This manual contains information on limitations regarding product use and function and information
on the limitations as to liability of the manufacturer. The entire manual should be carefully read.
WARNING Please Read Carefully
System Failures
This system has been carefully designed to be as effective as possible. There are
circumstances, however, involving fire, burglary , or other types of emergencies
where it may not provide protection. Any alarm system of any type may be compromised deliberately or may fail to operate as expected for a variety of reasons.
Some but not all of these reasons may be:
■ ■
■ Inadequate Installation
■ ■
A security system must be installed properly in order to provide adequate protection. Every installation should be evaluated by a security professional to ensure that all access points and areas are covered. Locks and latches on windows
and doors must be secure and operate as intended. Windows, doors, walls, ceilings and other building materials must be of sufficient strength and construction
to provide the level of protection expected. A reevaluation must be done during
and after any construction activity. An evaluation by the fire and/or police department is highly recommended if this service is available.
■ ■
■ Criminal Knowledge
■ ■
This system contains security features which were known to be effective at the
time of manufacture. It is possible for persons with criminal intent to develop
techniques which reduce the effectiveness of these features. It is important that
a security system be reviewed periodically to ensure that its features remain
effective and that it be updated or replaced if it is found that it does not provide
the protection expected.
■ ■
■ Access by Intruders
■ ■
Intruders may enter through an unprotected access point, circumvent a sensing device, evade detection by moving through an area of insufficient coverage, disconnect a warning device, or interfere with or prevent the proper
operation of the system.
■ ■
■ Power Failure
■ ■
Control units, intrusion detectors, smoke detectors and many other security devices require an adequate power supply for proper operation. If a device operates from batteries, it is possible for the batteries to fail. Even if the batteries
have not failed, they must be charged, in good condition and installed correctly.
If a device operates only by AC power, any interruption, however brief, will
render that device inoperative while it does not have power. Power interruptions
of any length are often accompanied by voltage fluctuations which may damage
electronic equipment such as a security system. After a power interruption has
occurred, immediately conduct a complete system test to ensure that the system
operates as intended.
■ ■
■ Failure of Replaceable Batteries
■ ■
This system’s wireless transmitters have been designed to provide several years
of battery life under normal conditions. The expected battery life is a function of
the device environment, usage and type. Ambient conditions such as high humidity, high or low temperatures, or large temperature fluctuations may reduce
the expected battery life. While each transmitting device has a low battery monitor which identifies when the batteries need to be replaced, this monitor may fail
to operate as expected. Regular testing and maintenance will keep the system in
good operating condition.
■ ■
■ Compromise of Radio Frequency (Wireless)
■ ■
Devices
Signals may not reach the receiver under all circumstances which could
include metal objects placed on or near the radio path or deliberate jamming or other inadvertent radio signal interference.
■ ■
■ System Users
■ ■
A user may not be able to operate a panic or emergency switch possibly due to
permanent or temporary physical disability, inability to reach the device in time,
or unfamiliarity with the correct operation. It is important that all system users
be trained in the correct operation of the alarm system and that they know how to
respond when the system indicates an alarm.
■ ■
■ Smoke Detectors
■ ■
Smoke detectors that are a part of this system may not properly alert occupants of a
fire for a number of reasons, some of which follow. The smoke detectors may have
been improperly installed or positioned. Smoke may not be able to reach the smoke
detectors, such as when the fire is in a chimney, walls or roofs, or on the other side of
closed doors. Smoke detectors may not detect smoke from fires on another
level of the residence or building.
Every fire is different in the amount of smoke produced and the rate of
burning. Smoke detectors cannot sense all types of fires equally well. Smoke
detectors may not provide timely warning of fires caused by carelessness or
safety hazards such as smoking in bed, violent explosions, escaping gas,
improper storage of flammable materials, overloaded electrical circuits, children playing with matches or arson.
Even if the smoke detector operates as intended, there may be circumstances
when there is insufficient warning to allow all occupants to escape in time to
avoid injury or death.
■ ■
■ Motion Detectors
■ ■
Motion detectors can only detect motion within the designated areas as
shown in their respective installation instructions. They cannot discriminate between intruders and intended occupants. Motion detectors do not
provide volumetric area protection. They have multiple beams of detection and motion can only be detected in unobstructed areas covered by
these beams. They cannot detect motion which occurs behind walls, ceilings, floor, closed doors, glass partitions, glass doors or windows. Any
type of tampering whether intentional or unintentional such as masking,
painting, or spraying of any material on the lenses, mirrors, windows or
any other part of the detection system will impair its proper operation.
Passive infrared motion detectors operate by sensing changes in temperature. However their effectiveness can be reduced when the ambient temperature rises near or above body temperature or if there are intentional or
unintentional sources of heat in or near the detection area. Some of these
heat sources could be heaters, radiators, stoves, barbeques, fireplaces, sunlight, steam vents, lighting and so on.
■ ■
■ Warning Devices
■ ■
Warning devices such as sirens, bells, horns, or strobes may not warn people
or waken someone sleeping if there is an intervening wall or door. If warning devices are located on a different level of the residence or premise,
then it is less likely that the occupants will be alerted or awakened. Audible warning devices may be interfered with by other noise sources such
as stereos, radios, televisions, air conditioners or other appliances, or passing traffic. Audible warning devices, however loud, may not be heard by a
hearing-impaired person.
■ ■
■ Telephone Lines
■ ■
If telephone lines are used to transmit alarms, they may be out of service or busy
for certain periods of time. Also an intruder may cut the telephone line or defeat
its operation by more sophisticated means which may be difficult to detect.
■ ■
■ Insufficient Time
■ ■
There may be circumstances when the system will operate as intended, yet
the occupants will not be protected from the emergency due to their inability
to respond to the warnings in a timely manner. If the system is monitored, the
response may not occur in time to protect the occupants or their belongings.
■ ■
■ Component Failure
■ ■
Although every effort has been made to make this system as reliable as possible,
the system may fail to function as intended due to the failure of a component.
■ ■
■ Inadequate Testing
■ ■
Most problems that would prevent an alarm system from operating as intended can be found by regular testing and maintenance. The complete system should be tested weekly and immediately after a break-in, an attempted
break-in, a fire, a storm, an earthquake, an accident, or any kind of construction activity inside or outside the premises. The testing should include all
sensing devices, keypads, consoles, alarm indicating devices and any other
operational devices that are part of the system.
■ ■
■ Security and Insurance
■ ■
Regardless of its capabilities, an alarm system is not a substitute for property or life insurance. An alarm system also is not a substitute for property owners, renters, or other occupants to act prudently to prevent or minimize the harmful effects of an emergency situation.
The Communiqué Security Interface Card (VPM5580TC) provides easy to understand
audible information about the status of your security system, and makes operation simple
by prompting you through each operation. In addition, you can use the VPM5580TC to
control various Home Automation items. This new version of the VPM5580TC, designated
‘TC’ for Thermostat Control, now also allows you to monitor and control the temperature of
your premises with the help of an EMS thermostat.
The VPM5580TC allows any touch-tone telephone to act as a keypad for your security
system. The telephone could be any telephone that is on the Communiqué system, or an
outside telephone which may be used to call the security system.
Some optional features described in this manual may not be available on your security system.
You will not hear the voice prompts for any option that is not activated on your system.
In this manual, the voice messages are printed in bold and are enclosed in quotes, as
shown here:
“Enter your access code”“Enter your access code”
“Enter your access code”
“Enter your access code”“Enter your access code”
Your installer may have programmed labels for the VPM5580TC to announce when it refers
to things such as zones and partitions (e.g. you may hear "East wing" instead of "Partition 2").
Prompts that your installer may have changed are written in brace brackets, as shown here:
When instructed to press a key or keys to perform an operation, symbols for the keys will
be enclosed in square brackets, as shown here:
Enter [✱]
1.1About Your Security System
Your DSC security equipment has been designed to give you the greatest possible
flexibility and convenience. To fully benefit from the features of your security system, you
should read this manual and the Instruction Manual provided with your system very
carefully. Have your installer instruct you on system operation and on which features have
been activated on your system. All users of the system should be instructed on its use. Fill
out the System Information page in your Security System Instruction Manual and store it
with the manual in a safe place for future reference.
IMPORTANT NOTE
intended to alert you and, if included, a central station of an emergency situation.
Security systems are generally very reliable but they may not work under all
conditions and they are not a substitute for prudent security practices or life and
property insurance. Your security system should be installed and serviced by
qualified security professionals who should instruct you on the level of protection
that has been provided and on system operation.
:
A security system cannot prevent emergencies. It is only
1
I N T R O D U C T I O N
1.2General System Operation
Your security system is made up of a control panel, keypads, the VPM5580TC, various
detection devices, and may have up to four EMS thermostats. The control panel will be
mounted out of the way in a utility room or in the basement. The metal cabinet contains the
system electronics, fuses and stand-by battery. There is normally no reason for anyone but
the installer or service persons to have access to the control panel.
The security system has several zones—areas (e.g. rooms) or barriers (e.g. doors,
windows) of protection monitored by one or more detection devices (e.g. motion detectors,
door contacts, glassbreak detectors or shock sensors).
The regular keypad is an important part of your security system. It is used to send
commands to the system and to display system information. Even though a telephone and
the VPM5580TC can be used to operate your system, the telephone will not automatically
display or indicate system status or zones in alarm. Therefore, it is essential that a regular
keypad be placed in a location that is accessible to all users of the security system, and
that it be checked regularly for any changes in system status.
1.3Access Codes
When using a telephone to operate your security system, you will use the same Access
Codes you use with the regular keypad. The Master Code and other access codes
programmed on your system work the same as on your regular keypad. Refer to your
system’s instruction manual for further information on access codes.
NOTE: It is recommended that Duress Codes not be used with the VPM5580TC.
2
Accessing Your Security System
S E C T I O N 2
With the VPM5580TC you can use a telephone (touch-tone only) to access your security
system. This can be done either from a telephone on the premises (Local Access), or from a
telephone off the premises anywhere in the world (Remote Access).
2.1Local Access
To access your security system from a Communiqué telephone set, press the [SECURITY]
key. If you are using a telephone connected to a Communiqué DAI station, press [7][3]
(Security Functions). The system will announce
“Hello”“Hello”
“Hello”
“Hello”“Hello”
Depending on the feature activated for your system, the system may then announce
“Enter Your Access Code”.“Enter Your Access Code”.
“Enter Your Access Code”.
“Enter Your Access Code”.“Enter Your Access Code”.
Enter your [Access Code].
2.2Remote Access
From any touch tone telephone, call your telephone number and wait for the automated
greeting. During the greeting, press the [✱] key along with a remote access code, if
required. Enter [7][3] at the “Enter a feature option” prompt and the system will announce
“Hello”“Hello”
“Hello”
“Hello”“Hello”
Depending on the feature activated for your system, the system may then announce
“Enter Your Access Code”“Enter Your Access Code”
“Enter Your Access Code”
“Enter Your Access Code”“Enter Your Access Code”
Enter a valid access code within 20 seconds or the system will hang up. The system will
also hang up if 3 incorrect Access Codes are entered.
Once a valid access code has been entered, the system will announce one or more
messages to advise of the status of the system.
2.3Accessing Partitions
The security system has several zones (monitored areas). Each of these zones will be
connected to a sensor (motion detectors, glassbreak detectors, door contacts, etc.).
Your installer may have divided the system into different partitons. Each partition includes
one or more zones, and can be turned on and off independently of other partitions. Your
installer should explain to you which partitions have been programmed, and which zones
belong to each partition.
Each partition will have different access codes to arm and disarm them. The access codes
assigned to one partition may not work on another partition. However, access codes can
be assigned to more than one partition. Your installer will inform you how partitions and
access codes have been assigned on your system.
NOTE: If you have a two-partition system, be sure to have your installer explain if your
VPM5580TC has been enabled to control one or both partitions.
3
A C C E S S I N G Y O U R S Y S T E M
If You Have a Two-Partition System
If you have a two-partition system, the VPM5580TC may prompt you to select a partition
after entering your access code (as in Section 2—Accessing Your Security System). You will
have to select a partition only if:
· your VPM5580TC has been enabled to control both partitions
· the access code you enter has been programmed to access both partitions
If both of these are the case, the system will prompt you to select a partition as follows:
The system will announce the status of the selected partition.
NOTE: Prompt words enclosed in brace brackets, “{ },” refer to labels. The system
will announce the enclosed word by default unless it has been programmed to
announce a specific label (e.g. you might hear “East Wing” instead of “{Partition 2}”).
2.4Fire, Auxiliary and Panic Keys
Your installer may have set up your system so that you can send a Fire, Auxiliary or Panic
alarm at the press of a button. If so, using your Communiqué telephone you can:
• send a Fire alarm by pressing and holding the Fire button for 2 seconds
• send an Auxiliary alarm by pressing and holding the Auxiliary button for 2 seconds
• send a Panic alarm by pressing and holding the Panic button for 2 seconds.
Ask your installer for more information.
NOTE: If the keypad lockout has been triggered by the entry of a number of incorrect
access codes, the Fire, Auxiliary and Panic alarm buttons will not work.
NOTE: The F, A, P keys can be enabled or disabled for each Communiqué key
telephone on the system. Please see your installer for details.
4
A R M I N G A N D D I S A R M I N G
Arming and Disarming
S E C T I O N 3
With the VPM5580TC, you can use a telephone to arm your system/partition (so that
alarms, or other devices, will be activated when a zone on your premises is breached,
such as when an Entry-Exit Door is opened). This can be done either locally or remotely.
Similarly, you can use a telephone to disarm the system/partition.
3.1Away Arming
NOTE: When arming your system/partition from a remote telephone, the system/
partition will automatically be armed in Stay mode. (See section 3.2, below.)
Access your system (Section 2—Accessing Your Security System) and select a partition
(Section 2.3—Accessing Partitions).
If the system/partition is ready to be armed, the system will prompt:
“{System} is OFF.“{System} is OFF.
“{System} is OFF.
To turn ON, enter your access code.”To turn ON, enter your access code.”
To turn ON, enter your access code.”
To turn ON, enter your access code.”To turn ON, enter your access code.”
Enter your [access code]. The system will then announce:
“Turning {System} ON. Exit Delay in progress.“Turning {System} ON. Exit Delay in progress.
“Turning {System} ON. Exit Delay in progress.
“Turning {System} ON. Exit Delay in progress.“Turning {System} ON. Exit Delay in progress.
To turn OFF, enter your access code.”To turn OFF, enter your access code.”
To turn OFF, enter your access code.”
To turn OFF, enter your access code.”To turn OFF, enter your access code.”
If the system/partition is not ready to be armed, the system will prompt:
When the “Secure before turning on” message is heard, ensure that any breached zones
on the system/partition are secure (e.g. by closing any open doors that the system/partition
monitors) before trying to arm the partition.
NOTE: Depending on the model of control panel you have, you may be able to toggle
Stay/Away zones on or off after your system has been armed. See your system's
Instruction Manual for more information.
3.2Stay Arming
Stay Arming allows you to arm the system/partition and remain on the premises. When a
system is stay armed, certain zones (Stay/Away zones) will not be armed, so that you can
move freely in certain areas of the premises. Your installer should tell you which zones are
Stay/Away zones. Stay Arming also cancels the Entry Delay (see the Instruction Manual of
your control panel) on the Entry-Exit Doors so that an alarm will sound
Exit Door is opened.
When the system prompts:
To turn ON, enter your access code.”To turn ON, enter your access code.”
To turn ON, enter your access code.”
To turn ON, enter your access code.”To turn ON, enter your access code.”
Activate the Stay Arming feature by pressing [✱]. The system will then prompt:
“To turn the system ON without Entry Delay, press [9],”“To turn the system ON without Entry Delay, press [9],”
“To turn the system ON without Entry Delay, press [9],”
“To turn the system ON without Entry Delay, press [9],”“To turn the system ON without Entry Delay, press [9],”
Press [9]. The system will prompt:
Enter your [access code]. The system announces:
“{System} is OFF.“{System} is OFF.
“{System} is open. {Zone XX}“{System} is open. {Zone XX}
“{System} is open. {Zone XX}
“{System} is open. {Zone XX}“{System} is open. {Zone XX}
Secure before turning ON.”Secure before turning ON.”
Secure before turning ON.”
Secure before turning ON.”Secure before turning ON.”
“{System} is OFF.“{System} is OFF.
“{System} is OFF.
“{System} is OFF.“{System} is OFF.
“Enter your access code.”“Enter your access code.”
“Enter your access code.”
“Enter your access code.”“Enter your access code.”
immediately
if the Entry-
5
A R M I N G A N D D I S A R M I N G
“Turning {System} ON without Entry Delay. Exit Delay in progress”“Turning {System} ON without Entry Delay. Exit Delay in progress”
“Turning {System} ON without Entry Delay. Exit Delay in progress”
“Turning {System} ON without Entry Delay. Exit Delay in progress”“Turning {System} ON without Entry Delay. Exit Delay in progress”
After exit delay expires, the selected partition will now be armed in Stay Mode. Opening the
entry-exit door will now sound an immediate alarm.
NOTE: Depending on the model of control panel you have, you may be able to toggle
Stay/Away zones on or off after your system has been armed. See your system's
Instruction Manual for more information.
3.3Disarming
IMPORTANT NOTE: If you return to the premises and find that an alarm has occurred
while you were away, it is possible that an intruder may still be on the premises. Do
not enter the premises. Go to the nearest telephone and contact the authorities.
To disarm your system/partition, first access the system (Section 2—Accessing Your
Security System) and select a partition (Section 2.3—Accessing Partitions).
If the selected partition is armed, the system prompts:
“{System} is on. To turn off, enter your access code.”“{System} is on. To turn off, enter your access code.”
“{System} is on. To turn off, enter your access code.”
“{System} is on. To turn off, enter your access code.”“{System} is on. To turn off, enter your access code.”
Enter your [access code]. The system announces:
“{System} is off.”“{System} is off.”
“{System} is off.”
“{System} is off.”“{System} is off.”
If there were no alarms while the system/partition was armed, the system announces:
“No alarms in memory.”“No alarms in memory.”
“No alarms in memory.”
“No alarms in memory.”“No alarms in memory.”
If there were any alarms when the system/partition was armed, the system can announce
how many there were and which zones were breached (see Section 3.5—Alarm Memory).
When the system/partition is disarmed, additional messages may be announced to advise
you of its status, or to allow you to select another partition.
3.4If An Alarm Sounds While You Are Home
There are two possible types of alarm, a Fire Alarm and an Intrusion Alarm. Each can have
its own distinctive tone. Your immediate response will depend on which has been sounded.
You should have these responses planned ahead of time.
• Fire Alarm
Your installer will inform you if fire detection equipment has been installed and activated on
your system.
Fire alarms will sound with a pulsing tone. If a fire alarm sounds, follow your emergency
evacuation response plan immediately. Refer to the guidelines for Family Escape Planning
(Section 8.2) at the back of this manual to construct your response plan.
NOTE: Delay fire zones will not go into alarm while the VPM5580TC is being accessed.
• Intrusion Alarm
Intrusion alarms will sound with either a continuous or pulsed tone (ask your installer). If an
intrusion alarm sounds, an intruder may still be on the premises. Go to a safe place
immediately. If you are certain that the premises are safe, you can silence the alarm by
disarming the system.
If the alarm was unintentional, notify your central station and/or the local authorities
immediately to prevent an unnecessary response.
You can determine the cause of an alarm by reviewing the alarm memory (see Section 3.5—
Alarm Memory). Once the alarm has been cleared (i.e. zones secured) and the system
disarmed, your system/partition can be re-armed.
6
Loading...
+ 19 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.