm Controller or telephone line. If thishappens, your Alarm Controller usually identifies the problem and displays an error mes-sage. Refer to the provided list when you see an error message on the display. If additionalhelp is required, contact your distributor for service.WARNING: This equipment, PC9155 Alarm System shall be installed and used within anenvironment that provides the pollution degree max 2 and over-voltages category II non-hazardous locations, indoor only. It is designed to be installed, serviced and/or repaired byservice persons only; [service person is defined as a person having the appropriate techni-cal training and experience necessary to be aware of hazards to which that person may beexposed in performing a task and of measures to minimize the risks to that person or otherpersons]. For EU and Australian Markets, the equipment is permanently connected; anaccessible disconnect device shall be incorporated in the building installation wiring. ForNorth America it is a direct plug-in connection; the socket outlet shall be installed near thePC9155 and shall be easily accessible. The plug of the direct plug-in transformer serves asthe disconnect device. NOTE: There are no parts replaceable by the end-user within this equipment.This publication covers the following models:• PC9155-433 •  PC9155-868 • WT5500-433 • WT5500P-868• PC9155D-433 •  PC9155D-868 • WT5500P-433 • PT4• PC9155G-433 •  PC9155G-868 • WT5500-868 • PT8NOTE:  868 MHz models are not UL/ULC listed.
1About Your Security SystemRead this manual carefully and have your installer instruct you on your system's operation andon which features have been implemented in your system. All users of this system should beequally instructed in its use. Fill out the ’System Information’ page with all of your zone informa-tion and access codes and store this manual in a safe place for future reference.NOTE:   Please consult your installer for further information regarding the false alarm reduction features built into your system as all are not covered in this manual.Fire DetectionThis equipment is capable of monitoring fire detection devices such as smoke detectors andproviding a warning if a fire condition is detected. Good fire detection depends on having ade-quate number of detectors placed in appropriate locations. This equipment should be installedin accordance with NFPA 72 (N.F.P.A., Battery march Park, Quince MA 02269). Carefully reviewthe Family Escape Planning guidelines in this manual.NOTE:  Your installer must enable fire detection before it becomes functional.Te s t i n gTo ensure that your system continues to function as intended, you must test your system weekly.Please refer to the ‘Testing your System’ section in this manual. If your system does not functionproperly, call your installing company for service.MonitoringThis system is capable of transmitting alarms, troubles & emergency information to a central sta-tion. If you initiate an alarm by mistake, immediately call the central station to prevent an unnec-essary response.NOTE: The monitoring function must be enabled by the installer before it becomes functional.NOTE: This system has a communicator delay of 30 seconds. It can be removed, or it can be increased up to 45 seconds by the installer.NOTE: Ensure that your Installer verifies that your system is compatible with the Central Station Receiver format at yearly intervals.MaintenanceWith normal use, the system requires minimum maintenance. Note the following points:• Do not wash the security equipment with a wet cloth. Light dusting with a slightly moistened cloth should remove normal accumulations of dust.• The standby battery shall be replaced every 4-5 years by service persons only. NOTE:  Do not attempt to replace the battery or open the enclosure, there is a risk of electric shock and/or fire.• For other system devices such as smoke detectors, motion detectors, glassbreak detectors or door/window contacts, consult the manufacturer’s literature for testing and maintenance instructions if applicable.General System OperationYour security system includes an alarm control/keypad and various sensors and detectors. Thekeypad is mounted by the main exit/entry location. The security system has several zones of area protection. Each of these zones communicates toa single wireless sensor (motion detectors, glassbreak detectors, door contacts, etc.) or to oneor more hard wired sensors. A sensor in alarm is indicated by messages on the LCD keypad. Additional features include Automatic Inhibit (Swinger Shutdown) for Alarm; Tamper and Troublesignals after 3 occurrences in a given set period; and a Programmable Keypad Lockout option.For SIA CP-01 classified installations, the swinger shutdown feature is programmed such thatone or two trips will shut down the zone. The zone will be restored after a manual reset (by enter-ing the access code at the time of disarming the alarm system) or it will be reset automaticallyafter 48 hours with no trips on any zones.NOTE:  Only the installer or service professional should have access to the system.
2 Keypad Controls & IndicatorsIMPORTANT NOTICEA security system cannot prevent emergencies. It is only intended to alert you and – if included –your central station of an emergency situation. Security systems are generally very reliable butthey may not work under all conditions and they are not a substitute for prudent security prac-tices or life and property insurance. Your security system should be installed and serviced byqualified security professionals who should instruct you on the level of protection that has beenprovided and on system operations.Language SelectionYour system can display messages in different languages. 1. Press and hold both   buttons simultaneously.2. Using the   buttons, scroll through the available languages.3. Press   to select your desired language.Arming & Disarming the SystemStay ArmingStay arming will bypass the interior protection (i.e. motion sensors) and arm the perimeter of thesystem (i.e. doors and windows). Close all sensors (i.e. stop motion and close doors). TheReady ( ) indicator should be on. Press and hold the Stay   button until it beeps (approx. 2 seconds) and/or enter your AccessCode and do not leave the premises. During the setting state (exit delay active), the Armed ( )and Ready ( ) indicators will light. When the exit delay is completed, the alarm system is armed/set and this is indicated on thekeypad as follows: the Ready ( ) indicator will turn off, the Armed ( ) indicator will remain on.The Armed ( ) indicator and a bypass message will be displayed. The system will automati-cally bypass certain interior sensors (i.e. motion sensors).NOTE:  For SIA FAR listed panels, the Stay Arming Exit Delay will be twice as long as the Away Arming Exit Delay.NOTE:  If your system is installed in accordance with SIA CP-01 Standard for False Alarm Reduction then the security system will arm in the Stay Armed mode if the exit delay time expires and no exit has been made.Night ArmingTo fully arm the system when it has been armed in Stay Mode, press   at the keypad. Allinterior zones will now be armed except for devices programmed as Night Zones.  NOTE: Your installer can also program a function key on the keypad to allow you to arm the system in Night Mode. This would allow Night Arming to be activated by holding down a function key for 2 seconds.Night zones are only armed in Away mode, this permits limited movement within the premiseswhen the system is fully armed. Ensure that your installer has provided you with a list identifyingzones programmed as night zones.  123456780#9*Enter Code toArm System <>StayFunction KeysLED IndicatorsReadyArmedTroublePowerAwayChimeBypassQuickExitScroll KeysBacklightingSensorLCDProx Tag Detector(if available)Emergency KeysFireAuxiliaryPanic< > indicates user canscroll through options9033✱✱
3When the interior zones are activated (i.e.,  ) you must enter your access code to disarmthe system to gain access to interior areas that have not been programmed as night zones.Silent Exit DelayIf the system is armed using the Stay button or using the ’No Entry’ Arming method ([access code]), the audible progress annunciation (keypad buzzer) will be silenced and the exittime will be doubled for that exit period only.Away ArmingClose all sensors (i.e. stop motion and close doors). The Ready ( ) indicator should be on.To arm, press and hold the Away Button for 2 seconds and/or enter your Access Code, or press  to Quick Arm. During the setting state (exit delay active) the Armed ( ) and Ready ( ) indicators will turn on,and the keypad will sound one beep per second. You now have ____ seconds to leave the prem-ises (please check with your installer to have this time programmed). An audible annunciation,whose pulsating rate is distinctly different, will sound during the last ten seconds of the exit delayto warn person(s) that the exit delay is running out. To cancel the arming sequence, enter youraccess code or present your prox tag.When the exit delay is completed, the alarm system is armed and this is indicated on the keypadas follows: the Ready ( ) indicator will turn off, the Armed ( ) indicator will remain on and thekeypad will stop sounding. The system can also be armed/disarmed with a wireless key and with proximity tags. Refer tothe ‘Proximity Tags’ and ‘2-Way Wireless Key’ sections on page 9 for more details.NOTE: If your system is installed in accordance with SIA CP-01 Standard for False Alarm Reduction then the violation, restoral followed by a second violation of the entry/exit zone before the end of the exit delay will restart the exit delay.Quick ExitIf the system is armed and you need to exit, use the Quick Exit function to avoid disarming andrearming the system. Press and hold the Quick Exit button for 2 seconds or press  . Younow have 2 minutes to leave the premises through your exit door. When the door is closed again,the remaining exit time is cancelled.Bell/Siren Sounds After Away ArmingAudible Exit FaultIn order to reduce false alarms, the Audible Exit Fault is designed to notify you of an improperexit when arming the system. If you fail to securely close the Exit/Entry door during the pro-grammed exit delay period, the system will sound the alarm to indicate an improper exit (yourinstaller will tell you if this feature has been enabled on your system). If this occurs:1. Re-enter the premises.2. Enter your access code, or present your prox tag, before the entry delay timer expires, to dis-arm the system.3. Follow the Away arming procedure again, ensure that the entry/exit door(s) are secured.Arming ErrorAn error tone will sound if the system is unable to arm. This will happen if the system is not readyto arm (i.e. sensors are open), or if an incorrect user code has been entered. If this happens,ensure all sensors are secure, press   and try again. DisarmingEnter your access code to disarm the system when it is armed (Armed ( ) indicator is on). Thekeypad will sound a continuous tone after the entry delay has been initiated by opening theentry/exit door.  Enter your code within _______ seconds to avoid an alarm condition (check withyour installer to have this time programmed).Disarming ErrorIf your code is invalid, the system will not disarm and a 2-second error tone will sound. If thishappens, press   and try again. ✱✱✱✱
4Remote Arming and DisarmingThe system can be armed and/or disarmed, if programmed by the installer, using a remote con-trol device (wireless key). When arming the system using the Arm button on a 1-way wirelesskey, the system will acknowledge the command by sounding a single bell squawk. When dis-arming using the Disarm button on a 1-way wireless key, the system will acknowledge the com-mand by sounding two bell squawks. Three squawks when disarming with the disarm buttonindicates that an alarm occurred while the system was armed. If you are unsure of the cause ofthe alarm, proceed with caution (see section on 2-Way Wireless Keys).Emergency KeysPress the   (Fire),  (Auxiliary) or   (Panic) button for 2 seconds to generate a Fire,Auxiliary or Panic alarm. The keypad sounder will beep indicating that the alarm input has beenaccepted and transmission to the central station is underway. The   button may or may notsound the bell depending on installer setup.NOTE: The Fire button can be disabled by the installer. When Alarm SoundsThe system can generate 2 different alarm sounds:• Continuous Siren = Intrusion/Burglary Alarm• Temporal / Pulsed Siren = Fire Alarm• 4 beeps, 5-second pause, 4 beeps = Carbon Monoxide alarmIntrusion (Burglary) Alarm Continuous SirenIf you are unsure of the source of the alarm, proceed with caution! If the alarm was accidental,enter your Access Code to silence the alarm. If the alarm system is disarmed within the pro-grammed Abort Window (check with the installer if this option has been enabled on your systemand what is the transmitter delay time programmed), no alarm transmission to the Central Stationwill occur. Starting at the end of the Abort Window there is a five minute Cancel window, duringwhich a user can cancel, by entering his access code, an alarm that has been previously trans-mitted. A cancel signal will be transmitted to the Central Station and the alarm system will alsoannunciate that the cancel signal was transmitted. Call your central station to avoid a dispatch.Fire Alarm Pulsed Siren  Follow your emergency evacuation plan immediately! If the fire alarm was accidental (i.e. burned toast, bathroom steam, etc.), enter your AccessCode to silence the alarm. Call your central station to avoid a dispatch. Carbon Monoxide AlarmActivation of your CO alarm indicates the presence of carbon monoxide (CO) which can be fatal.During an alarm, the red LED light flashes rapidly and buzzer sounds with a repeating cadenceof: 4 quick beeps, 5 second pause, 4 quick beeps.  If alarm sounds:1. Operate silence button.2. Call your emergency services or fire department or 911.3. Immediately move to the fresh air outdoors or by an open door/window.WARNING: Carefully review your Carbon Monoxide Installer/User Guide to determine the neces-sary actions required to ensure your safety and ensure that the equipment is operating correctly. Incorporate the steps outlined in the guide into your evacuation plan.Time & Date ProgrammingPress   then your Master Access Code to enter UserFunctions. Use the   buttons to find the menu optionthen press   to select. Enter the time in 24-hr. format(HH:MM), followed by the date (MM:DD:YY). Press   to exitprogramming. If you are viewing a ‘Loss of Clock’, trouble from within the trouble menu( ), press   to directly enter Date and Time programming (see Trouble Conditions onpage 6). NOTE:  Your installer may have programmed your system to display the time and date while the keypad is idle. Press the   button to temporarily clear the date and time display if desired.HH:MM MM/DD/YY09:06 01/31/09✱✱✱✱
5Bypassing ZonesUse the zone bypassing feature when you need access to a protected area while the system isarmed, or when a zone is temporarily out of service but you need to arm the system. Bypassedzones will not be able to sound an alarm. Bypassing zones reduces the level of security. If youare bypassing a zone because it is not working, call a service technician immediately so that theproblem can be resolved and your system returned to proper working order. Ensure that nozones are unintentionally bypassed when arming your system. Zones cannot be bypassed oncethe system is armed. Bypassed zones (except for 24-hr zones) are automatically cancelled eachtime the system is disarmed and must be bypassed again, if required, before the next arming.With the system disarmed: Activating All Bypassed ZonesTo remove bypass (all zones):1. Press  , then your access code if required.2. Press . 3. To exit bypassing mode and return to the Ready state, press  .Recalling Bypassed ZonesTo recall the last set of bypassed zones:1. Press  , then your access code if required.2. Press . 3. To exit bypassing mode and return to the Ready state, press  .Bypass GroupA Bypass Group is a selection of zones programmed into the system. If you bypass a group ofzones on a regular basis, you can program them into a Bypass Group, so that you do not have tobypass each zone individually every time. Only one Bypass Group can be programmed.NOTE:  If a group has already been bypassed before programming a Bypass Group, you will be unable to recall that group after programming the new group.To program a bypass group:1. Press  , then your access code if required. 2. Enter the two-digit numbers (01-34) of the zones to be included in the Bypass Group or use the   buttons to find the zone to be included in the bypass group, then press   to select the zone. 3. To save the selected zone into the group, press  .4. To exit bypassing mode and return to the Ready state, press  .NOTE:  If an access code is required to enter bypassing, only the Master Code and codes with Supervisory enabled can set the Bypass Group.To select a bypass group when arming the system:1. Press  , then your access code (if necessary).2. Press  . The next time the system is armed, the zones in this group will be bypassed.3. To exit bypassing mode and return to the Ready state, press  . NOTE:  A Bypass Group is only recalled if the system is armed/disarmed after programming the bypass group.NOTE:  This feature is not to be used in UL Listed installations.1. Press   to enter the function menu, the keypad will display the screen on the right.2. Press  or .3. If your system is programmed to require access codes this screen will be displayed.  Enter your 4-digit access code.4. Scroll to the desired zone number using the   keys, then press   to select the zone OR5. Directly enter the 2-digit number of the zone you wish to bypass (e.g., 0 5 for zone 5).  ✱✱Press (*) for <>Zone Bypass✱Enter YourAccess CodeScroll to     <>Bypass Zones✱✱✱✱✱
6Trouble ConditionsWhen a trouble condition is detected, the Trouble ( ) indicator will turn on, and the keypad willbeep every 10 seconds. Press the   button to silence the beeps. Press   to view thetrouble condition. The Trouble ( ) indicator will flash. Use the   keys to view troubles. Alarm MemoryWhen an alarm occurs, the Alarm Memory message will be displayed. To view which sensor(s)generated the alarm, press  . For the system keypad use the scroll   buttons to view the sensors in alarm memory. Press to exit. To clear the memory, arm and disarm the system. If an alarm sounded while armed,the system will automatically go to alarm memory when you disarm the system. In this instance,you should approach with caution, as the intruder may still be within the building/premises.Door ChimeTo turn the door chime function on or off, press and hold the Chime   button for 2 seconds orpress  . The system will sound three beeps to indicate the door chime is on or one longtone to indicate that door chime is off.Access Code ProgrammingIn addition to the Master Access Code, you can program up to 16 additional User Access codes.If wireless keys have been programmed then wireless key #1 will log as User Access code #1 (ifthat access code has been programmed). User Access codes 1-16 will correspond to wirelesskeys or prox tags 1-16. Press  , plus your Master Access Code, the armed ( ) indicatorwill turn on.Trouble Condition Comments ActionAlternate Communicator TroubleIndicates AC Failure, Low Battery, Sim Card lock, GSM Trouble, Ethernet Trouble, Central Station Receiver Trouble, Supervision Config SMS Trouble for GS/IP module if installed. Press   to scroll through troubles.Call for service.  For Ethernet Trou-ble Check LAN connections.Service Required (Press [1] for more information)Indicates Low Battery, System Trouble, System Tamper or RF Jam detected.Call for service.Loss of AC Power If the building and/or neighbourhood has lost electrical power, the system will continue to operate on battery for several hours.Check AC connection.Call for service.Telephone Line Fault The system has detected that the telephone line is dis-connected.Call for service.Failure to CommunicateThe system attempted to communicate with the monitoring station but failed. This may be due to a Telephone Line Fault.Call for service.Module/Sensor FaultThe system is experiencing difficulties with one or more module/sensors on the system. Continue to press   to navigate through the Zone, Keypad and Siren fault menus.   Call for service.Module/Sensor TamperThe system has detected a tamper condition with one or more module/sensor on the system. Continue to press  to navigate through the Zone, Keypad and Siren tamper menus.  Call for service.Module/Sensor Low BatteryThe system has detected a low battery condition with one or more module/sensor on the system. Continue to press  to display the zone(s), wireless key(s), keypad(s), siren(s) and prox tag(s).Call for service.Loss of Time & Date If complete power was lost (AC and Battery), the time and date will need to be re-programmed. Press  .Re-program Time & Date (see page 4).✱✱✱✱✱
7Enter the 2-digit number to be programmed (i.e. 06 for user access code 6; enter 40 for the Mas-ter Access Code) or press the   buttons to find the specific code and press   toselect. Enter the new 4-digit access code. When programming is complete, enter another 2-digitcode to program or press   to exit. The access codes have programmable attributes whichallow zone bypassing, duress, supervisor or one-time use activation. Access Codes[✱][5][Master Code] (when disarmed)The [✱][5] User’s Programming command is used to program additional access codes.User Codes - User Codes 1-16 are available for the System. Master Code (Access Code 40) - The Master Code has all of the attributes listed in the Pro-grammable Attributes list below except for Duress (2) and One Time Use (8) and is required toprogram all Supervisor Code attributes.Supervisor Codes - These codes are always valid when entering the   User Code Pro-gramming or   User Function sections. However, these codes can only program addi-tional codes which have equal or lesser attributes. Once programmed, the Supervisor Codesreceive the Master Code’s attributes. These attributes are changeable. Any User Code can bemade a supervisor code by enabling User Code Attribute 1 (please see below for details). Duress Codes - Duress codes are standard User Codes that will transmit the Duress AlarmReporting Code whenever the code is entered to perform any function on the system. Any UserCode can be made a Duress Code by enabling User Code Attribute 2 (see below for details). One Time Use Code - This code permits temporary access to the system for a 24 hour timeperiod. During the 24hr period, the temporary user may disarm the system once. There is norestriction on the number of times the temporary user may arm the system during the time period.NOTE: Duress codes are not valid when entering [✱][5], [✱][6] or [✱][8] sections.NOTE: Access codes cannot be programmed as a duplicate or as a ’Code +/- 1’.Enrolling/Deleting PT4/PT8 Proximity TagsEnrolling Proximity TagsTo enrol proximity tags on your security system:1. With the supervisor attribute enabled, enter [*][5] then your access code.2. Select the code number (01-16) associated with the prox tag.3. Enter the code number (01-16), the keypad will then prompt you to swipe your prox tag. The keypad will beep and display 'Tag Accepted'. The tag is now enrolled. NOTE: If the tag has already been assigned to a user, an error tone will sound.Deleting Proximity TagsTo remove proximity tags from your system:1. With the supervisor attribute enabled, enter [*][5] then your access code.2. Press [>], the prompt 'Delete All Tags' will be displayed on the keypad.3. Press [*] to delete all prox tags. User Code Attributes1. The default attributes of a new code will be the attributes of the code used to enter    whether it is a new code or an existing code being programmed. 2. System Master (Code 40) has Attribute 3 on by default. NOTE:  These attributes are not changeable.Inherent Attributes (all codes except installer)Arm / Disarm - Any Access Code will be valid for arming and disarming the system.Command Outputs ([✱][7][1] and [✱][7][2]) - If these outputs require Access Code entry, anyAccess Code is valid for performing the [✱][7][1-2][Access Code] functions on the system.Programmable Attributes ([✱][5][Master/Supervisor Code [9][Code])1 Supervisor Code 4-6 For Future Use2 Duress Code 7 Bell Squawk upon Away Arming/Disarming3 Zone Bypassing Enabled 8 One Time Use Code✱✱✱✱
8Zone Bypassing AttributeThis attribute allows the user to manually bypass zones if bypassing requires an access code.Bell Squawk AttributeThis attribute is used to determine whether an access code should generate an arming/disarm-ing squawk when the away function key is pressed on a wireless key. Contact your installer tohave this programmed. The Master Code cannot use Bell Squawk attribute, but is required toenable it for other codes. NOTE:  This feature cannot prevent the Arm/Disarming squawks from being generated if an access code assigned to a wireless key is manually entered at a keypad.Erasing an Access CodeTo erase a code, select the code and enter   as the first digit. If   is entered, the systemwill delete the code (including the associated proximity tag) immediately and the user will bereturned to select another code.User Function CommandsDisarm the system then enter   [Master Code]. The   command is used to gainaccess to the following list of Master functions of the system: [1] Time and Date  -  Enter 4 digits for 24hr System Time (HH-MM). Valid entries are 00-23 forthe hour and 00-59 for minutes. Enter 6 digits for the Month, Day and Year (MM-DD-YY). [2]-[3] For Future Use.[4] System Test - The system’s Bell Output - 4 seconds (2 seconds medium volume, 2 secondshigh volume), keypad lights, back-up battery pack and communicator are tested.[5] Enable DLS / Allow Remote System Service - If enabled, the installer will be able toaccess Installer Programming remotely using DLS (Downloading Software). This function pro-vides a window for telephone ring detection by the alarm system. The DLS window will remainopen for 6 hours, during which time the installer will be able to enter DLS an unlimited number oftimes. After the 6-hr window has expired, access to programming via DLS will be unavailableuntil the window is re-opened. [6] User Call-up - If enabled by the installer, the panel will make 1 attempt to call the download-ing computer. The downloading computer must be waiting for the panel to call before down-loading can be performed.[7] For Future Use.[8] User Walk Test - Allows the user to enter the Walk Test mode. See Walk Test on page 11.[9] Late to Open Enable/Disable - This function enables or disables the Late to Open time pro-grammed in [0].[0] Late to Open Time of Day - This function is used to program the time setting enabled in [9].Changing Brightness/ContrastWhen this option is selected, the keypad will allow you to scroll through 4 brightness levels and10 contrast levels.1. Press   [Master Code]. 2. Use the   buttons to scroll to either Brightness Control or Contrast Control.3. Press   to select the setting you want to adjust.4. a) ‘Brightness Control’: There are 4 backlighting levels. Use the   buttons to scroll to the desired level.b) ‘Contrast Control’: There are 10 different display contrast levels. Use the   buttons to scroll to the desired contrast level. 5. To exit, press  .Changing the Buzzer LevelWhen this option is selected, the keypad will allow you to scroll through 21 different buzzer lev-els. A level of 00 disables the buzzer.1. Press   [Master Code].2. Use the   buttons to scroll to Buzzer Control.3. There are 21 different levels, use the   buttons to scroll to the desired level.✱✱✱✱✱✱✱
9Viewing the Event BufferThe event buffer will show you a list of the last 500 events that have occurred on your system.1. Press   [Master Code]. 2. To select Event Buffer viewing, press  . 3. The keypad will display the event number and the time and date. Press   to switch between this information and the event details. 4. Use the   buttons to scroll through the events in the buffer. 5. To exit event buffer viewing, press  .Late to OpenNOTE: The Late to Open feature function requires the monitoring station to forward calls to the user. Verify with the installer whether this function is active.[9] Late to Open Enable/Disable This function enables or disables the Late to Open time programmed in [0].The ’Late to Open’ feature is typically used to track children after school. For example, if the par-ents get home from work at 5pm, and a child gets home at 4pm. The programmable timer could be set for 4:15.  If the system is not disarmed at this time an alert would be sent to the parents.The keypad will display ’Late to Open is Enabled’ and sound a beep if   is pressed within the User Functions menu when this feature is off. The LCD keypad will display ’Late to Open is Disabled’ and sound an error tone if   is pressed within the User Functions menu when this feature is on.[0] Late to Open Time of Day This function is used to program the time setting enabled in [9]. This function programs the ’Late to Open’ time of day for all 7 days of the week.• Valid entries for these sections are 00:00 – 23:59. • Entering 99:99 will disable the late to open feature for the current day.• After entering   menu, beeps will be sounded and ’Press (✱) for < > Sunday’ will be displayed on the keypad.  • Pressing the left scroll     button will cause the keypad to update, displaying each day of the week, from Sunday to Saturday.  While in the Late to Open menu, entering keys 1-7 will also select each day from Sunday to Saturday respectively.  •If  is pressed to select a day of the week, no beeps will be sounded and the keypad will display ’Set 24hr Time’ ’Enter HH:MM 9999’.  If    is pressed from this menu, the user will be returned to the previous Late to Open menu.• If the Alarm System is armed in any mode when the late to open time matches the time of day, Late to Open will be logged to the event buffer and communicated.Proximity Tags (PT4/PT8)Proximity Tags allow you to arm or disarm the System by placing the tag near the tag readerlocated on the top left hand side of the Keypad LCD.  For details on enrolling/deleting prox tagsplease refer to ‘Enrolling/Deleting Proximity Tags’ on page 7.2-Way Wireless Key (WT4989, WT8989)The 2-way Wireless Key communicates directly with the control panel, performing many of thefunctions that a wireless keypad performs.The WT4989 and WT8989 comprises 4 function keys programmable for 6 functions, an LCD icondisplay that can display system status using a combination of 8 icons, and an internal buzzer.Unless custom programmed by your installer the functions are as follows:Function KeysArms system in Stay Mode. If pressed simultaneously with the Away button will activateCommand #1 Output (if programmed).Arms system in Away Mode. If pressed simultaneously with the Stay button will activateCommand #1 Output (if programmed).Disarms the system. If pressed simultaneously with the Panic button will activate Com-mand #2 Output (if programmed).✱✱✱✱✱
10Display IconsBuzzerProvides an audible confirmation of a pressed button or that a command to the panel has beenexecuted.Keylock ModeEnsures that the system is not accidently armed or disarmed with the wireless key.To lock the keys:1. Press and hold the Status   button.2. After 1 second, the wireless key will beep to indicate transmission.  3. After 3 seconds, the wireless key will beep again and flash the embedded icon to indicate keys are locked.To unlock the keys:1. Press and hold the Status   button for 3 seconds.2. Press and hold the Panic   button for 3 seconds.3. Press and hold the Stay and Away buttons OR the Disarm and Panic buttons simultaneously for 3 seconds.Upon exiting Key Lock mode, the status will be automatically displayed.Testing Your SystemNOTE:  Inform your Monitoring Station when you begin and end System Testing.All smoke detectors in this installation must be tested by your smoke detector installer or dealeronce a year to ensure they are functioning correctly. It is the user’s responsibility to test the sys-tem weekly (excluding smoke detectors). Ensure you follow all the steps in the two tests below.NOTE:  Should the system fail to function properly, call your installation company for service immediately. Sounder and Display TestThis test activates all display pixels and indicator lights and does a four second check of thesounder. 1. Press   [Master Code]  .The following will occur:- The system activates the Bell output on medium volume for 2 seconds followed by full volume alarm for 2 seconds. All display lights and LCD pixels will turn on.- The Ready, Armed, Trouble and Power LED’s will flash for the duration of the test.2.  To exit the function menu, press  .Sends a Panic code to the central station. If pressed simultaneously with the Disarmbutton will activate Command #2 Output (if programmed).Request System Status (see display).Indicates the key is transmitting or waiting for a response.Indicates system is armed (all modes).Indicates system is Stay or Night armed.Indicates system is Night armed.Indicates system is disarmed.Indicates low battery. Contact service personnel for replacement.Indicates that there are alarms in memory.Indicates system trouble or that buttons on the wireless key are locked.✱
11Walk Test Walk Test mode allows you test the operation of each detector in the system. While in Walk Testmode, the Ready, Armed, and Trouble LED's will flash to indicate that the Walk Test is active. TheWalk Test can be terminated at anytime by re-entering   [Master Code]   on the key-pad. The system will also automatically terminate the Walk Test on completion, it will annunciatewith an audible warning (5 beeps every 10 seconds), beginning five minutes before the termina-tion of the test.1. Before testing, ensure that the system is disarmed and the Ready light is on.2. Press   and close all zones to return the system to the Ready state.3. Perform a System Test by following the steps in the previous section.4. Press   [Master Code]   to initiate the Walk Test5. To test the zones, activate each detector in turn (e.g., open each door/window or walk in motion detector areas). The System will display the following message when each zone (detector) is activated: ‘Secure System Before Arming < >’,  or ‘Secure or Arm System’. Use the   buttons to view which zones are open. The message will disappear when the zones are closed.Allowing Computer Access To Your SystemOccasionally, your installer may need to send information to or retrieve information from yoursecurity system. Your installer will do this by having a computer call your system over the tele-phone line. You may need to prepare your system to receive this ‘downloading’ call. To do this:Press   [Master Code]   at the keypad.  This allows downloading for a limited period of time. During this time, the system will answer incoming downloading calls.  For more informa-tion on this feature, please ask your installer.Reference SheetsFill out the following information for future reference and store this guide in a safe place.System InformationEnabled? ❏   FIRE         ❏   AUXILIARY     ❏   PANIC For Service   Central Station Information   Account#: ___________________   Telephone#: __________________Installer Information:Company: ___________________   Telephone#: __________________If you suspect a false alarm signal has been sent to the central monitoring station, call the station to avoid an unnecessary response.✱✱✱The Entry Delay Time is _______ seconds.   The Exit Delay Time is _______ seconds.
12Access CodesMaster Code [40]: ________________________Sensor / Zone InformationCode WirelessKey Access Code Code WirelessKey Access Code01 ❑09 ❑02 ❑10 ❑03 ❑11 ❑04 ❑12 ❑05 ❑13 ❑06 ❑14 ❑07 ❑15 ❑08 ❑16 ❑Sensor  Protected Area Sensor Type Sensor Protected Area Sensor Type01 1802 1903 2004 2105 2206 2307 2408 2509 26
1310 2711 2812 2913 3014 3115 3216 3317 34Sensor  Protected Area Sensor Type Sensor Protected Area Sensor Type
14Guidelines for Locating Smoke DetectorsResearch has shown that all hostile fires in homes generate smoke to a greater or lesser extent.Experiments with typical fires in homes indicate that detectable quantities of smoke precededetectable levels of heat in most cases. For these reasons, smoke alarms should be installedoutside of each sleeping area and on each storey of the home.The following information is for general guidance only and it is recommended that local firecodes and regulations be consulted when locating and installing smoke alarms.It is recommended that additional smoke alarms beyond those required for minimum protectionbe installed. Additional areas that should be protected include: the basement; bedrooms, es-pecially where smokers sleep; dining rooms; furnace and utility rooms; and any hallways notprotected by the required units.On smooth ceilings, detectors may be spaced 9.1m (30 feet) apart as a guide. Other spacingmay be required depending on ceiling height, air movement, the presence of joists, uninsulatedceilings, etc. Consult National Fire Alarm Code NFPA 72, CAN/ULC-S553-M86 or other appro-priate national standards for installation recommendations. • Do not locate smoke detectors at the top of peaked or gabled ceilings; the dead air space inthese locations may prevent the unit from detecting smoke.• Avoid areas with turbulent air flow, such as near doors, fans or windows. Rapid air movementaround the detector may prevent smoke from entering the unit.• Do not locate detectors in areas of high humidity.• Do not locate detectors in areas where the temperature rises above 38oC (100oF) or falls below5oC (41oF).• Smoke detectors should always be installed in accordance with NFPA 72, the National FireAlarm Code. Smoke detectors should always be located in accordance with:‘Smoke detectors shall be installed outside of each separate sleeping area in the immediate vi-cinity of the bedrooms and on each additional storey of the family living unit, including base-ments and excluding crawl spaces and unfinished attics. In new construction, a smoke detectoralso shall be installed in each sleeping room’. ’Split level arrangement: Smoke detectors are re-quired where shown. Smoke detectors are optional where a door is not provided between livingroom and recreation room’.Figure 3a
15Household Fire Safety AuditRead this section carefully for important information about fire safety.Most fires occur in the home. To minimize this danger, we recommend that a household fire safety audit be conducted and a fire escape plan be developed.1. Are all electrical appliances and outlets in a safe condition? Check for frayed cords, over-loaded lighting circuits, etc. If you are uncertain about the condition of your electrical appli-ances or household service, have a professional evaluate these units.2. Are all flammable liquids stored safely in closed containers in a well-ventilated cool area? Cleaning with flammable liquids should be avoided.3. Are fire-hazardous materials (matches) well out of reach of children?4. Are furnaces and wood-burning appliances properly installed, clean and in good working order? Have a professional evaluate these appliances.Fire Escape PlanningThere is often very little time between the detection of a fire and the time it becomes deadly. It isthus very important that a family escape plan be developed and rehearsed.1. Every family member should participate in developing the escape plan.2. Study the possible escape routes from each location within the house. Since many fires occur at night, special attention should be given to the escape routes from sleeping quarters.3. Escape from a bedroom must be possible without opening the interior door. NOTE: Consider the following when making your escape plans:• Make sure that all border doors and windows are easily opened. Ensure that they are not painted shut, and that their locking mechanisms operate smoothly.• If opening or using the exit is too difficult for children, the elderly or handicapped, plans for res-cue should be developed. This includes making sure that those who are to perform the rescue can promptly hear the fire warning signal.• If the exit is above the ground level, an approved fire ladder or rope should be provided as well as training in its use.• Exits on the ground level should be kept clear. Be sure to remove snow from exterior patio doors in winter; outdoor furniture or equipment should not block exits.• Each person should know of a predetermined assembly point where everyone can be accounted for (e.g., across the street or at a neighbor’s house). Once everyone is out of the building, call the Fire Department.• A good plan emphasizes quick escape. Do not investigate or attempt to fight the fire, and do not gather belongings or pets as this wastes valuable time. Once outside, do not re-enter the house. Wait for the fire department.• Write the fire escape plan down and rehearse it frequently so that should an emergency arise, everyone will know what to do. Revise the plan as conditions change, such as the number of people in the home, or if there are changes to the building’s construction.• Make sure your fire warning system is operational by conducting weekly tests. If you are unsure about system operation, contact your installing dealer.• We recommend that you contact your local fire department and request further information on fire safety and escape planning. If available, have your local fire prevention officer conduct an in-house fire safety inspection.
16Status LightsReady - must be on to arm system. All zones must be secured or bypassed and the system disarmed for this light to activate.Armed - indicates system is armed. If the Ready light and the Armed light are both on it indicates that the Exit Delay is in progress.Trouble - indicates a system malfunction or tamper.  Follow the instructions displayed or enter   to view trouble. The Trouble light will turn off when the trouble is corrected.AC Power - indicates AC Power is present. The AC Power light will turn off when AC is absent.Function KeysStay Arms the system in Stay Mode.Away Arms the system in Away Mode.Chime Same as pressing   on the keypad.Bypass Same as pressing   on the keypad.Quick Exit Same as pressing   on the keypad.Special KeysLanguage Selection  - Press and hold both buttons simultaneously for 2 seconds to activate. Scroll to the desired language. Press   to select choice.Fire - Press and hold for 2 seconds to activate. These keys must be  programmed by the installer to function.Auxiliary - Press and hold for 2 seconds to activate.Panic - Press and hold for 2 seconds to activate.User CommandsPress    to select, press     to scroll, press    to exit.PRESS... To ...Bypass ZonesPress  Clear BypassPress  Bypass RecallPress  Save BypassPress  Recall SaveView System Troubles Scroll to view all troublesView Alarms in Memory Scroll to view alarmsChime ON/OFF Turns chime on and offProgram User CodesChange AttributesPress   buttons to scroll to user code. Enter [Master Code][9][xx] to enter user code (xx = 1-16). [1] Supervisor’s code[2] Duress Code[3] Zone Bypassing[4]-[6] Future Use[7] Squawks bell Output[8] One Time Use Code✱✱✱✱✱✱✱✱✱✱✱
17User CommandsUser Options  Event Buffer  System TestTime and DateSystem Service/DLSUser Call-upWalk TestBrightness Control  Contrast ControlPGM Commands If programmed by InstallerInstaller Programming Requires Special CodeNo-Entry Arming Arms system in Away mode without requiring an exitQuick Arm/Quick Exit Quick Arm is equivalent to entering your User Code.Quick Exit allows you to exit the premises without disarming the system.✱✱✱✱✱
IMPORTANT - READ CAREFULLY: DSC Software purchased with or without Products and Componentsis copyrighted and is purchased under the following license terms:• This End-User License Agreement (“EULA”) is a legal agreementbetween You (the company, individual or entity who acquired the Soft-ware and any related Hardware) and Digital Security Controls, a divi-sion of Tyco Safety Products Canada Ltd. (“DSC”), the manufacturerof the integrated security systems and the developer of the softwareand any related products or components (“HARDWARE”) which Youacquired.  • If the DSC software product (“SOFTWARE PRODUCT” or “SOFT-WARE”) is intended to be accompanied by HARDWARE, and is NOTaccompanied by new HARDWARE, You may not use, copy or installthe SOFTWARE PRODUCT.  The SOFTWARE PRODUCT includes com-puter software, and may include associated media, printed materials,and “online” or electronic documentation.  • Any software provided along with the SOFTWARE PRODUCT that isassociated with a separate end-user license agreement is licensed toYou under the terms of that license agreement.  • By installing, copying, downloading, storing, accessing or otherwiseusing the SOFTWARE PRODUCT, You agree unconditionally to bebound by the terms of this EULA, even if this EULA is deemed to be amodification of any previous arrangement or contract.  If You do notagree to the terms of this EULA, DSC is unwilling to license the SOFT-WARE PRODUCT to You, and You have no right to use it.SOFTWARE PRODUCT LICENSEThe SOFTWARE PRODUCT is protected by copyright laws andinternational copyright treaties, as well as other intellectual propertylaws and treaties. The SOFTWARE PRODUCT is licensed, not sold. 1. GRANT OF LICENSE  This EULA grants You the following rights:(a) Software Installation and Use - For each license You acquire, You may haveonly one copy of the SOFTWARE PRODUCT installed. (b) Storage/Network Use - The SOFTWARE PRODUCT may not be installed,accessed, displayed, run, shared or used concurrently on or from differentcomputers, including a workstation, terminal or other digital electronic device(“Device”). In other words, if You have several workstations, You will have toacquire a license for each workstation where the SOFTWARE will be used.(c) Backup Copy - You may make back-up copies of the SOFTWAREPRODUCT, but You may only have one copy per license installed at anygiven time. You may use the back-up copy solely for archival purposes.Except as expressly provided in this EULA, You may not otherwise makecopies of the SOFTWARE PRODUCT, including the printed materialsaccompanying the SOFTWARE.2.  DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS (a) Limitations on Reverse Engineering, Decompilation and Disassembly - Youmay not reverse engineer, decompile, or disassemble the SOFTWAREPRODUCT, except and only to the extent that such activity is expresslypermitted by applicable law notwithstanding this limitation.  You may notmake any changes or modifications to the Software, without the writtenpermission of an officer of DSC. You may not remove any proprietarynotices, marks or labels from the Software Product. You shall institutereasonable measures to ensure compliance with the terms and conditions ofthis EULA.(b) Separation of Components - The SOFTWARE PRODUCT is licensed as asingle product. Its component parts may not be separated for use on morethan one HARDWARE unit.(c) Single INTEGRATED PRODUCT - If You acquired this SOFTWARE withHARDWARE, then the SOFTWARE PRODUCT is licensed with theHARDWARE as a single integrated product. In this case, the SOFTWAREPRODUCT may only be used with the HARDWARE as set forth in this EULA.(d) Rental - You may not rent, lease or lend the SOFTWARE PRODUCT. Youmay not make it available to others or post it on a server or web site.(e) Software Product Transfer - You may transfer all of Your rights under thisEULA only as part of a permanent sale or transfer of the HARDWARE, providedYou retain no copies, You transfer all of the SOFTWARE PRODUCT (includingall component parts, the media and printed materials, any upgrades and thisEULA), and provided the recipient agrees to the terms of this EULA. If theSOFTWARE PRODUCT is an upgrade, any transfer must also include all priorversions of the SOFTWARE PRODUCT.(f) Termination - Without prejudice to any other rights, DSC may terminate thisEULA if You fail to comply with the terms and conditions of this EULA. In suchevent, You must destroy all copies of the SOFTWARE PRODUCT and all of itscomponent parts.(g) Trademarks - This EULA does not grant You any rights in connection with anytrademarks or service marks of DSC or its suppliers.3. COPYRIGHT - All title and intellectual property rights in and to theSOFTWARE PRODUCT (including but not limited to any images,photographs, and text incorporated into the SOFTWARE PRODUCT), theaccompanying printed materials, and any copies of the SOFTWAREPRODUCT, are owned by DSC or its suppliers. You may not copy theprinted materials accompanying the SOFTWARE PRODUCT. All title andintellectual property rights in and to the content which may be accessedthrough use of the SOFTWARE PRODUCT are the property of therespective content owner and may be protected by applicable copyrightor other intellectual property laws and treaties. This EULA grants You norights to use such content. All rights not expressly granted under thisEULA are reserved by DSC and its suppliers.4.  EXPORT RESTRICTIONS - You agree that You will not export orre-export the SOFTWARE PRODUCT to any country, person, or entitysubject to Canadian export restrictions. 5.  CHOICE OF LAW -  This Software License Agreement is governed by thelaws of the Province of Ontario, Canada.6. ARBITRATION - All disputes arising in connection with thisAgreement shall be determined by final and binding arbitration inaccordance with the Arbitration Act, and the parties agree to be bound bythe arbitrator’s decision. The place of arbitration shall be Toronto,Canada, and the language of the arbitration shall be English.7.  LIMITED WARRANTY(a)  NO WARRANTY - DSC PROVIDES THE SOFTWARE “AS IS” WITHOUTWARRANTY. DSC DOES NOT WARRANT THAT THE SOFTWARE WILLMEET YOUR REQUIREMENTS OR THAT OPERATION OF THESOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE.(b)  CHANGES IN OPERATING ENVIRONMENT -  DSC shall not be responsible forproblems caused by changes in the operating characteristics of theHARDWARE, or for problems in the interaction of the SOFTWARE PRODUCTwith non-DSC-SOFTWARE or HARDWARE PRODUCTS.(c) LIMITATION OF LIABILITY; WARRANTY REFLECTS ALLOCATION OFRISK  - IN ANY EVENT, IF ANY STATUTE IMPLIES WARRANTIES ORCONDITIONS NOT STATED IN THIS LICENSE AGREEMENT, DSC’SENTIRE LIABILITY UNDER ANY PROVISION OF THIS LICENSEAGREEMENT SHALL BE LIMITED TO THE GREATER OF THEAMOUNT ACTUALLY PAID BY YOU TO LICENSE THE SOFTWAREPRODUCT AND FIVE CANADIAN DOLLARS (CAD$5.00).  BECAUSESOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION ORLIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTALDAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.(d) DISCLAIMER OF WARRANTIES  - THIS WARRANTY CONTAINS THEENTIRE WARRANTY AND SHALL BE IN LIEU OF ANY AND ALLOTHER WARRANTIES, WHETHER EXPRESSED OR IMPLIED(INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY ORFITNESS FOR A PARTICULAR PURPOSE) AND OF ALL OTHEROBLIGATIONS OR LIABILITIES ON THE PART OF DSC.  DSC MAKESNO OTHER WARRANTIES. DSC NEITHER ASSUMES NORAUTHORIZES ANY OTHER PERSON PURPORTING TO ACT ON ITSBEHALF TO MODIFY OR TO CHANGE THIS WARRANTY, NOR TOASSUME FOR IT ANY OTHER WARRANTY OR LIABILITYCONCERNING THIS SOFTWARE PRODUCT.(e) EXCLUSIVE REMEDY AND LIMITATION OF WARRANTY  -  UNDER NOCIRCUMSTANCES SHALL DSC BE LIABLE FOR ANY SPECIAL, INCIDENTAL,CONSEQUENTIAL OR INDIRECT DAMAGES BASED UPON BREACH OFWARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT LIABILITY, ORANY OTHER LEGAL THEORY. SUCH DAMAGES INCLUDE, BUT ARE NOTLIMITED TO, LOSS OF PROFITS, LOSS OF THE SOFTWARE PRODUCT ORANY ASSOCIATED EQUIPMENT, COST OF CAPITAL, COST OF SUBSTITUTEOR REPLACEMENT EQUIPMENT, FACILITIES OR SERVICES, DOWN TIME,PURCHASERS TIME, THE CLAIMS OF THIRD PARTIES, INCLUDINGCUSTOMERS, AND INJURY TO PROPERTY.  WARNING: DSC recommends that the entire system be completelytested on a regular basis. However, despite frequent testing, and due to,but not limited to, criminal tampering or electrical disruption, it ispossible for this SOFTWARE PRODUCT to fail to perform as expected.
WARNING Please Read CarefullyNote to InstallersThis warning contains vital information. As the only individual in contactwith system users, it is your responsibility to bring each item in this warn-ing to the attention of the users of this system.System FailuresThis system has been carefully designed to be as effective as possible.There are circumstances, however, involving fire, burglary, or other typesof emergencies where it may not provide protection. Any alarm system ofany type may be compromised deliberately or may fail to operate asexpected for a variety of reasons. Some but not all of these reasons maybe: Inadequate InstallationA security system must be installed properly in order to provide adequateprotection. Every installation should be evaluated by a security profes-sional to ensure that all access points and areas are covered. Locks andlatches on windows and doors must be secure and operate as intended.Windows, doors, walls, ceilings and other building materials must be ofsufficient strength and construction to provide the level of protectionexpected. A reevaluation must be done during and after any constructionactivity. An evaluation by the fire and/or police department is highly rec-ommended if this service is available. Criminal KnowledgeThis system contains security features which were known to be effectiveat the time of manufacture. It is possible for persons with criminal intentto develop techniques which reduce the effectiveness of these features. Itis important that a security system be reviewed periodically to ensure thatits features remain effective and that it be updated or replaced if it is foundthat it does not provide the protection expected. Access by IntrudersIntruders may enter through an unprotected access point, circumvent asensing device, evade detection by moving through an area of insufficientcoverage, disconnect a warning device, or interfere with or prevent theproper operation of the system. Power FailureControl units, intrusion detectors, smoke detectors and many other secu-rity devices require an adequate power supply for proper operation. If adevice operates from batteries, it is possible for the batteries to fail. Evenif the batteries have not failed, they must be charged, in good conditionand installed correctly. If a device operates only by AC power, any inter-ruption, however brief, will render that device inoperative while it doesnot have power. Power interruptions of any length are often accompaniedby voltage fluctuations which may damage electronic equipment such as asecurity system. After a power interruption has occurred, immediatelyconduct a complete system test to ensure that the system operates asintended. Failure of Replaceable BatteriesThis system’s wireless transmitters have been designed to provide severalyears of battery life under normal conditions. The expected battery life isa function of the device environment, usage and type. Ambient conditionssuch as high humidity, high or low temperatures, or large temperaturefluctuations may reduce the expected battery life. While each transmittingdevice has a low battery monitor which identifies when the batteries needto be replaced, this monitor may fail to operate as expected. Regular test-ing and maintenance will keep the system in good operating condition. Compromise of Radio Frequency (Wireless) DevicesSignals may not reach the receiver under all circumstances which couldinclude metal objects placed on or near the radio path or deliberate jam-ming or other inadvertent radio signal interference. System UsersA user may not be able to operate a panic or emergency switch possiblydue to permanent or temporary physical disability, inability to reach thedevice in time, or unfamiliarity with the correct operation. It is importantthat all system users be trained in the correct operation of the alarm sys-tem and that they know how to respond when the system indicates analarm. Smoke DetectorsSmoke detectors that are a part of this system may not properly alert occu-pants of a fire for a number of reasons, some of which follow. The smokedetectors may have been improperly installed or positioned. Smoke maynot be able to reach the smoke detectors, such as when the fire is in achimney, walls or roofs, or on the other side of closed doors. Smokedetectors may not detect smoke from fires on another level of the resi-dence or building.Every fire is different in the amount of smoke produced and the rate ofburning. Smoke detectors cannot sense all types of fires equally well.Smoke detectors may not provide timely warning of fires caused by care-lessness or safety hazards such as smoking in bed, violent explosions,escaping gas, improper storage of flammable materials, overloaded elec-trical circuits, children playing with matches or arson.Even if the smoke detector operates as intended, there may be circum-stances when there is insufficient warning to allow all occupants to escapein time to avoid injury or death. Motion DetectorsMotion detectors can only detect motion within the designated areas asshown in their respective installation instructions. They cannot discrimi-nate between intruders and intended occupants. Motion detectors do notprovide volumetric area protection. They have multiple beams of detec-tion and motion can only be detected in unobstructed areas covered bythese beams. They cannot detect motion which occurs behind walls, ceil-ings, floor, closed doors, glass partitions, glass doors or windows. Anytype of tampering whether intentional or unintentional such as masking,painting, or spraying of any material on the lenses, mirrors, windows orany other part of the detection system will impair its proper operation.Passive infrared motion detectors operate by sensing changes in tempera-ture. However their effectiveness can be reduced when the ambient tem-perature rises near or above body temperature or if there are intentional orunintentional sources of heat in or near the detection area. Some of theseheat sources could be heaters, radiators, stoves, barbecues, fireplaces, sun-light, steam vents, lighting and so on. Warning Devices Warning devices such as sirens, bells, horns, or strobes may not warn peo-ple or waken someone sleeping if there is an intervening wall or door. Ifwarning devices are located on a different level of the residence or prem-ise, then it is less likely that the occupants will be alerted or awakened.Audible warning devices may be interfered with by other noise sourcessuch as stereos, radios, televisions, air conditioners or other appliances, orpassing traffic. Audible warning devices, however loud, may not be heardby a hearing-impaired person. Telephone LinesIf telephone lines are used to transmit alarms, they may be out of serviceor busy for certain periods of time. Also an intruder may cut the telephoneline or defeat its operation by more sophisticated means which may bedifficult to detect. Insufficient TimeThere may be circumstances when the system will operate as intended,yet the occupants will not be protected from the emergency due to theirinability to respond to the warnings in a timely manner. If the system ismonitored, the response may not occur in time to protect the occupants ortheir belongings. Component FailureAlthough every effort has been made to make this system as reliable aspossible, the system may fail to function as intended due to the failure of acomponent. Inadequate TestingMost problems that would prevent an alarm system from operating asintended can be found by regular testing and maintenance. The completesystem should be tested weekly and immediately after a break-in, anattempted break-in, a fire, a storm, an earthquake, an accident, or any kindof construction activity inside or outside the premises. The testing shouldinclude all sensing devices, keypads, consoles, alarm indicating devicesand any other operational devices that are part of the system. Security and InsuranceRegardless of its capabilities, an alarm system is not a substitute for prop-erty or life insurance. An alarm system also is not a substitute for propertyowners, renters, or other occupants to act prudently to prevent or mini-mize the harmful effects of an emergency situation.The complete R&TTE Declaration of Conformity can be found at http://www.dsc.com/listings_index.aspx. ©2008 Digital Security Controls Toronto, Canada   •   www.dsc.comPrinted in Canada 29007528Draft3

Navigation menu