Dsc ESCORT 558OTC V3.0, ESCORT 5580TC V3.0 User Manual

• W A R N I N G •
This manual contains information on limitations regarding product use and function
and information on the limitations as to liability of the manufacturer.
Instruction
Manual
ESCORT558OTC
Version 3.O
FCC COMPLIANCE STATEMENT
CAUTION: Changes or modifications not expressly approved by Digital Security Controls Ltd. could void your authority to use this equipment.
This equipment generates and uses radio frequency energy and if not installed and used properly, in strict accordance with the manufacturer’s instructions, may cause interference to radio and television reception. It has been type tested and found to comply with the limits for Class B device in accordance with the specifications in Subpart “B” of Part 15 of FCC Rules, which are designed to provide reasonable protection against such interference in any residential installation. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause interference to television or radio reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Re-orient the receiving antenna
Relocate the alarm control with respect to the receiver
Move the alarm control away from the receiver
Connect the alarm control into a different outlet so that alarm control
and receiver are on different circuits. If necessary, the user should consult the dealer or an experienced radio/
television technician for additional suggestions. The user may find the following booklet prepared by the FCC helpful: ”How to Identify and Resolve Radio/Television Interference Problems.” This booklet is available from the U.S. Government Printing Office, Washington, D.C. 20402, Stock # 004-000-00345-4.
IMPORTANT INFORMATION
FCC Registration Number: F53CAN-22830-KX-N, Ringer Equivalence Number: 0.2B, USOC Jack: RJ-31X
MALFUNCTION OF THE EQUIPMENT In the event that this equipment should fail to operate properly, the customer shall disconnect the equipment from the telephone line to determine if it is the customer’s equipment which is not working properly, or if the problem is with the telephone company network. If the problem is with this equipment, the customer shall discontinue use until it is repaired.
TELEPHONE CONNECTION REQUIREMENTS Except for the telephone company provided ringers, all connections to the telephone network shall be made through standard plugs and telephone company provided jacks, or equivalent, in such a manner as to allow for easy, immediate disconnection of the terminal equipment. Standard jacks shall be so arranged that, if the plug connected there is withdrawn, no interference to the operation of the equipment at the customer’s premises which remains connected to the telephone network shall occur by reason of such withdrawal.
INCIDENCE OF HARM Should terminal equipment or protective circuitry cause harm to the telephone network, the telephone company shall, where practicable, notify the customer that temporary disconnection of service may be required; however, where prior notice is not practicable, the telephone company may temporary discontinue service if such action is deemed reasonable in the circumstances. In the case of such temporary discontinuance, the telephone company shall promptly notify the customer and will be given the opportunity to correct the situation. The customer also has the right to bring a complaint to the FCC if he feels the disconnection is not warranted.
CHANGE IN TELEPHONE COMPANY EQUIPMENT OR FACILITIES
The Telephone Company may make changes in its communications facilities, equipment, operations or procedures, where such actions is reasonably required and proper in its business. Should any such changes render the customer’s terminal equipment incompatible with the telephone company facilities the customer shall be given adequate notice to the effect of the modifications to maintain uninterrupted service.
GENERAL This equipment should not be used on coin telephone lines. Connection to party line service is subject to state tariffs.
RINGER EQUIVALENCE NUMBER (REN) The REN is useful to determine the quantity of devices that you may connect to your telephone line and still have all of those devices ring when your telephone number is called. In most, but not all areas, the sum of the REN’s of all devices connected to one line should not exceed five (5). To be certain of the number of devices that you may connect to your line, you may want to contact your local telephone company.
EQUIPMENT MAINTENANCE FACILITY
Digital Security Controls Ltd. 160 Washburn St.Lockport, NY 14094
AVIS: L’étiquette de l’Industrie Canada identifie le matériel homologué. Cette étiquette certifie que le matériel est conforme à certaines normes de protection, d’exploitation et de sécurité des réseaux de télécommunications. Industrie Canada n’assure toutefois pas que le matériel fonctionnera à la satisfaction de l’utilisateur.
Avant d’installer ce matériel, l’utilisateur doit s’assurer qu’il est permis de le raccorder aux installations de l’entreprise locale de télécommunication. Le matériel doit également être installé en suivant une méthode acceptée de raccordement. L’abonné ne doit pas oublier qu’il est possible que la conformité aux conditions énoncées ci-dessus n’empêchent pas la dégradation du service dans certaines situations. Les réparations de matériel homologué doivent être effectuées par un centre d’entretien canadien autorisé désigné par le fournisseur. La compagnie de télécommunications peut demander à l’utilisateur de débrancher un appareil à la suite de réparations ou de modifications effectuées par l’utilisateur ou à cause de mauvais fonctionnement. Pour sa propre protection, l’utilisateur doit s’assurer que tous les fils de mise à la terre de la source d’énergie électrique, les lignes téléphoniques et les canalisations d’eau métalliques, s’il y en a, sont raccordés ensemble. Cette précaution est particulièrement importante dans les régions rurales.
AVERTISSEMENT: L’utilisateur ne doit pas tenter de faire ces raccordements lui-même; il doit avoir recours à un service d’inspection des installations électriques, ou à un électricien, selon le cas. L’indice de charge (IC) assigné a chaque dispositif terminal indique, pour éviter toute surcharge, le pourcentage de la charge totale qui peut être raccordée à un circuit téléphonique bouclé utilisé par ce dispositif. La terminaison du circuit bouclé peut être constituée de n’importe quelle combinaison de dispositifs, pourvu que la somme des indices de charge de l’ensemble des dispositifs ne dépasse pas 100.
L ’Indice de charge de ce pr oduit est 2.
NOTICE: The Industry Canada label identifies certified equipment. This
certification means that the equipment meets certain telecommunications network protective, operational and safety requirements. Industry Canada does not guarantee the equipment will operate to the user’s satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. User should ensure for their own protection that the electrical ground connections of the power utility, telephone lines and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. CAUTION: Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate. The Load Number (LN) assigned to each terminal device denotes the percentage of the total load to be connected to a telephone loop which is used by the device, to prevent overloading. The termination on a loop may consist of any combination of devices subject only to the requirement that the total of the Load Numbers of all the devices does not exceed 100.
The Load Number of this unit is 2.
Table of Contents
1: Introduction ..................................................................................................................................... 1
1.1 About Your Security System ................................................................................................ 1
1.2 General System Operation .................................................................................................. 2
1.3 Access Codes ..................................................................................................................... 2
1.4 Audio Help ........................................................................................................................... 2
2: Accessing Your Security System.................................................................................................. 3
2.1 Local Access ....................................................................................................................... 3
2.2 Remote Access ................................................................................................................... 3
2.3 Receiving Incoming Calls ................................................................................................... 3
2.4 What is a Partition? .............................................................................................................. 4
2.5 If You Have a Multiple Partition System ............................................................................... 4
2.6 Fire, Auxiliary and Panic Alarms ......................................................................................... 4
3: Arming and Disarming ................................................................................................................... 5
3.1 Away Arming ....................................................................................................................... 5
3.2 At-home Arming ................................................................................................................... 5
3.3 Disarming ............................................................................................................................ 6
3.4 If An Alarm Sounds While You Are Home ............................................................................ 6
3.5 Alarm Memory ..................................................................................................................... 7
3.6 Bypassing Zones ................................................................................................................. 7
4: T rouble Conditions .......................................................................................................................... 8
5: Setting Escort5580TC Options ......................................................................................................9
5.1 Setting The Time and Date .................................................................................................. 9
5.2 Volume Control .................................................................................................................... 9
5.3 Speech Rate Control ......................................................................................................... 10
5.4 Door Chime Feature .......................................................................................................... 10
6: Home Automation ......................................................................................................................... 11
6.1 How to Access the Home Automation Menu ................................................................... 11
6.2 How to Use the Item Control Menu ................................................................................... 12
6.3 Mode Control ..................................................................................................................... 12
6.4 Global Item Control ............................................................................................................ 13
6.5 Output Control Feature ...................................................................................................... 13
6.6 Temperature Control ......................................................................................................... 14
6.7 Accessing Temperature Control from an LCD5500Z Keypad.......................................... 16
6.8 Video Camera Triggering .................................................................................................. 16
7: Programming Access Codes ......................................................................................................17
8: Fire and Safety in the Home.........................................................................................................18
8.1 Household Fire Safety ....................................................................................................... 18
8.2 Family Escape Planning .................................................................................................... 18
9: Glossary ........................................................................................................................................19
i
WARNING Please Read Carefully
System Failures
This system has been carefully designed to be as effective as possible. There are circumstances, however, involving fire, burglary , or other types of emergencies where it may not provide protection. Any alarm system of any type may be com­promised deliberately or may fail to operate as expected for a variety of reasons. Some but not all of these reasons may be:
■ ■
Inadequate Installation
■ ■
A security system must be installed properly in order to provide adequate pro­tection. Every installation should be evaluated by a security professional to en­sure that all access points and areas are covered. Locks and latches on windows and doors must be secure and operate as intended. Windows, doors, walls, ceil­ings and other building materials must be of sufficient strength and construction to provide the level of protection expected. A reevaluation must be done during and after any construction activity. An evaluation by the fire and/or police de­partment is highly recommended if this service is available.
■ ■
Criminal Knowledge
■ ■
This system contains security features which were known to be effective at the time of manufacture. It is possible for persons with criminal intent to develop techniques which reduce the effectiveness of these features. It is important that a security system be reviewed periodically to ensure that its features remain effective and that it be updated or replaced if it is found that it does not provide the protection expected.
■ ■
Access by Intruders
■ ■
Intruders may enter through an unprotected access point, circumvent a sens­ing device, evade detection by moving through an area of insufficient cov­erage, disconnect a warning device, or interfere with or prevent the proper operation of the system.
■ ■
Power Failure
■ ■
Control units, intrusion detectors, smoke detectors and many other security de­vices require an adequate power supply for proper operation. If a device oper­ates from batteries, it is possible for the batteries to fail. Even if the batteries have not failed, they must be charged, in good condition and installed correctly. If a device operates only by AC power, any interruption, however brief, will render that device inoperative while it does not have power. Power interruptions of any length are often accompanied by voltage fluctuations which may damage electronic equipment such as a security system. After a power interruption has occurred, immediately conduct a complete system test to ensure that the system operates as intended.
■ ■
Failure of Replaceable Batteries
■ ■
This system’s wireless transmitters have been designed to provide several years of battery life under normal conditions. The expected battery life is a function of the device environment, usage and type. Ambient conditions such as high hu­midity, high or low temperatures, or large temperature fluctuations may reduce the expected battery life. While each transmitting device has a low battery moni­tor which identifies when the batteries need to be replaced, this monitor may fail to operate as expected. Regular testing and maintenance will keep the system in good operating condition.
■ ■
Compromise of Radio Frequency (Wireless)
■ ■
Devices
Signals may not reach the receiver under all circumstances which could include metal objects placed on or near the radio path or deliberate jam­ming or other inadvertent radio signal interference.
■ ■
System Users
■ ■
A user may not be able to operate a panic or emergency switch possibly due to permanent or temporary physical disability, inability to reach the device in time, or unfamiliarity with the correct operation. It is important that all system users be trained in the correct operation of the alarm system and that they know how to respond when the system indicates an alarm.
■ ■
Smoke Detectors
■ ■
Smoke detectors that are a part of this system may not properly alert occupants of a fire for a number of reasons, some of which follow. The smoke detectors may have been improperly installed or positioned. Smoke may not be able to reach the smoke detectors, such as when the fire is in a chimney, walls or roofs, or on the other side of
closed doors. Smoke detectors may not detect smoke from fires on another level of the residence or building.
Every fire is different in the amount of smoke produced and the rate of burning. Smoke detectors cannot sense all types of fires equally well. Smoke detectors may not provide timely warning of fires caused by carelessness or safety hazards such as smoking in bed, violent explosions, escaping gas, improper storage of flammable materials, overloaded electrical circuits, chil­dren playing with matches or arson.
Even if the smoke detector operates as intended, there may be circumstances when there is insufficient warning to allow all occupants to escape in time to avoid injury or death.
■ ■
Motion Detectors
■ ■
Motion detectors can only detect motion within the designated areas as shown in their respective installation instructions. They cannot discrimi­nate between intruders and intended occupants. Motion detectors do not provide volumetric area protection. They have multiple beams of detec­tion and motion can only be detected in unobstructed areas covered by these beams. They cannot detect motion which occurs behind walls, ceil­ings, floor, closed doors, glass partitions, glass doors or windows. Any type of tampering whether intentional or unintentional such as masking, painting, or spraying of any material on the lenses, mirrors, windows or any other part of the detection system will impair its proper operation.
Passive infrared motion detectors operate by sensing changes in tempera­ture. However their effectiveness can be reduced when the ambient tem­perature rises near or above body temperature or if there are intentional or unintentional sources of heat in or near the detection area. Some of these heat sources could be heaters, radiators, stoves, barbeques, fireplaces, sun­light, steam vents, lighting and so on.
■ ■
Warning Devices
■ ■
Warning devices such as sirens, bells, horns, or strobes may not warn people or waken someone sleeping if there is an intervening wall or door. If warn­ing devices are located on a different level of the residence or premise, then it is less likely that the occupants will be alerted or awakened. Au­dible warning devices may be interfered with by other noise sources such as stereos, radios, televisions, air conditioners or other appliances, or pass­ing traffic. Audible warning devices, however loud, may not be heard by a hearing-impaired person.
■ ■
Telephone Lines
■ ■
If telephone lines are used to transmit alarms, they may be out of service or busy for certain periods of time. Also an intruder may cut the telephone line or defeat its operation by more sophisticated means which may be difficult to detect.
■ ■
Insufficient Time
■ ■
There may be circumstances when the system will operate as intended, yet the occupants will not be protected from the emergency due to their inability to respond to the warnings in a timely manner. If the system is monitored, the response may not occur in time to protect the occupants or their belongings.
■ ■
Component Failure
■ ■
Although every effort has been made to make this system as reliable as possible, the system may fail to function as intended due to the failure of a component.
■ ■
Inadequate Testing
■ ■
Most problems that would prevent an alarm system from operating as in­tended can be found by regular testing and maintenance. The complete sys­tem should be tested weekly and immediately after a break-in, an attempted break-in, a fire, a storm, an earthquake, an accident, or any kind of construc­tion activity inside or outside the premises. The testing should include all sensing devices, keypads, consoles, alarm indicating devices and any other operational devices that are part of the system.
■ ■
Security and Insurance
■ ■
Regardless of its capabilities, an alarm system is not a substitute for prop­erty or life insurance. An alarm system also is not a substitute for prop­erty owners, renters, or other occupants to act prudently to prevent or mini­mize the harmful effects of an emergency situation.
ii
Introduction
S E C T I O N 1
The Escort5580TC Voice Assisted Security Control provides easy to understand audible information about the status of your security system, and makes operation simple by prompting the user through each operation. In addition, you can use the Escort5580TC to control various Home Automation items. This new version of the Escort, designated ‘TC’ for Thermostat Control, now also allows you to monitor and control the temperature of your premises with the help of an EMS thermostat.
The Escort5580TC allows any touch-tone telephone to act as a keypad for your security system. The telephone could be any telephone that is on the same line as your security system, or an outside telephone which may be used to call the security system.
Some optional features described in this manual may not be available on your security system. You will not hear the voice prompts for any option that is not activated on your system.
In this manual, the voice messages are printed in bold and are enclosed in quotes, as shown here:
“Enter your access code”
Your installer may have programmed labels for the Escort to announce when it refers to things such as zones and partitions (e.g. you may hear "East wing" instead of "Partition 2"). Prompts that your installer may have changed are written in brace brackets, as shown here:
“To Select {Partition 2}, press [2].”
When instructed to press a key or keys to perform an operation, symbols for the keys will be enclosed in square brackets, as shown here:
Enter [✱]
1.1 About Your Security System
Your DSC security equipment has been designed to give you the greatest possible flexibility and convenience. To fully benefit from the features of your security system, you should read this manual and the Instruction Manual provided with your system very carefully. Have your installer instruct you on system operation and on which features have been activated on your system. All users of the system should be instructed on its use. Fill out the System Information page in your Security System Instruction Manual and store it with the manual in a safe place for future reference.
IMPORTANT NOTE to alert you and, if included, a central station of an emergency situation. Security systems are generally very reliable but they may not work under all conditions and they are not a substitute for prudent security practices or life and property insurance. Your security system should be installed and serviced by qualified security professionals who should instruct you on the level of protection that has been provided and on system operation.
:
A security system cannot prevent emergencies. It is only intended
1
I N T R O D U C T I O N
1.2 General System Operation
Your security system is made up of a control panel, keypads, the Escort5580TC, various detection devices, and may have up to four EMS thermostats. The control panel will be mounted out of the way in a utility room or in the basement. The metal cabinet contains the system electronics, Escort5580TC Voice Assisted Security Control, fuses and stand-by battery. There is normally no reason for anyone but the installer or service persons to have access to the control panel.
The security system has several zones—areas (e.g. rooms) or barriers (e.g. doors, windows) of protection monitored by one or more detection devices (e.g. motion detectors, door contacts, glassbreak detectors or shock sensors).
The regular keypad is an important part of your security system. It is used to send commands to the system and to display system information. Even though a telephone and the Escort5580TC can be used to operate your system, the telephone will not automatically display or indicate system status or zones in alarm. Therefore, it is essential that a regular keypad be placed in a location that is accessible to all users of the security system, and that it be checked regularly for any changes in system status.
1.3 Access Codes
When using a telephone to operate your security system, you will first have to enter a Telephone Access Code, and then use the same Access Codes you use with the regular keypad. The Master Code and other access codes programmed on your system work exactly as if you were using a regular keypad. Refer to your system’s instruction manual for further information on access codes.
NOTE: It is recommended that Duress Codes not be used with the Escort5580TC.
1.4 Audio Help
If your security system has an audio matrix module (PC59XX and intercom stations) connected to it, the Escort5580TC can provide step-by-step audio instructions through the intercom stations. You can access the help function in one of two ways, depending on how your installer has programmed the "Help" button on your keypads:
General Audio Help
1.Press the "Help" function key on the keypad
2.The Escort5580TC will page all intercom stations.
3.Press the Page/Answer button on one of the stations (this button must be pressed within 5 seconds for the feature to work). This links the stations to the Escort5580TC. The Escort5580TC announces audio help prompts over the intercom stations.
Identified Audio Help
1.Press the Help function key on the keypad
2.The Escort5580TC announces audio help prompts over the intercom station beside the keypad.
NOTE: If a user is accessing the Escort locally over the telephone line, the Help function key will not work.
2
Accessing Your Security System
S E C T I O N 2
With the Escort5580TC you can use a telephone (touch-tone only) to access your security system. This can be done either from a telephone on the premises (Local Access), or from a telephone off the premises anywhere in the world (Remote Access).
2.1 Local Access
Use this procedure to access your security system from a telephone that is on the same telephone line as your security system. No dial-in is necessary.
Pick up the telephone; you will hear a dial tone. Enter your Telephone Access Code. The dial tone will stop and the system will announce:
“Hello.”
The system will then prompt:
“Enter your access code.”
Enter your [access code]. The system announces one or more messages to advise you of its status.
2.2 Remote Access
From any touch-tone telephone, first dial the number of your premises. If your premises have more than one line, be sure to call the number of the same line on which your Escort5580TC has been installed. After a single ring, hang up, wait 10 seconds, and call again. On the second call, the system will answer after one or two rings and announce:
“Hello.”
Now you must enter your Telephone Access Code within 10 seconds or the system will automatically hang up.
The system will then prompt:
“Enter your access code.”
Enter your [access code] within 20 seconds or the system will hang up. The system will also hang up if 3 incorrect access codes are entered.
Once an access code has been entered, the system will announce one or more messages to advise you of its status.
NOTE: There is only one “Telephone Access Code”. It is programmed by your installer. It is not the same as your system access code, which you also enter on your system keypad. More than one system access code may be programmed for use by different users of your system (see section 8—Programming Access Codes).
2.3 Receiving Incoming Calls
If the Escort5580TC is being used on the premises at the same time as someone calls you, the system will announce:
"Attention, you have an incoming call. To receive the call, press [#] now."
To answer the incoming call, press [#]. To continue to use the Escort5580TC, don't press [#].
3
A C C E S S I N G Y O U R S Y S T E M
2.4 What is a Partition?
A partition is a group of zones which act independently of other groups of zones. Each partition acts as an independent alarm system. Partitions will have different access codes to arm and disarm them. The access codes assigned to one partition will not work on another partition. However, access codes can be assigned to more than one partition to allow someone to use one access code for several different partitions. Your installer will inform you how partitions and access codes have been assigned on your system.
NOTE: If you have a multiple partition system, be sure to have your installer explain if your Escort5580TC has been enabled to control one or multiple partitions.
2.5 If You Have a Multiple Partition System
If you have a multiple partition system, the Escort may prompt you to select a partition after entering your access code (as in Section 2—Accessing Your Security System). You will have to select a partition only if:
· your Escort5580TC has been enabled to control multiple partitions
· the access code you enter has been programmed to access multiple partitions
If both of these are the case, the system will prompt you to select a partition as follows:
“To Select {System}, press [1].”
“To Select {Partition 2}, press [2].”
(“{System}” in this case refers to Partition 1)
Press [1] through [8], to select a partition.
The system will announce the status of the selected partition.
NOTE: Prompt words enclosed in brace brackets, “{ },” refer to labels. The system will announce the enclosed word by default unless it has been programmed to announce a specific label (e.g. you might hear “East Wing” instead of “{Partition 2}”).
2.6 Fire, Auxiliary and Panic Alarms
Your installer may have set up your system so that you can send a Fire, Auxiliary or Panic alarm at the press of a button. If so, using your telephone, you can:
• send a Fire alarm by pressing and holding [1] on your telephone for 2 seconds
• send an Auxiliary alarm by pressing and holding [2] on your telephone for 2 seconds
• send a Panic alarm by pressing and holding [3] on your telephone for 2 seconds.
Ask your installer for more information.
NOTE: If the keypad lockout has been triggered by the entry of a number of incorrect access codes, the Fire, Auxiliary and Panic alarm buttons will not work.
4
Loading...
+ 16 hidden pages