ABOUT ICENTER/ICENTER-I ................................................................................................. 7
Introduction to iCenter/iCenter-i ......................................................................................................................... 7
The iCenter/iCenter-i Interface........................................................................................................................... 7
Navigating through iCenter/iCenter-i.................................................................................................................. 8
About Your Home Screen .................................................................................................................................. 8
SYSTEM OVERVIEW ............................................................................................................ 11
Introduction to Your System............................................................................................................................. 11
Fire Protection.................................................................................................................................................. 12
User Codes ...................................................................................................................................................... 12
Internet Features.............................................................................................................................................. 12
SECURITY SYSTEM OPERATION ....................................................................................... 15
Introduction to Security System Operation....................................................................................................... 15
How to Arm the System ...................................................................................................................................15
How to Arm Multiple Partitions ......................................................................................................................... 17
How to Arm Using a Keyswitch........................................................................................................................ 18
How to Bypass Zones ...................................................................................................................................... 19
How to Remove Bypassed Zones.................................................................................................................... 21
How to Disarm the System .............................................................................................................................. 23
How to Disarm Using a Keyswitch ................................................................................................................... 24
How to Check the Status of Other Partitions ................................................................................................... 24
How to Send Emergency Messages................................................................................................................ 26
How to View the Event Log.............................................................................................................................. 27
FIRE ALARM SYSTEM OPERATION .................................................................................... 29
Introduction to Fire Alarm System Operation ................................................................................................... 29
In Case of Fire Alarm ....................................................................................................................................... 29
Silencing a Fire Alarm ...................................................................................................................................... 29
Fire Display Lock.............................................................................................................................................. 29
Recommendations for Proper Protection......................................................................................................... 30
Recommendations For Smoke And Heat Detectors........................................................................................ 30
3
Table of Contents (Cont'd)
Recommendations For Proper Intrusion Protection......................................................................................... 31
Recommendations for Evacuation................................................................................................................... 31
USER CODE SETUP ............................................................................................................. 33
Introduction to User Code Setup...................................................................................................................... 33
How to Access User Setup ..............................................................................................................................33
How to Add a User........................................................................................................................................... 35
How to Delete a User....................................................................................................................................... 38
How to Edit a User ........................................................................................................................................... 39
INTERNET FEATURES ......................................................................................................... 41
Introduction to Internet Features...................................................................................................................... 41
Modifying Your WEB Page .............................................................................................................................. 41
My Email ...................................................................................................................................................................44
User Feedback...........................................................................................................................................................51
How to Enter Console Emulation Mode ........................................................................................................... 53
SUMMARY OF AUDIO NOTIFICATION................................................................................. 55
SUMMARY OF ICENTER/ICENTER-I LED OPERATION...................................................... 57
iCenter/iCenter-i LED Operation ...................................................................................................................... 57
How to Access iCenter/iCenter-i Setup Options ..............................................................................................59
How to Access Setup....................................................................................................................................... 59
4
Table of Contents (Cont'd)
How to Adjust the Touch Screen Contrast....................................................................................................... 60
How to Adjust the Volume................................................................................................................................ 61
How to Select Screen Saver Activation Time .................................................................................................. 61
How to Set the Time and Date......................................................................................................................... 63
Time Zone s
How to Calibrate the Touch Screen ................................................................................................................. 65
Replacing Batteries In Wireless Sensors......................................................................................................... 69
Silencing Low Battery Warning Tones at the Touchpad.................................................................................. 69
How to Clean your iCenter/iCenter-i ................................................................................................................70
Congratulations on your ownership of an ADT Security System. You've made a wise
decision in choosing it, for it represents the latest in security protection technology
today.
This security system offers you three forms of protection: burglary, fire and
emergency. To realize the full potential of the system, it is important that you feel
comfortable operating it. Your system may consist of:
• iCenter/iCenter-i Advanced User Interface
• One or more Touchpads for system control
• Various sensors for perimeter and interior burglary protection, plus a selected
number of strategically placed smoke or combustion detectors
About iCenter/iCenter-i
• Home automation devices.
UL
The control of the home environment feature has not been evaluated by UL.
The system uses microcomputer technology to monitor all zones, and provides
appropriate information for display on the iCenter/iCenter-i and/or Touchpads used
with the system. Your system may also have been programmed to automatically
transmit alarm or status messages over the phone lines to a central alarm
monitoring station.
The iCenter/iCenter-i Interface
iCenter/iCenter-i is an intuitive, graphical interface that combines security and
home control with interactive Internet features. With clear, simple controls on a
touch-screen interface, the entire family will find iCenter/iCenter-i both easy to
learn and easy to use.
As a security and home-automation control, iCenter/iCenter-i can be used for:
• Quick and easy security system operation
• Control of the home environment, including the heating and air-conditioning
UL
system, lights, garage door, etc.
The control of the home environment feature has not been evaluated by UL.
As a household Internet appliance, iCenter/iCenter-i provides access to a wealth of
information, including:
• News
• Sports
7
About iCenter/iCenter-i (cont'd)
• Weather
• e-mail, and
• Live updates of user-selectable content such as your horoscope.
Keeping pace with advances in technology, iCenter/iCenter-i will continue to provide
additional Internet functionality, as it becomes available.
Navigating through iCenter/iCenter-i
Navigation through iCenter/iCenter-i typically begins from the "Home" screen. This
is iCenter/iCenter-i’s main default screen (starting screen) and is the first screen
you will see when iCenter/iCenter-i is powered up and initialized. It is from this
screen that you will select from the main menu. Once you have made your
selection, you will navigate through various sub-menus by touching buttons or icons
to perform the function you desire.
About Your Home Screen
Your "Home" screen is your gateway to your iCenter/iCenter-i Advanced User
Interface. From this screen you can:
UL
• access e-mail messages
• control the premises lighting, and most importantly,
• control your security system.
The control of the home environment feature has not been evaluated by UL.
Besides using your personal "Home" screen for E-mail messages, you may also
receive news/display and retrieve additional information of your choosing.
Your "Home" screen is displayed at all times, except when the system is armed or
you select another screen option.
8
iCenter/iCenter
iCenter/iCenter----i Icon/Button Descriptions
iCenter/iCenteriCenter/iCenter
i Icon/Button Descriptions
i Icon/Button Descriptionsi Icon/Button Descriptions
About iCenter/iCenter-i (Cont'd)
To aid in the navigation of iCenter/iCenter-i, a set of user-friendly icons has been
provided. The appearance, function, and location of these icons is described below:
ICON/BUTTON LOCATION FUNCTION
"Home" screen Allows you to turn certain devices on and off
(if installed and programmed by your
"Home" screen Accesses "Arming" screen.
Upper left corner of most
screens
Upper right corner of most
screens
Lower right corner of most
screens
Lower left corner of most
screens
installer.)
NOTE: The background color of the shield
indicates security system status.
Green – system disarmed, ready to arm
Red – system armed
Yellow – system not ready to arm
Returns you to the iCenter/iCenter-i "Home"
screen.
Reverts to the last screen viewed.
Displays Emergency functions (as
programmed by your installer.
Used for Remote Security Access features.
9
About iCenter/iCenter-i (cont'd)
iCenter/iCenter-i "Arming" Screen
From the "Home" screen, press SECURITY to access the iCenter/iCenter-i "Arming"
screen. Use this picture and the table that follows to become familiar with the
iCenter/iCenter-i security functions.
ITEM FUNCTION
AWAY
STAY
NIGHT
Arm MultiPartitions
MORE
CHOICES
Press this button to arm when no one will be staying on the premises. When
armed in AWAY, the system will sound an alarm if a protected door or window
is opened, or if any movement is detected inside the premises. You may leave
through the entrance door during the exit delay period without causing an
alarm. You may also reenter through the entrance door, but must disarm the
system with you User Code within the entry delay period or an alarm will occur.
Press this button to arm when you are staying home, but might expect
someone to use the entrance door later.
When armed in STAY, the system will sound an alarm if a protected door or
window is opened, but you may otherwise move freely throughout the
premises. Late arrivals can enter through the entrance door without causing an
alarm, but they must disarm the system within the entry delay period or an
alarm will occur.
Press this button to arm when you are staying home and do not expect anyone
to use the entrance door.
differently; have him/her describe the actual settings of this mode.
Check this box when you want to arm more than one partition. W hen Arm
Multi-Partitions is checked, all partitions within the system can be armed at one
time (if the user is so authorized). When the Arm Multi-Partitions circle does
not contain a check mark, each partition must be armed individually.
Press this button for more Security, Lighting, and iCenter/iCenter-i setup
features.
Your installer may have configured NIGHT Mode
10
Introduction to Your System
This system offers you three forms of protection: burglary, fire and emergency.
Monitoring is accomplished with various contact and motion sensors for perimeter
and interior burglary protection, plus strategically placed smoke, heat, or
combustion detectors.
Burglary Protection
The burglary protection portion of your system must be turned on or "armed" before
it will sense burglary alarm conditions. Your system provides three modes of
burglary protection: Away, Stay, and Night, and even allows you to “bypass”
selected zones of protection while leaving the rest of the system armed (e.g. this
enables you to arm the system but leave upper-story windows open.)
The system also provides a Chime mode, for alerting users to the opening and
closing of doors and windows even while the system is disarmed.
System Overview
Partitions
Partitions
PartitionsPartitions
This system provides the ability to arm and disarm up to eight different areas, each
as if it had its own control. These areas are called partitions. Partitions are used
when the user wants to disarm certain areas while leaving other areas armed, or to
limit access to certain areas to specific individuals. Each user of the system can be
authorized to operate all or only some partitions, and can be given different
privileges in each. Information about Partitions is presented later in this document.
Zones
Zones
ZonesZones
Your system's sensing devices have been assigned to various "zones." For example,
the sensing device on your Entry/Exit door may have been assigned to zone 001,
sensing devices on windows in the master bedroom to zone 002, and so on. These
numbers will appear on the display, along with a Custom English descriptor for that
zone (if programmed), when an alarm or trouble condition occurs.
Entry/Exit Delays
Entry/Exit Delays
Entry/Exit DelaysEntry/Exit Delays
Your system has preset time delays, referred to as exit delay and entry delay.
Whenever you arm your system, exit delay gives you time to leave through the
designated exit door without setting off an alarm. Exit delay begins immediately
after entering any arming command, and applies to all modes of arming protection.
If programmed, a slow beeping will sound throughout the exit delay period.
Entry delay gives you time to disarm the system when you reenter through the
designated entrance door. But the system must be disarmed before the entry delay
period ends, or an alarm will occur. The Touchpad will beep during the entry delay
period, reminding you to disarm the system. Ask your installer about the delay
times programmed into your system.
11
System Overview (cont'd)
Alarms
Alarms
AlarmsAlarms
When an alarm occurs, iCenter/iCenter-i (and any other Touchpads) and external
sounders will sound, and the zone(s) causing the alarm are displayed. If your
system is connected to a central monitoring station, an alarm message will also be
sent. To stop the alarm sounding, simply disarm the system.
Memory of Alarm
Memory of Alarm
Memory of AlarmMemory of Alarm
When an alarm condition occurs, the number(s) of the zone(s) that caused the
problem are displayed, along with the type of alarm (e. g. FIRE, ALARM). These
remains displayed until cleared by disarming the system.
Fire Protection
The fire protection portion of your security system (if used) is always on and will
sound an alarm if a fire condition is detected.
User Codes
Each user must be assigned a name with a corresponding 4-digit user code in order
to gain access to various features and functions. Through iCenter/iCenter-i, you may
program users to access any and all of the following systems:
• Fire/Burglary
• Internet
Users for the systems are programmed in a central user setup location that provides
the specific questions for the user pertaining to each system. You may want these
users to be the same, but there are situations in which you may want a user to have
access to one system (e.g., Message Center) without having access to another (e.g.,
the Fire/Burglary system).
Internet Features
As a household Internet appliance, ICenter/iCenter-i provides access to a wealth of
information, including:
• News
• Sports
• Weather
• E-mail, and
• Updates of user-selectable content such as your horoscope.
Additionally, you may control all of iCenter/iCenter-i’s functions from any personal
computer or laptop that has Internet capabilities, including security system
functions (arming, disarming, etc.) and to check to see if you have a voice message.
12
Extended Functionality
Extended functions are advanced functions that can be accessed through a standard
Custom English Touchpad or through emulation mode on your iCenter/iCenter-i
touch screen. Refer to your Control Panel User Guide for these features.
System Overview (Cont'd)
13
System Overview (cont'd)
14
Introduction to Security System Operation
You can arm your system in one of three arming modes: Away, Stay, and Night.
The following table lists the three different arming modes and the results of each
*Your installer may have configured Night Mode differently; have your installer
write the actual mode settings above.
Security System Operation
Yes Yes (set for
Away or Stay
Mode)
No (set for
Instant or
Maximum Mode)
Away Mode)
No (set for Stay,
Instant or
Maximum Mode)
.
How to Arm the System
Arming the system in any mode is performed in the same way, as described below.
NOTE:
NOTE: Close all perimeter windows and doors before arming.
NOTE: NOTE:
SCREEN ACTION
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
15
Security System Operation (cont'd)
SCREEN ACTION
Arming (typical)
Armed (typical)
2. On the "Arming" screen, press the selected
arming button.
• iCenter/iCenter-i beeps twice (Away
and Night Maximum Modes) or 3
times (Stay and Night Instant Modes)
• a DISARM button appears
• a text message appears stating which
zones are arming and whether or not
there is an entry delay
• the screen changes to display the
remaining exit delay time, and
• a yellow "lock" appears next to the
pressed button to indicate the system
is arming.
• The exit delay time continues to
decrement to one.
When this time indicates one, the screen
automatically changes to indicate the system
is "Armed" and the "lock" next to the pressed
button changes to red. The system is now
armed in the selected mode.
16
How to Arm Multiple Partitions
To arm multiple partitions:
SCREEN ACTION
Security System Operation (Cont'd)
1. From the "Home" screen press the
SECURITY button to display the "Arming"
screen.
NOTE: Be sure the Arm Multi-Partitions button
is checked.
2. Press the appropriate arming mode button,
and, when prompted, enter the user code
authorized to access other partition(s).
If the user code is accepted, the system
displays the partitions that the user has access
to.
NOTE: A user may have access to some (but
not all) of the available partitions!
You have two arming options:
To arm one or more partitions, highlight the
partition(s) to be armed by touching it on the
screen, then press ARM SELECTED.
Press ARM ALL to arm all available partitions.
17
Security System Operation (cont'd)
Keyswitch Operation
Your system may be equipped with a keyswitch for arming and disarming a
partition. Red and green lights on the keyswitch plate indicate the status of your
system as follows:
INDICATOR STATUS FUNCTION
Green Light
Red Light
Lit The system is disarmed and ready to be armed (no open
Out If the system is disarmed and the green light is off, it
Lit Steady System is armed or memory of alarm exists.
Slow Flashing Partition is armed in Away mode.
Rapid Flashing Partition is armed in Stay mode. Memory of alarm,
zones).
indicates the system is not ready (one or more zones are
open).
indicating an alarm has occurred.
GREEN
How to Arm Using a Keyswitch
To arm in the AWAY mode,
To arm in the AWAY mode, turn the key to the right for 1/2 second and release.
To arm in the AWAY mode,To arm in the AWAY mode,
iCenter/iCenter-i/Touchpads will beep twice and the red light will stay on steady.
To arm in the STAY mode,
To arm in the STAY mode, turn the key to the right and hold for longer than 3
To arm in the STAY mode,To arm in the STAY mode,
seconds, then release. iCenter/iCenter-i/Touchpads will beep three times and the
red light will flash slowly.
RED
18
How to Bypass Zones
The Bypass function is used when you want to arm your system with one or more
zones intentionally unprotected. Bypassed zones are unprotected and will not cause
an alarm when violated while your system is armed.
1. The system will not allow you to bypass fire or emergency zones.
2. To bypass zones, the system must be disarmed first.
To bypass zones do the following:
Security System Operation (Cont'd)
SCREEN ACTION
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. From the "Arming" screen, press the MORE CHOICES button. The "More Choices" screen
is displayed.
3. Press the SHOW ZONES button on the
"More Choices" screen. The "Zones" screen is
displayed.
NOTE: While iCenter/iCenter-i is requesting
and receiving the zone data from the control
panel, the "Zones" screen displays "Getting Zone Status…".
19
Security System Operation (cont'd)
SCREEN ACTION
4. Highlight the zone(s) to be bypassed by
touching it on the screen when the zones are
displayed.
5. Press the BYPASS SELECTED button.
The "User Authorization" screen is displayed
with the instructions "To Bypass Zones, Enter Code".
6. Enter your 4-digit user code. The "More
Choices" screen is displayed showing the
system as Ready-Bypassed Zones.
20
SCREEN ACTION
How to Remove Bypassed Zones
A bypassed zone will automatically be unbypassed when you disarm the system. If
the system is disarmed and a zone is bypassed, you can remove the bypass as
follows:
SCREEN ACTION
Security System Operation (Cont'd)
7. From this screen press the “Back” button to
return to the “Arming” screen.
1. View bypassed zones by pressing the
SHOW ZONES button. The "Zones" screen is
displayed.
NOTE: While iCenter/iCenter-i is requesting
and receiving the zone data from the control
panel, the "Zones" screen displays "Getting Zone Status...".
21
Security System Operation (cont'd)
SCREEN ACTION
2. Remove zone bypasses by pressing the
CLEAR BYPASSES button.
3. The "User Authorization" screen is
displayed with the instructions To Clear
Bypasses, Enter Code.
NOTE: A zone cannot be unbypassed while
the system is armed.
Enter your 4-digit user code. The "More
Choices" screen is displayed showing the
system as Ready to Arm.
NOTE: This will not occur if any zone(s) is
open (not ready).
22
How to Disarm the System
IMPORTANT:
IMPORTANT: If you return and the main burglary sounder is on, DO NOT enter
IMPORTANT: IMPORTANT:
the premises, but call the police from a nearby safe location. If you return after an
alarm has occurred and the main sounder has shut itself off, iCenter/iCenter-i will
beep rapidly upon entering, indicating that an alarm has occurred during your
absence. LEAVE IMMEDIATELY and CONTACT THE POLICE
safe location.
Disarm the system as follows:
LEAVE IMMEDIATELY and CONTACT THE POLICE from a nearby
LEAVE IMMEDIATELY and CONTACT THE POLICE LEAVE IMMEDIATELY and CONTACT THE POLICE
Security System Operation (Cont'd)
SCREEN ACTION
1. Press the DISARM button on any "Armed"
screen. The "User Authorization" screen is
displayed with the instructions “To Disarm, Enter Code”.
2. Enter your 4-digit user code. The system
will disarm. If you have access to multiple
partitions, the Partition No. & Description
screen is displayed.
3. Press the DISARM ALL button if you wish
to disarm the system. iCenter/iCenter-i beeps
once and the "Arming" screen is displayed
showing the system as Ready to Arm or not
ready if any zone is faulted (open).
NOTE: If you wish to disarm only selected
partitions, you must first highlight the
partition(s) to be disarmed, then press the
DISARM SELECTED button.
iCenter/iCenter-i beeps once and the "Arming"
screen is displayed showing the system as
Ready to Arm or not ready if any zone is
faulted (open).
23
Security System Operation (cont'd)
SCREEN ACTION
NOTE: Once the system is disarmed,
iCenter/iCenter-i will return to the "Home"
screen after the selected “To Home Page
After” time has expired. This time is selected
on the “Setup” screen.
How to Disarm Using a Keyswitch
To disarm the partition, turn the key to the right and release. If an alarm has
occurred, the red light will be flashing rapidly (memory of alarm).
How to Check the Status of Other Partitions
This system supports between one and eight Partitions (as configured by your
installer.) Partitioning enables a single physical alarm system to control up to eight
areas of protection (partitions). Each iCenter/iCenter-i and Touchpad is assigned a
default partition for display purposes, and will show only that partition's
information.
For example, if your physical site is a four-apartment housing unit, this alarm
system would be configured with four partitions. Each apartment’s zones (door,
windows, smoke detectors, etc.) are assigned to separate partitions, giving each
apartment independent arming/disarming control of its own partition (area). A
landlord or manager may be granted access to all partitions, so he/she can control
the entire system.
If a user is so authorized, an iCenter/iCenter-i or Touchpad in one partition can be
used to perform system functions in another partition. (Note that only those
partitions authorized and programmed by the installer can be accessed in this
manner.)
24
Security System Operation (Cont'd)
To check the status of other partitions perform the following:
SCREEN ACTION
1. From the "Home" screen press the
SECURITY button to display the "Arming"
screen.
2. Press the "Current Partition" tab (lower edge
of the screen; in this case it displays P1). The
"User Authorization" screen is displayed with
the instructions “For Authorized Partitions, Enter Code”.
3. Enter the code authorized to access other
partition(s).
If the code is accepted, the system displays
the partitions that user has access to.
NOTE: A code may have access to some (but
not all) of the available partitions.
This screen displays the available partitions (in
this case, Partitions 1 and 2), and their current
status.
The current partition is shown at the top of the
display (in this example, the device is attached
to Partition 1 (P1)). To change this
assignment, select the appropriate button (e.g.
press P2 to switch control to Partition 2).
25
Security System Operation (cont'd)
How to Send Emergency Messages
An emergency message for panic or fire can be sent to the central monitoring station
from the Emergency
the "emergency" icon located in the lower-right hand corner of the displayed screen
(see next page for a typical screen).
1. The Emergency screen cannot be accessed while running a diagnostic test or the touch
2. In some instances a pop-up window may be partially covering the "emergency" icon. If this is
Emergency screen. The Emergency
EmergencyEmergency
screen calibration. The Emergency screen also cannot be accessed if the user is in an
Internet session or retrieving messages.
the case, you should first close the pop-up window by pressing either the DONE or CANCEL
button, whichever may be appropriate, on the pop-up screen.
Emergency screen can be accessed by activating
EmergencyEmergency
"EMERGENCY"
ICON
AUI-022-V0
Once the Emergency
Emergency screen is accessed, perform the following to send an emergency
EmergencyEmergency
message.
SCREEN ACTION
On the Emergency screen press and hold (for
at least 2 seconds) the associated alarm
button for the type of emergency message you
want to send (PANIC or FIRE). When the
message is sent, the associated "Message
Sent" statement is displayed in the text box to
the right of the buttons. You are immediately
returned to the screen from which you pressed
the “Emergency” icon.
26
How to View the Event Log
Your system has the ability to record various events in a history log wherein each
event is recorded with the time and date of its occurrence. The control panel must
be programmed to record various system events in installer programming mode.
To view the Event Log, perform the following:
Security System Operation (Cont'd)
SCREEN ACTION
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. From the "Arming" screen press the MORE CHOICES button. The "More Choices" screen
is displayed.
27
Security System Operation (cont'd)
SCREEN ACTION
3. Press the EVENT LOGS button on the
"More Choices" screen. The "Event Log"
screen is displayed.
NOTE: While iCenter/iCenter-i is requesting
and receiving the event log data from the
control panel, the "Event Log" screen displays
"Wait For Event Log..".
To view additional events, press the up/down
arrows to scroll through the event log. To view
all items, press the Show More button.
NOTE: When All Partitions or All Events
button is pressed, and more than 100 events
exist, the Show More button text will change
to read Next 100.
28
Introduction to Fire Alarm System Operation
Your fire alarm system (if installed) is on 24 hours a day, providing continuous
protection. In the event of an emergency, the installed smoke and heat detectors
will automatically send signals to your Control/Communicator, triggering a loud
interrupting sound from the Touchpad. An interrupted sound will also be produced
by optional exterior sounders. A FIRE message will appear at your Touchpad and
remain on until you silence the alarm.
In Case of Fire Alarm
1. Should you become aware of a fire emergency before your detectors sense the
problem, go to your nearest Touchpad and manually initiate an alarm by
pressing the panic key assigned as FIRE emergency (if programmed by the
installer) and hold down for at least 2 seconds.
2. Evacuate all occupants from the premises.
3. If flames and/or smoke are present, leave the premises and notify your local Fire
Department immediately.
Fire Alarm System Operation
If no flames or smoke are apparent, investigate the cause of the alarm. The zone
descriptor of the zone(s) in an alarm condition will appear at the Touchpad.
Silencing a Fire Alarm
1. Silence the alarm by entering your code and pressing the OFF key. To clear the
display, enter your code and press the OFF key again
2. If the Touchpad does not indicate a READY condition after the second OFF
sequence, press the READY key to display the zone(s) that are faulted. Be sure
to check that smoke detectors are not responding to smoke or heat producing
objects in their vicinity. In this case, eliminate the source of heat or smoke.
3. If this does not remedy the problem, there may still be smoke in the detector.
Clear it by fanning the detector for about 30 seconds.
4. When the problem has been corrected, clear the display by entering your code
and pressing the OFF key.
Fire Display Lock
If several zones produce an alarm before any are silenced, the system can be
programmed to lock the Touchpad display with the first zone that produced an
alarm. Ask your installer if your system has been activated with this feature. To
display the other zone(s), press the [✴] key for each zone. Also the “A”, “B”, or “C”
keys can be programmed to scroll the Touchpad display to view the previous or
subsequent fire alarms.
29
Fire Alarm System Operation (cont'd)
Recommendations for Proper Protection
THE FOLLOWING RECOMMENDATIONS FOR THE LOCATION OF FIRE AND
BURGLARY DETECTION DEVICES HELP PROVIDE PROPER COVERAGE FOR
THE PROTECTED PREMISES.
Recommendations For Smoke And Heat Detectors
With regard to the number and placement of smoke/heat detectors, we subscribe to
the recommendations contained in the National Fire Protection Association's
(NFPA) Standard #72 noted below.
Early warning fire detection is best achieved by the installation of fire detection
equipment in all rooms and areas of the household as follows: For minimum
protection a smoke detector should be installed outside of each separate sleeping
area, and on each additional floor of a multi-floor family living unit, including
basements. The installation of smoke detectors
unfinished), or in garages is not normally recommended.
For additional protection the NFPA recommends that you install heat or smoke
detectors in the living room, dining room, bedroom(s), kitchen, hallway(s), attic,
furnace room, utility and storage rooms, basements and attached garages.
in kitchens, attics (finished or
DINING
LIVING ROOM
BEDROOM
LVNG RM
BASEMENT
KITCHEN
BEDROOM
TO
BR
BEDROOM
BEDROOM
BEDROOM
KTCHN
BEDROOM
CLOSED
.
DOOR
KITCHEN
TV ROOM
LIVING ROOM
BEDROOM
Smoke Detectors for Minimum Protection
Smoke Detectors for Additional Protection
Heat-Activated Detectors
GARAGE
DINING
BDRM
BDRM
In addition, we recommend the following:
• Install a smoke detector inside every bedroom where a smoker sleeps.
• Install a smoke detector inside every bedroom where someone sleeps with the
door partly or completely closed. Smoke could be blocked by the closed door.
Also, an alarm in the hallway outside may not wake up the sleeper if the door is
closed.
30
• Install a smoke detector inside bedrooms where electrical appliances (such as
portable heaters, air conditioners or humidifiers) are used.
Fire Alarm System Operation (Cont'd)
• Install a smoke detector at both ends of a hallway if the hallway is more than 40
feet (12 meters) long.
• Install smoke detectors in any room where an alarm control is located, or in any
room where alarm control connections to an AC source or phone lines are made.
If detectors are not so located, a fire within the room could prevent the control
from reporting a fire or an intrusion.
Recommendations For Proper Intrusion Protection
For proper intrusion coverage, sensors should be located at every possible point of
entry to a home or commercial premises. This would include any skylights that may
be present, and the upper windows in a multi-level building.
In addition, we recommend that radio backup be used in a security system so that
alarm signals can still be sent to the alarm monitoring station in the event that the
telephone lines are out of order (alarm signals are normally sent over the phone
lines, if connected to an alarm monitoring station).
Recommendations for Evacuation
Establish and regularly practice a plan of escape in the event of fire. The National
Fire Protection Association recommends the following steps:
1. Position your detector or your interior and/or exterior sounders so that all
occupants can hear them.
2. Determine two means of escape from each room. One path of escape should lead
to the door that permits normal exit from the building. The other may be a window,
should your path be impassable. Station an escape ladder at such windows if there
is a long drop to the ground.
3. Sketch a floor plan of the building. Show windows, doors, stairs and rooftops that
can be used to escape. Indicate escape routes for each room. Keep these routes free
from obstruction and post copies of the escape routes in every room.
4. Assure that all bedroom doors are shut while you are asleep. This will prevent
deadly smoke from entering while you escape.
5. Try the door. If the door is hot, check your alternate escape route. If the door is
cool, open it cautiously. Be prepared to slam the door if smoke or heat rushes in.
6. Where smoke is present, crawl on the ground; do not walk upright. Smoke rises
and may overcome you. Clearer air is near the floor.
7. Escape quickly; don't panic.
31
Fire Alarm System Operation (cont'd)
8. Establish a common meeting place outdoors, away from your house, where
everyone can meet and then take steps to contact the authorities and account for
those missing. Choose someone to assure that nobody returns to the house — many
die going back.
32
Introduction to User Code Setup
Each user must be assigned a name with a corresponding 4-digit user code in order
to gain access to various features and functions. Through iCenter/iCenter-i, you may
program users to access any and all of the following systems:
• Fire/Burglary
• Internet
Users for the systems are programmed in a central user setup location that provides
the specific questions for the user pertaining to each system. You may want these
users to be the same, but there are situations in which you may want a user to have
access to one system (e.g., Internet) without having access to another (e.g., the
Fire/Burglary system).
How to Access User Setup
Access User Setup as follows:
User Code Setup
SCREEN ACTION
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. Press the MORE CHOICES button. The
"More Choices" screen is displayed.
33
User Code Setup (cont'd)
SCREEN ACTION
3. Press the SETUP button on the "More
Choices" screen. The "Setup" screen is
displayed.
4. Press the USER SETUP button on the
“Setup” screen. The User Setup screen is
displayed.
34
How to Add a User
Add a user as follows:
User Code Setup (Cont'd)
SCREEN ACTION
NOTE: Three selections are available: add a
user, edit a user, or delete a user.
1. To add a use, press the ADD USER button.
The "User Authorization" screen is displayed
with the instructions "Enter Authorized Code".
2. Enter your “Master” code. The “User
Options” screen is displayed.
3. Press the box next to Enter User Name.
The Enter Data keyboard screen is displayed.
4. Type in the user name and press the OK
button. The “User Options” screen is displayed
with Enter User Code… displayed.
35
User Code Setup (cont'd)
SCREEN ACTION
5. Touch the box next to with Enter User
Code… The "User Authorization" screen is
displayed with the instructions Enter 4 Digits.
6. Enter the 4-digit code for this user. The
“User Options” screen is displayed with the
user’s name and code displayed.
7. Select the partitions and access level for
this user.
NOTE: If this user is to have Internet access,
continue to step 8. If this user is to have
security access only, press the SAVE button at
this time.
8. Press the WEB tab on the “User Options”
screen. The “WEB access” screen is
displayed.
36
User Code Setup (Cont'd)
SCREEN ACTION
9. To provide this user with Internet access
press the box next to Enable User for Web Access until a check appears. You may also
select the Auto Switch to WEB on Disarm
option at this time.
10. Press the SAVE button. The system will
save the configuration. When the save is
complete, the User Setup screen is displayed
with the new user’s name shown.
37
User Code Setup (cont'd)
How to Delete a User
Delete a User as follows:
SCREEN ACTION
1. From the User Setup screen, touch the
circle next to the user to be deleted and press
the DELETE USER button. The "User
Authorization" screen is displayed with the
instructions "Enter Authorized Code:".
2. Enter your “Master” code. The Confirm Delete screen is displayed.
3. Press the appropriate button. The User Setup screen is displayed.
38
How to Edit a User
Edit a user as follows:
User Code Setup (Cont'd)
SCREEN ACTION
1. From the User Setup screen, touch the
circle next to the user to be edited and press
the EDIT USER button. The "User
Authorization" screen is displayed with the
instructions "Enter Authorized Code:".
2. Enter your “Master” code. The “User
Options” screen is displayed.
3. Select whatever options you wish to select
for this user and press the SAVE button. The
configuration changes are saved and you are
returned to the User Setup screen.
39
User Code Setup (cont'd)
40
Introduction to Internet Features
As a household Internet appliance, iCenter/iCenter-i provides access to a wealth of
information, including:
• News
• Sports
• Weather
• E-mail, and
• Live updates of user-selectable content such as your horoscope.
Additionally, you may control all of iCenter/iCenter-i’s function from any personal
computer or laptop that has Internet capabilities including security system
functions (arming, disarming, etc.) and to check to see if you have a voice message.
Whenever a user is added or edited through the User Setup procedure, and if that
user is authorized to have WEB access, upon saving of the user setup information a
button is automatically generated on the “Home” screen with that user’s name.
Internet Features
Modifying Your WEB Page
You may access and customize your WEB page through your personal computer or
laptop.
To access your existing WEB page go to the ADT iCenter/iCenter-i/AlarmNet web
site at http://icenter.alarmnet.com.
OR
OR
OROR
Go to www.adt.com
Click on Customer Login (upper right-hand side) then select iCenter.
The screen will prompt,
To access your existing Account, Click here
41
Internet Features (cont'd)
The screen displays:
Login to personalize your account info.
Account Number
User Name
Password
Submit
Reset
Enter your 12-digit account number, User Name and Password and click on the
Submit
Submit button.
SubmitSubmit
This brings you to the Main Page where you may, by pressing the corresponding
buttons, go to the following screens:
• CONTENT
42
• REMINDERS
• MANAGE USERS
• EDIT PROFILE
• REMOTE CONTROL
• LOGOUT
• Feedback?
You may also click on the corresponding links:
• Click Here
• Click Here
• Click Here
To view your selected stock quotes.
To view your selected Headlines.
To view your E-mail Headers.
Internet Features (Cont'd)
Content
Content
ContentContent
Content choices allow you to select additional features that you may want to have
displayed on your console Internet page. When the CONTENT
the main page, the Content
Content screen is displayed. The Content
ContentContent
following choices with instructions as to how to select and save your choices.
Content Selections for rick
Content Choices Selected
Stock Quotes
My Email
Horoscopes
US National News
Canadian News
International News
The Sports Network
Sports Scoreboard
AccuWeather
❑
❑
❑
❑
❑
❑
❑
❑
❑
CONTENT button is clicked on
CONTENTCONTENT
Content screen contains the
ContentContent
Instructions:
1. Select each item you wish to appear on your console home page by clicking on
the box under the Selected column. A check should appear to indicate this
option is selected.
NOTE:
NOTE: Although all items are selectable, only Stock Quotes, My Email, Horoscopes,
NOTE:NOTE:
Sports Scoreboard and AccuWeather require user configuration.
2. Click the UPDATE PROFILE
UPDATE PROFILE button to save your changes.
UPDATE PROFILEUPDATE PROFILE
3. Items requiring additional configuration can be clicked on to configure.
43
Internet Features (cont'd)
Stock Quotes
Stock Selections for rick
Enter up to 10 stock ticker symbols separated by commas or spaces.
Use these symbols for Market Indices
Dow Jones Ind. $DJI
NASDAQ Comp COMP
S&P 500 SPX
S&P 100 OEX
CAC-40 (Paris) $CAC
NIKKEI (Tokoyo) $NIKKEI
My Email
To configure your Email option, click on the My Email
My Email link. This displays the
My EmailMy Email
“Configure My Email” screen. Simply follow the instructions at the bottom of the
screen.
Username Password Confirm
POP3 Server Name
Instructions:
1. Enter your Email Username. For example, if your email address was
jsmith@Yahoo.com
, you would enter jsmith.
44
2. Enter your Email Password and Confirmation.
3. Enter your email POP3 server information. This entry can be found by
contacting your Internet Service Provider. Example for Yahoo is
pop.mail.yahoo.com
pop.mail.yahoo.com.
pop.mail.yahoo.compop.mail.yahoo.com
Internet Features (Cont'd)
NOTE: Due to their proprietary nature, these email servers are not supported:
®
AOL
, MSN/Hotmail®, and Juno®.
4. Click the SUBMIT
to the Content
SUBMIT button to save your changes. You are automatically returned
SUBMITSUBMIT
Content screen.
ContentContent
Horoscopes
To configure your Horoscope option, click on the Horoscope
Horoscope link. This displays the
HoroscopeHoroscope
“Choose My Horoscopes” screen. Simply follow the instructions at the bottom of the
screen.
Aries
Taurus
Gemini
Cancer
Leo
Virgo
❍
❍
❍
❍
❍
❍
Libra
Scorpio
Sagittarius
Capricorn
Aquarius
Pisces
❍
❍
❍
❍
❍
❍
Instructions:
1. Select the single horoscope sign you wish to see on your console Internet page.
2. Click the SUBMIT
to the Contents
SUBMIT button to save your changes. You are automatically returned
SUBMITSUBMIT
Contents screen.
ContentsContents
Sports Scoreboard
Sports Network Scoreboard Selections for rick
❑ Major League Baseball (MLB)
❑ National Football League (NFL)
❑ National Basketball Association (NBA)
❑ National Hockey League (NHL)
1. Select any combination of the sports you wish to see scores from.
2. Click on the Submit
Submit button to save your changes.
SubmitSubmit
45
Internet Features (cont'd)
Weather
To configure your Weather option, click on the AccuWeather
AccuWeather link. This displays the
AccuWeatherAccuWeather
“Weather Selections” screen. Simply follow the instructions at the bottom of the
screen
Edit Clear
Edit Clear
Edit Clear
Instructions:
1. Select up to three city/state choices for weather by clicking the Edit
Edit button to
Edit Edit
make your select.
2. Click the Clear
NOTE:
NOTE: Your selections will appear on your console Internet page in the order in
NOTE:NOTE:
Clear button to remove a choice.
ClearClear
which they were selected.
3. Click the Submit button
Reminders
Reminders
RemindersReminders
Submit button to save your choices.
Submit buttonSubmit button
The Reminders function allows you to leave memos on your iCenter/iCenter-i WEB
page so that you won’t forget important events or meetings. When the
REMINDERS
REMINDERS button is clicked on the main page, the “Reminder Management”
REMINDERSREMINDERS
screen is displayed. The “Reminder Management” screen displays all existing
messages as follows:
Existing Messages
Posted Date Message To User RecurringPriority Select
December 1 Xxxxxx xxx xx xxxxxx rick Yes Urgent
❏
Add a new reminder
Clicking on the Add a new reminder
Occasion To Month Day Year*
link displays:
46
Internet Features (Cont'd)
Notify Recurring Priority
❍ Normal ❍ Important ❍ Urgent **
Message/Reminder
* Year notations are ignored on recurring reminders.
**Urgent Reminders always go to ALL users.
View current reminders
1. By clicking on the boxes for Occasion, To, Month, Day, Year, Notify, and
Recurring, pull down menus are displayed and you may select the option of your
choice. As an example, the Notify pull down menu will allow you to select the Day
of, 1 Day before, 1 Week before, or 2 Weeks before for when you want your message
displayed on your iCenter/iCenter-i WEB page.
NOTE:
NOTE: No matter what year is selected it is not displayed in current message view.
NOTE:NOTE:
2. Click on the adjacent circle to select your reminder priority.
IMPORTANT:
IMPORTANT: Your reminder message is limited to 40 characters.
IMPORTANT:IMPORTANT:
3. Click on the ADD REMINDER
Messages
Messages.
MessagesMessages
Manage Users
Manage Users
Manage UsersManage Users
ADD REMINDER button to add this reminder to your Existing
ADD REMINDERADD REMINDER
Existing
Existing Existing
The Manage Users function allows you to add and edit user of your iCenter/iCenteri WEB page. When the MANAGE USERS
MANAGE USERS button is clicked on the main page, the
MANAGE USERSMANAGE USERS
“User Management” screen is displayed. The “User Management” screen displays
all existing users as follows:
Existing Users
User (click to edit the user) Remote
Control
ricky Edit Content Selections No Yes
ringo No Yes
Primary User Name rick
Primary User Password
Enabled Select
❏
❏
(Required for deletion)
Add a new user
47
Internet Features (cont'd)
To edit a user, click on their user name. The “Edit a User” screen is displayed as
follows:
Primary User Name rick
Primary User Password
New User Name
New Password
Confirm Password
Remote Control Permission No
User Enabled Yes
Please Note: Leave the Password fields blank unless you are changing the
Password.
To add a new user, click on the Add a New User
Add a New User link. The “Add New User” screen
Add a New UserAdd a New User
is displayed as follows:
Primary User Name rick
Primary User Password
New User Name
New Password
Confirm Password
Remote Control Permission No
View current users.
48
Internet Features (Cont'd)
Edit Profile
Edit Profile
Edit ProfileEdit Profile
The Edit Profile function allows you (the Master User only) to edit the profile
(password or email address) of a user of your iCenter/iCenter-i WEB page.. When
the EDIT PROFILE
EDIT PROFILE button is clicked on the main page, the “Edit Profile” screen is
EDIT PROFILEEDIT PROFILE
displayed as follows:
Edit User Profile
New User Name rick
New Password *******
Confirm Password *******
Email xxxxxx@xxx.com
Edit the user profile as follows:
1. Enter the user name.
2. Enter the new password.
3. Re-enter (confirm) the new password.
4. Enter the email address.
5. Click on the SAVE
Remote Control
Remote Control
Remote ControlRemote Control
SAVE button.
SAVESAVE
The Remote Control function allows you to view and operate your iCenter/iCenter-i
from a remote PC or laptop computer. In remote control mode you can arm and
disarm your system, view zone event log information, bypass zones, and see if you
have voice messages. For accounts that have more than one iCenter/iCenter-i, you
can select which iCenter/iCenter-i is to be accessed by using a radio-button set.
When you click on the REMOTE CONTROL
REMOTE CONTROL button on the main page, the “Remote
REMOTE CONTROLREMOTE CONTROL
Control” screen is displayed as follows:
Connect via….
49
Internet Features (cont'd)
For your protection enter the password for user: [rick]
Password
Start session
Start the Remote Control session as follows:
1 Enter the user name password.
2 Click on the START SESSION
START SESSION button.
START SESSIONSTART SESSION
NOTE: If no password is entered or an incorrect password is entered, the screen
will display:
“Failed to Validate User”
Click Try Again To attempt to log in again.
If the password is accepted, the “Remote Control of your Console” screen is shown
with the “Home” screen of your iCenter/iCenter-i displayed.
50
Disconnect
Click on the buttons of the displayed iCenter/iCenter-i screens to operate the system
as you would from the iCenter/iCenter-i Touchpad.
When you wish to leave iCenter/iCenter-i, click the Disconnect
Disconnect button. “Closing,
Disconnect Disconnect
Returning to Remote Control Login.” is displayed.
Internet Features (Cont'd)
User Feedback
User Feedback
Name:
Email Address:
Type of Feedback Suggestion
Category iCenter/iCenter-i Web Interface – Custom
Content
Other:
Comment:
(250 characters max.)
Logout
Logout
LogoutLogout
The LOGOUT
LOGOUT button allows you to leave the iCenter.alarmnet.com Internet site.
LOGOUTLOGOUT
Pressing the LOGOUT button displays the following:
You have been logged out.
Click Here to Close Your Browser
51
Internet Features (cont'd)
52
Advanced System Features
Introduction to Advanced System Features
While most of the commonly used security functions are available from
ICenter/iCenter-i’s advanced user interface, there are some less used, advanced
features that can either be accessed through Touchpad Emulation mode on the
iCenter/iCenter-i or a standard Custom English Touchpad. To program your
system’s advanced features, refer to you Control Panel User Guide.
Touchpad (Console) Emulation Mode
Console Mode allows you to use an iCenter/iCenter-i interface just as you would a
regular system Touchpad. In this mode, you can use either iCenter/iCenter-i’s touch
screen "Touchpad,” or the Touchpad keys (if available on your model). All
commands shown in Console Emulation mode can also be executed from a standard
Custom English Touchpad.
How to Enter Console Emulation Mode
To access the touch screen "Touchpad," do the following:
SCREEN ACTION
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. Press the MORE CHOICES button. The
"More Choices" screen is displayed.
53
Trouble Conditions (Cont'd)
SCREEN ACTION
3. Press the CONSOLE MODE button on the
"More Choices" screen. The "Touchpad"
screen is displayed.
54
Summary of Audio Notification
SOUND CAUSE DISPLAY
Loud, Interrupted*
Touchpad &
External
Loud, Continuous*
Touchpad &
External
One Short Beep
(not repeated)
Touchpad only
One Short Beep
(once every 15
sec.) Touchpad
only
One Beep
(every 60 sec.)
Touchpad only
Two Short Beeps
Touchpad only
Three Short Beeps
Touchpad only
Rapid Beeping
Touchpad only
Slow Beeping
Touchpad only
Fire Alarm FIRE is displayed; descriptor of zone in
alarm is displayed.
Burglary/Audible Emergency
Alarm
a. System disarm
b. System arming attempt
with an open zone.
c. Bypass verify
ALARM is displayed; descriptor of zone in
alarm is also displayed.
a. DISARMED/READY TO ARM is
displayed.
b. The number and descriptor of the open
protection zone are displayed.
c. Numbers and descriptors of the
bypassed protection zones are displayed
(One beep is heard for each zone
displayed). Subsequently, the following is
displayed: DISARMED BYPASS Ready to
Arm
System is in test mode Opened Zone identifications will appear.
Low battery at a transmitter LO BAT displayed with description of
transmitter.
Arm Away or Maximum ARMED AWAY or ARMED MAXIMUM is
displayed. Red ARMED indicator is lit.
a. Arm Stay or Instant
b. Zone opened while system
is in Chime Mode.
c. Entry warning**
a. ARMED STAY ZONE BYPASSED or
ARMED INSTANT ZONE BYPASSED is
displayed. Red ARMED indicator is lit.
b. CHIME displayed, descriptor of open
protection zone will be displayed if the [✱]
key is pressed.
c. DISARM SYSTEM OR ALARM WILL
OCCUR is displayed.
a. Trouble
b. AC power loss alert***
c. Memory of alarm
a. CHECK displayed. Descriptor of
troubled protection zone is displayed.
b. AC LOSS displayed (may alternate
with other displays that may be present).
c. FIRE or ALARM is displayed;
descriptor of zone in alarm is displayed.
a. Entry delay warning**
b. Exit delay warning (if
programmed)
a. DISARM SYSTEM OR ALARM WILL
OCCUR is displayed. Exceeding the delay
time without disarming causes alarm.
b. ARMED AWAY or ARMED MAXIMUM
is displayed along with You May Exit Now
* If bell is used as external sounder, fire alarm is pulsed ring; burglary/audible
emergency is steady ring.
55
Summary of Audio Notification (Cont'd)
** Entry warning may consist of three short beeps or slow continuous beeping, as
programmed by your installer.
*** Loss of system battery power is not indicated or annunciated by the Touchpad
(warnings are for loss of AC power only).
56
Summary of iCenter/iCenter-i LED Operation
iCenter/iCenter-i LED Operation
iCenter/iCenter-i has four LEDs labeled - WEB, ARMED, READY and MESSAGE.
WEB and MESSAGE LEDs are yellow. ARMED LED is red and READY LED is
green. Each LED's on and off state has different meanings during different
operations.
Following states use LEDs to represent different sub-states.
• Normal (Idle) State
• Software Download State
• Software Download State - Failure Modes
Each LED can have four different states - ON, OFF, FAST BLINK and SLOW
BLINK. All LEDs do not use all of the above states. Details are provided below.
LEDs During Normal (Idle) State
LEDs During Normal (Idle) State
LEDs During Normal (Idle) StateLEDs During Normal (Idle) State
LED DESCRIPTION
WEB ON – Connected to internet
OFF – not connected
FAST BLINK - either sending or receiving data
SLOW BLINK – connecting to server (BB) or dialing to RAS server (DU)
ARMED ON – Security system is armed
OFF – Security system is not armed
READY ON – Security system is disarmed and ready to arm
OFF – Security system is disarmed but not ready. Faults/troubles present
LEDs Du
LEDs During Software Downloading
LEDs DuLEDs Du
WEB ON – obtained IP address (via either DHCP client or static IP assignment) (BB)
ARMED ON – connected to server
READY ON – successfully downloaded configuration data
MESSAGE ON – erasing application code
ring Software Downloading
ring Software Downloadingring Software Downloading
LED DESCRIPTION
or established link to RAS server (DU)
OFF – not connected
SLOW BLINK – connecting to server (BB) or dialing (DU)
OFF –
FAST BLINK – could not connect to server (no route or authentication failure)
SLOW BLINK – connecting to server
FAST BLINK – could not download configuration data or if with ARMED FAST
BLINK then it connected to server but failed authentication
OFF –
SLOW BLINK – downloading application code
VERY SLOW BLINK – verifying CRC after successful code download
57
Summary of iCenter/iCenter-i LED Operation (Cont'd)
LED Operation When Software Download
LED Operation When Software Download Fails
LED Operation When Software DownloadLED Operation When Software Download
There are the following sequences providing the extra failure information:
1. CRC failure 1 (calculated CRC does not match CRC provided with binary)
• WEB, ARMED, READY and MESSAGE – all FAST BLINK for 3 seconds,
following
• WEB, ARMED, READY and MESSAGE ON for 3 seconds and following
• WEB, ARMED, READY and MESSAGE FAST BLINK for 3 seconds.
2. CRC failure 2 (calculated network CRC does not match CRC provided with
binary)
• WEB, ARMED, READY and MESSAGE – all FAST BLINK for 3 seconds,
following
• WEB, ARMED, READY and MESSAGE SLOW BLINK for 3 seconds and
following
• WEB, ARMED, READY and MESSAGE FAST BLINK for 3 seconds.
Fails
Fails Fails
58
How to Access iCenter/iCenter-i Setup Options
Setup allows you to adjust the touch screen contrast and/or adjust the
iCenter/iCenter-i speaker volume. You may also select the time interval that must
pass prior to iCenter/iCenter-i going into screen saver mode (screen goes blank).
Additionally, you may enter the Use
Clean Screen
Clean Screen (maintenance mode) from the "Setup" screen by pressing the
Clean ScreenClean Screen
User Setup
r Setup screen, Advanced Setup
UseUse
r Setupr Setup
corresponding button.
How to Access Setup
Access the "Setup" features as follows:
SCREEN ACTION
iCenter/iCenter-i Setup
Advanced Setup screen, or
Advanced SetupAdvanced Setup
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. Press the MORE CHOICES button. The
"More Choices" screen is displayed.
3. Press the SETUP button on the "More
Choices" screen. The "Setup" screen is
displayed.
59
iCenter/iCenter-i Setup (cont'd)
SCREEN ACTION
How to Adjust the Touch Screen Contrast
You may adjust the touch screen contrast as follows:
If… Then…
you want to increase contrast press the slide bar above the current contrast
you want to decrease contrast press the slide bar below the current contrast
if another adjustment or selection is to be
made
If no additional adjustment or selection is to be
made
setting.
setting.
go to the corresponding paragraph in this
section.
press the "Back" icon at the upper-right-hand
corner of the "Setup" screen to return to the
previous screen, or
press the "Home" icon in the upper left-hand
corner of the "Setup" screen to return to your
"Home" screen.
60
CONTRAST
SLIDEBAR
INDICATOR
AUI-011-V0
Touch Screen Contrast Control
Touch Screen Contrast Control
Touch Screen Contrast ControlTouch Screen Contrast Control
How to Adjust the Volume
You may adjust the iCenter/iCenter-i speaker volume by pressing your finger on the
touch screen slide bar associated with the "Volume" scale and doing the following:
If… Then…
you want to increase volume press the slide bar above the current volume setting.
you want to decrease volume press the slide bar below the current volume setting.
SLIDEBAR
INDICATOR
iCenter/iCenter-i Setup (Cont'd)
VOLUME
iCenter/iCenter
iCenter/iCenter----i Volume Control
iCenter/iCenteriCenter/iCenter
How to Select Screen Saver Activation Time
When iCenter/iCenter-i is not armed and not active, it will automatically go into
screen saver mode (display goes blank) after the selected blank display time has
expired (unless never option is selected). To select the screen blank time, do the
following:
SCREEN ACTION
AUI-019-V0
i Volume Control
i Volume Controli Volume Control
1. On the "Setup" screen, press the Blank
Display After: "arrow" button. A pop-up
window displaying the time period options is
displayed.
61
iCenter/iCenter-i Setup (cont'd)
SCREEN ACTION
2. Select the time period option you want by
pressing it. The pop-up window closes
automatically and the selection is displayed in
blue.
NOTE: Additional options can be viewed by
using the up/down "arrows" to scroll through
the time period options.
3. Press either the "Home" or "Back" icon. A
Settings Changed! pop-up window is displayed
stating “ROOT UPDATE – In Progress! Please Wait…” When the Root Update is
complete iCenter/iCenter-i goes to the "Home"
screen or "More Choices" screen depending
on whether you pressed the "Home" or "Back"
icon, respectively ("Home" screen shown).
62
How to Set the Time and Date
iCenter/iCenter-i Setup (Cont'd)
You can set the time and date from the Set Time & Date
Set Time & Date screen. This screen can be
Set Time & DateSet Time & Date
accessed by pressing the Time and Date bar located at the bottom of each
iCenter/iCenter-i screen.
• Since Sync With Network Clock
Sync With Network Clock is always selected on the Set Time & Date
Sync With Network Clock Sync With Network Clock
Set Time & Date
Set Time & DateSet Time & Date
screen, whenever iCenter/iCenter-i checks in with the server (every 10 seconds)
it will get the current GMT time. If the ICenter/iCenter-i time differs from GMT
by 10 seconds or more, the iCenter/iCenter-i time will be reset. Additionally,
iCenter/iCenter-i will send time to the control panel every hour. This 1-hour
timer starts on iCenter/iCenter-i power-up.
• Daylight Savings Time is processed internal to the iCenter/iCenter-i, since
iCenter/iCenter-i gets GMT from the server. When iCenter/iCenter-i adjusts for
DST, the next time the 1-hour timer expires, the new value should be sent to the
control panel.
IMPORTANT:
IMPORTANT: This means that the iCenter/iCenter-i setting will override and
IMPORTANT: IMPORTANT:
overwrite the control panel time setting. That is, if the control panel is set to DST
and adjusts but iCenter/iCenter-i is not, upon the 1-hour timer expiration, the
control panel will be updated to the current iCenter/iCenter-i time that is not
adjusted for DST.
Refer to the Time Zones Settings chart(on the following page) to select the
corresponding Time Zone
Time Zone for the location of the iCenter/iCenter-i by pressing the
Time ZoneTime Zone
“increase” or “decrease” arrow buttons.
Adjust either or both the time and date by pressing the “increase” or “decrease”
arrow buttons as necessary until the proper month, day, year, hour, and minute are
displayed.
INCREASE
BUTTON
(TYPICAL)
DECREASE
BUTTON
(TYPICAL)
OK
BUTTON
Set Time & Date Screen
Set Time & Date Screen
Set Time & Date ScreenSet Time & Date Screen
CANCEL
BUTTON
AUI-009-V0
63
iCenter/iCenter-i Setup (cont'd)
Time Zones
Time Zones
Time ZonesTime Zones
Using the chart below, select the time zone number corresponding to the location of
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. From the "Arming" screen press the MORE CHOICES button. The "More Choices" screen
is displayed.
3. Press the SETUP button on the "More
Choices" screen. The "Setup" screen is
displayed.
4. Press the ADVANCED SETUP button on
the "Setup" screen. The "User Authorization"
screen is displayed with the instructions "Enter Authorized Code".
65
iCenter/iCenter-i Setup (cont'd)
SCREEN ACTION
5. Enter your “Master” code. The “Advanced
Setup” screen is displayed.
6. Press the DIAGNOSTICS button on the
"Advanced Setup" menu screen. The
"Diagnostics" screen is displayed.
7. Begin the Touch Screen calibration from the
"Diagnostics" screen by pressing the
Calibrate button. When the Calibrate button is
pressed, the Touch Screen Calibration
screen is displayed.
8. Within the Touch Screen Calibration
screen you are asked to Press the center of the box in upper left corner. Press the center
of the square.
When this square is touched, the Touch
Screen Calibration screen displays Next
press the box in the upper right corner.
66
iCenter/iCenter-i Setup (Cont'd)
SCREEN ACTION
9. Press the center of the square. The Touch
Screen Calibration screen displays Next
press the box in lower right corner.
10. Press the center of the square. The Touch
Screen Calibration screen displays Next
press the box in lower left corner.
67
iCenter/iCenter-i Setup (cont'd)
SCREEN ACTION
10. Press the center of the square. The
Touch Screen Calibration screen displays
Touch target to verify calibration.
If touch screen calibration was not successful,
Calibration Unsuccessful is displayed
momentarily. You are then returned
automatically to the first Touch Screen Calibration screen.
NOTE: You will progress through the Touch Screen Calibration screens regardless of
where you touch. To successfully calibrate the
touch screen, you must press the center of the
box on each screen.
68
Replacing Batteries In Wireless Sensors
Wireless sensors may not have been used in your security system.
If your system has wireless sensors, each wireless sensor in your system has a 9volt or 3-volt battery. The system detects a low battery in any wireless sensor,
including smoke detectors, the optional personal emergency transmitter, and the
optional portable wireless Touchpad. (A low battery in a portable wireless Touchpad
is detected as soon as one of its keys is pressed, and the Touchpad will display 00
Alkaline batteries provide a minimum of 1 year of operation, and in most units and
applications, provide 2 to 4 years of service. Actual battery life will depend on the
environment in which the sensor is used, the number of signals that the transmitter
in the sensor has had to send, and the specific type of sensor. Factors such as
humidity, high or low temperatures or large swings in temperature, may lead to the
reduction of battery life in an installation. If you have a low battery in a wireless
sensor, a low battery message is displayed on the Touchpad.
Maintaining Your System
00.)
0000
In addition, a battery-operated smoke detector with a low battery also emits a single
"chirp" sound once every 20 to 30 seconds, identifying itself as the smoke detector
with the weak battery. If you do not replace a smoke detector's low battery, the
smoke detector may sound continuously, as if there were a fire alarm.
The low battery message comes on as a warning that battery replacement in indicated
sensor(s) is due within 30 days. In the meantime, the sensor(s) causing the low battery
indication is still fully operational.
Important:
Important: Use only batteries recommended by your installer as replacement.
Important:Important:
Silencing Low Battery Warning Tones at the Touchpad
The warning tones can be silenced by performing an OFF sequence (code plus OFF
key),,,, but the low battery display remains on as a reminder that you have a low
battery condition in one or more of your sensors. When you replace the battery, the
sensor sends a "good battery" signal to the panel as soon as the sensor is activated
(opening/closing of door, window, etc.), causing the low battery display to turn off. If
the sensor is not activated, the display automatically clears within 1 hour.
69
Maintaining Your System (cont'd)
How to Clean your iCenter/iCenter-i
IMPORTANT:
IMPORTANT: Do not use an abrasive cleaning agent or abrasive cloth when
IMPORTANT:IMPORTANT:
cleaning your iCenter/iCenter-i or damage to the touch screen may occur.
Clean iCenter/iCenter-i as follows:
SCREEN ACTION
1. From the "Home" screen, press the
SECURITY button. The "Arming" screen is
displayed.
2. Press the MORE CHOICES button. The
"More Choices" screen is displayed.
70
3. Press the SETUP button on the "More
Choices" screen. The "Setup" screen is
displayed.
Maintaining Your System (Cont'd)
SCREEN ACTION
4. Press the CLEAN SCREEN button. A
window indicating “Touch Screen will be
disabled so that you may wipe the screen
clean. Please use a damp, soft cloth. DO
NOT use any liquids, sprays, or ammoniabased cleansers. Press CONTINUE to
disable touch screen.”
When the Continue button is pressed the
“Touch Screen Disabled for ➙➙➙➙ 30 Seconds”.
During these 30 seconds the touch screen
should be wiped clean of fingerprints using a
mild soap solution and a soft cloth. When the
counter reaches zero, the window
automatically closes and the touch screen is
active.
NOTE: Do not spray cleaning agent directly on
the screen, spray it on cloth, then wipe surface
area.
Routine Care
• Treat the components of your security system as you would any other electrical
equipment. Do not slam sensor-protected doors or windows.
• Keep dust from accumulating on the Touchpad and all protective sensors,
particularly on motion sensors and smoke detectors.
The Touchpad and sensors should be cleaned carefully with a dry soft cloth.
spray water or any other fluid on the units.
spray water or any other fluid on the units.
spray water or any other fluid on the units.spray water or any other fluid on the units.
Do not
Do not
Do not Do not
71
Maintaining Your System (cont'd)
72
Glossary
The following terms are used throughout the guide.
Arm/Disarm:
Arm/Disarm: “Armed” simply means that the burglary portion of your system is
Arm/Disarm: Arm/Disarm:
turned ON and is in a state of readiness. “Disarmed” means that the burglary
system is turned OFF, and must be rearmed to become operational. However, even
in a “disarmed” state, “emergency” and “fire” portions of your system are still
operational.
Bypass:
Bypass: To disarm a specific area of burglary protection while leaving other areas
Bypass:Bypass:
operational.
Day/Night Zone
Day/Night Zone: An area of protection whose violation causes a trouble indication
Day/Night ZoneDay/Night Zone
during the disarmed (DAY) mode and an alarm during the armed (NIGHT) mode.
Delay Zone:
Delay Zone: An area of protection containing doors most frequently used to enter or
Delay Zone:Delay Zone:
exit (typically, a front door, back door, or door from the garage into the building).
The delay zone allows sufficient time for authorized entry or exit without causing an
alarm. Consult your installer for the entry and exit delay times that have been set
for your system during installation and record them on the separate sheet provided
in this guide.
Touchpad:
Touchpad: This is the area on your Touchpad containing numbered pushbuttons
Touchpad:Touchpad:
similar to those on telephones or calculators. These keys control the arming or
disarming of the system, and perform other functions that were previously
described in this manual.
Master Code:
Master Code: A 4-digit code that gives users access to all of the system’s functions,
Master Code:Master Code:
except unattended downloading (installer only). See also “User Code.
Partition:
Partition: An independent group of zones that can be armed and disarmed without
Partition:Partition:
affecting other zones or users.
User Code:
User Code: A 4-digit code that gives users access to the system’s basic functions.
User Code:User Code:
See also “Master Code.”
Zone:
Zone: A specific area of protection.
Zone:Zone:
73
Glossary (Cont'd)
74
UL NOTICE: This is a “GRADE A” system.
“FEDERAL COMMUNICATIONS COMMISSION (FCC) Part 15 STATEMENT”
This equipment has been tested to FCC requirements and has been found acceptable for use. The FCC requires
the following statement for your information:
This equipment generates and uses radio frequency energy and if not installed and used properly, that is, in strict
accordance with the manufacturer’s instructions, may cause interference to radio and television reception. It has
been type tested and found to comply with the limits for a Class B computing device in accordance with the
specifications in Part 15 of FCC Rules, which are designed to provide reasonable protection against such
interference in a residential installation. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
• If using an indoor antenna, have a quality outdoor antenna installed.
• Reorient the receiving antenna until interference is reduced or eliminated.
• Move the receiver away from the control/communicator.
• Move the antenna leads away from any wire runs to the control/communicator.
• Plug the control/communicator into a different outlet so that it and the receiver are on different branch
circuits.
If necessary, the user should consult the dealer or an experienced radio/television technician for additional
suggestions.
The user or installer may find the following booklet prepared by the Federal Communications Commission helpful:
“Interference Handbook”
This booklet is available from the U.S. Government Printing Office, Washington, DC 20402.
The user shall not make any changes or modifications to the equipment unless authorized by the Installation
Instructions or User’s Manual. Unauthorized changes or modifications could void the user’s authority to operate
the equipment.
IN THE EVENT OF TELEPHONE OPERATIONAL PROBLEMS
In the event of telephone operational problems, disconnect the control by removing the plug from the RJ31X
(CA38A in Canada) telephone wall jack. We recommend that your certified installer demonstrate disconnecting the
phones on installation of the system. Do not disconnect the phone connection inside the control/communicator.
Doing so will result in the loss of your phone lines. If the regular phone works correctly after the
control/communicator has been disconnected from the phone lines, the control/communicator has a problem and
should be returned for repair. If upon disconnection of the control/communicator, there is still a problem on the
line, notify the telephone company that they have a problem and request prompt repair service. The user may not
under any circumstances (in or out of warranty) attempt any service or repairs to the system. It must be returned to
the factory or an authorized service agency for all repairs.
75
FEDERAL COMMUNICATIONS COMMISSION (FCC) Part 68 NOTICE
This equipment complies with Part 68 of the FCC rules. On the front cover of this equipment is a label that
contains, among other information, the FCC registration number and ringer equivalence number (REN) for this
equipment. If requested, this information must be provided to the telephone company.
This equipment uses the following jacks:
An RJ31X is used to connect this equipment to the telephone network.
The REN is used to determine the quantity of devices that may be connected to the telephone line. Excessive
RENs on the telephone line may result in the devices not ringing in response to an incoming call. In most, but not
all areas, the sum of the RENs should not exceed five (5.0). To be certain of the number of devices that may be
connected to the line, as determined by the total RENs, contact the telephone company to determine the
maximum REN for the calling area.
If this equipment causes harm to the telephone network, the telephone company will notify you in advance that
temporary discontinuance of service may be required. If advance notice is not practical, the telephone company
will notify the customer as soon as possible. Also, you will be advised of your right to file a complaint with the FCC
if you believe necessary.
The telephone company may make changes in its facilities, equipment, operations, or procedures that could affect
the operation of the equipment. If this happens, the telephone company will provide advance notice in order for
you to make the necessary modifications in order to maintain uninterrupted service.
If trouble is experienced with this equipment, please contact the manufacturer for repair and warranty information.
If the trouble is causing harm to the telephone network, the telephone company may request you remove the
equipment from the network until the problem is resolved.
There are no user serviceable components in this product, and the manufacturer must make all necessary repairs.
Other repair methods may invalidate the FCC registration on this product.
This equipment cannot be used on telephone company-provided coin service. Connection to Party Line Service is
subject to state tariffs.
This equipment is hearing-aid compatible.
When programming or making test calls to an emergency number, briefly explain to the dispatcher the reason for
the call. Perform such activities in the off-peak hours; such as early morning or late evening.
76
CANADIAN DEPARTMENT OF COMMUNICATIONS (DOC) STATEMENT
NOTICE
The Canadian Department of Communications label
identifies certified equipment. This certification means that
the equipment meets certain telecommunications network
protective, operational and safety requirements. The
Department does not guarantee the equipment will
operate to the user’s satisfaction.
Before installing this equipment, users should ensure that
it is permissible to be connected to the facilities of the
local telecommunications company. The equipment must
also be installed using an acceptable method of
connection. In some cases, the company’s inside wiring
associated with a single line individual service may be
extended by means of certified connector assembly
(telephone extension cord). The customer should be
aware that compliance with the above conditions may not
prevent degradation of service in some situations.
Repairs to certified equipment should be made by an
authorized Canadian maintenance facility designated by
the supplier. Any repairs or alterations made by the user
to this equipment, or equipment malfunctions, may give
the telecommunications company cause to request the
user to disconnect the equipment.
Users should ensure for their own protection that the
electrical ground connections of the power utility,
telephone lines and internal metallic water pipe system, if
present, are connected together. This precaution may be
particularly important in rural areas.
Caution: User should not attempt to make such
connections themselves, but should contact the
appropriate electric inspection authority, or electrician, as
appropriate.
The Load Number
denotes the percentage of the total load to be connected
to a telephone loop which is used by the device, to
prevent overloading. The termination on a loop may
consist of any combination of devices subject only to the
requirement that the total of the Load Numbers of all the
devices does not exceed 100.
(LN) assigned to each terminal device
L’étiquette du ministère des Communications du Canada
identifie le matériel homologué. Cette étiquette certifie que le
matériel est conforme à certaines normes de protection,
d’exploitation et de sécurité des réseaux de
télécommunications. Le ministère n’assure toutefois pas que
le matériel fonctionnera à la satisfaction de l’utilisateur.
Avant d’installer ce matériel, l’utilisateur doit s’assurer qu’il
est permis de le raccorder aux installations de l’entreprise
locale de télécommunications. Le matériel doit également
être installé en suivant une méthode acceptée de
raccordement. Dans certains cas, les fils intérieurs de
l’entreprise utilisés pour un service individuel à la ligne
unique peuvent être prolongés au moyen d’un dispositif
homologué de raccordement (cordon prolongateur
téléphonique interne). L’abonné ne doit pas oublier qu’il est
possible que la conformité aux conditions énoncées cidessus n’empèchet pas la dégradation du service dans
certaines situations. Actuellement, les entreprises de
télécommunications ne permettent pas que l’on raccorde leur
matériel aux prises d’abonnés, sauf dans les cas precis
prévus par les tarifs particuliers de ces entreprises.
Les réparations du matériel homologué doivent être
effectuées pas un centre d’entretien canadien autorisé
désigné par le fournisseur. La compagnie de
télécommunications peut demander à l’utilisateur de
débrancher un appareil à la suite de réparations ou de
modifications effectuées par l’utilisateur ou à cause de
mauvais fonctionnement.
Pour sa propre protection, l’utilisateur doit s’assurer que tous
les fils de mise en terre de la source d’énergie électrique,
des lignes téléphoniques de réseau de conduites d’eau s’il y
en a, soient raccordés ensemble. Cette précaution est
particulièrement importante dans les régions rurales.
Avertissement: L’utilisateur ne doit pas tenter de faire ces
raccordements lui-même; il doit avoir recours à un service
d’inspection des installations électriques, ou à un électricien,
selon le cas.
L’indice de charge
pour éviter toute surcharge indique le pourcentage de la
charge totale qui peut être raccordé à un circuit téléphonique
bouclé utilisé par ce dispositif. La terminaison du circuit
bouclé peut être constituée de n’importe quelle combinaison
de dispositifs, pourvu que la somme des indices de charge
de l’ensemble des dispositifs ne dépasse pas 100.
(IC) assigné à chaque dispositif terminal
AVIS
77
LIMITED WARRANTY
Terms and Conditions Applying to Sale of Equipment
1. Limited Warranty.
Any part of the system, including the wiring, installed under this Agreement which proves to be defective in material or
workmanship within 90 days of the date of completion of installation will be repaired or replaced at ADT's option with a
new functionally operative part. Labor and material required to repair or replace such defective components or to make
mechanical adjustments to the system will be free of charge for a period of 90 days following the completion of the
original installation.
This warranty is extended only to the original consumer purchaser of the system and may be enforced only by such
person.
To obtain service under this warranty, call or write our local ADT Service Department at the telephone number or
address found in your local yellow pages.
Service pursuant to the warranty will be furnished only during ADT's normal working hours 8:00A.M. to 4:30P.M.,
Monday through Friday, except holidays. Services rendered outside the normal working hours of ADT are not within the
scope of this warranty and any services requested to be performed at such times shall be charged for at ADT's then
applicable rates for labor and material.
This warranty does not apply to the conditions listed below, and in the event customer calls ADT for service under the
warranty and upon inspection it is found that one of these conditions has led to the inoperability or apparent inoperability
of the system, a charge will be made for the service call of the ADT representative, whether or not he actually works on
the system. Should it actually be necessary to make repairs to the system due to one of the "conditions Not Covered By
Warranty", a charge will be made for such work at ADT's then applicable rates for labor and material.
Conditions Not Covered By Warranty.
A. Damage from accidents, acts of God, alterations, misuse, tampering or abuse. B. Failure of the customer to properly
close or secure a door, window, or other point protected by a burglar alarm device. C. Failure of customer to properly
follow operating instructions provided by ADT at time of installation or at a later date. D. Trouble in leased telephone.
E. Trouble due to interruption of commercial power. F. Battery replacements.
This warranty is in lieu of all other express warranties. Any implied warranties of merchantability and fitness for a
particular purpose are limited in duration to a period of 90 days from the date of completion of installation. The exclusive
remedy of the customer hereunder shall be repair or replacement as stated above. Under no circumstances shall ADT
be liable to the customer or any other person for incidental or consequential damages of any nature, including without
limitation, damages for personal injury or damages to property, and, however occasioned, whether alleged as resulting
from breach of warranty by ADT, the negligence of ADT, or otherwise, ADT's liability will in no event exceed the
purchase price of the system. Some states may not allow limitations on how long an implied warranty lasts, or the
exclusion or limitations of incidental or consequential damages, so the above limitations and exclusions may not apply
to you, unless a longer period is required by applicable law. Any action against ADT in connection with a system must
be commenced within one year after the cause of action has occurred.
No agent, employee or representative of ADT nor any other person is authorized to modify this warranty in any respect.
This warranty gives you specific legal rights and you may also have other rights which vary from state to state.
2. Installation.
ADT agrees to install the equipment in a workmanlike manner in accordance with the following conditions:
A. Customer will make premises available without interruption during ADT normal working hours 8:00A.M. to 4:30P.M.,
Monday through Friday, except Holidays. B. Customer understands that the installation will necessitate drilling into
various parts of the premises: ADT intends, generally, to conceal wiring in the finished areas of the premises; however,
there may be areas which, due to construction, decoration, or furnishing of the premises, ADT determines, in its sole
discretion, that it would be impractical to conceal wiring and, in such cases, wiring will be exposed. C. Customer agrees
to provide 110 VAC electrical outlets at designated locations for equipment requiring AC power. D. Customer to provide
for lifting and replacing carpeting, if required, for installation of floor mats or wiring.
––––––––––––––––––––––––––––––– ALL RIGHTS RESERVED ––––––––––––––––––––––––––––––
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means –
electronic, mechanical, photocopying, recording, or otherwise without the written permission of ADT Security Systems, Inc.
The material in this publication is for information purposes and subject to change without notice. ADT Security Systems, Inc.
assumes no responsibility for any errors which may appear in this publication.
78
NOTES
79
•••••••••••••••••••••••••••••••••••••••
ADT Security Services, Inc. One Town Center Rd. Boca Raton, FL 33486