DSC VPM5580TC User Manual

VPM5580TC
Instruction Manual
Version 2.0
• W A R N I N G •
This manual contains information on limitations regarding product use and function and information on the limitations as to liability of the manufacturer. The entire manual should be carefully read.
WARNING Please Read Carefully
This system has been carefully designed to be as effective as possible. There are circumstances, however, involving fire, burglary , or other types of emergencies where it may not provide protection. Any alarm system of any type may be com­promised deliberately or may fail to operate as expected for a variety of reasons. Some but not all of these reasons may be:
■ ■
Inadequate Installation
■ ■
A security system must be installed properly in order to provide adequate pro­tection. Every installation should be evaluated by a security professional to en­sure that all access points and areas are covered. Locks and latches on windows and doors must be secure and operate as intended. Windows, doors, walls, ceil­ings and other building materials must be of sufficient strength and construction to provide the level of protection expected. A reevaluation must be done during and after any construction activity. An evaluation by the fire and/or police de­partment is highly recommended if this service is available.
■ ■
Criminal Knowledge
■ ■
This system contains security features which were known to be effective at the time of manufacture. It is possible for persons with criminal intent to develop techniques which reduce the effectiveness of these features. It is important that a security system be reviewed periodically to ensure that its features remain effective and that it be updated or replaced if it is found that it does not provide the protection expected.
■ ■
Access by Intruders
■ ■
Intruders may enter through an unprotected access point, circumvent a sens­ing device, evade detection by moving through an area of insufficient cov­erage, disconnect a warning device, or interfere with or prevent the proper operation of the system.
■ ■
Power Failure
■ ■
Control units, intrusion detectors, smoke detectors and many other security de­vices require an adequate power supply for proper operation. If a device oper­ates from batteries, it is possible for the batteries to fail. Even if the batteries have not failed, they must be charged, in good condition and installed correctly. If a device operates only by AC power, any interruption, however brief, will render that device inoperative while it does not have power. Power interruptions of any length are often accompanied by voltage fluctuations which may damage electronic equipment such as a security system. After a power interruption has occurred, immediately conduct a complete system test to ensure that the system operates as intended.
■ ■
Failure of Replaceable Batteries
■ ■
This system’s wireless transmitters have been designed to provide several years of battery life under normal conditions. The expected battery life is a function of the device environment, usage and type. Ambient conditions such as high hu­midity, high or low temperatures, or large temperature fluctuations may reduce the expected battery life. While each transmitting device has a low battery moni­tor which identifies when the batteries need to be replaced, this monitor may fail to operate as expected. Regular testing and maintenance will keep the system in good operating condition.
■ ■
Compromise of Radio Frequency (Wireless)
■ ■
Devices
Signals may not reach the receiver under all circumstances which could include metal objects placed on or near the radio path or deliberate jam­ming or other inadvertent radio signal interference.
■ ■
System Users
■ ■
A user may not be able to operate a panic or emergency switch possibly due to permanent or temporary physical disability, inability to reach the device in time, or unfamiliarity with the correct operation. It is important that all system users be trained in the correct operation of the alarm system and that they know how to respond when the system indicates an alarm.
■ ■
Smoke Detectors
■ ■
Smoke detectors that are a part of this system may not properly alert occupants of a fire for a number of reasons, some of which follow. The smoke detectors may have been improperly installed or positioned. Smoke may not be able to reach the smoke detectors, such as when the fire is in a chimney, walls or roofs, or on the other side of
closed doors. Smoke detectors may not detect smoke from fires on another level of the residence or building.
Every fire is different in the amount of smoke produced and the rate of burning. Smoke detectors cannot sense all types of fires equally well. Smoke detectors may not provide timely warning of fires caused by carelessness or safety hazards such as smoking in bed, violent explosions, escaping gas, improper storage of flammable materials, overloaded electrical circuits, chil­dren playing with matches or arson.
Even if the smoke detector operates as intended, there may be circumstances when there is insufficient warning to allow all occupants to escape in time to avoid injury or death.
■ ■
Motion Detectors
■ ■
Motion detectors can only detect motion within the designated areas as shown in their respective installation instructions. They cannot discrimi­nate between intruders and intended occupants. Motion detectors do not provide volumetric area protection. They have multiple beams of detec­tion and motion can only be detected in unobstructed areas covered by these beams. They cannot detect motion which occurs behind walls, ceil­ings, floor, closed doors, glass partitions, glass doors or windows. Any type of tampering whether intentional or unintentional such as masking, painting, or spraying of any material on the lenses, mirrors, windows or any other part of the detection system will impair its proper operation.
Passive infrared motion detectors operate by sensing changes in tempera­ture. However their effectiveness can be reduced when the ambient tem­perature rises near or above body temperature or if there are intentional or unintentional sources of heat in or near the detection area. Some of these heat sources could be heaters, radiators, stoves, barbeques, fireplaces, sun­light, steam vents, lighting and so on.
■ ■
Warning Devices
■ ■
Warning devices such as sirens, bells, horns, or strobes may not warn people or waken someone sleeping if there is an intervening wall or door. If warn­ing devices are located on a different level of the residence or premise, then it is less likely that the occupants will be alerted or awakened. Au­dible warning devices may be interfered with by other noise sources such as stereos, radios, televisions, air conditioners or other appliances, or pass­ing traffic. Audible warning devices, however loud, may not be heard by a hearing-impaired person.
■ ■
Telephone Lines
■ ■
If telephone lines are used to transmit alarms, they may be out of service or busy for certain periods of time. Also an intruder may cut the telephone line or defeat its operation by more sophisticated means which may be difficult to detect.
■ ■
Insufficient Time
■ ■
There may be circumstances when the system will operate as intended, yet the occupants will not be protected from the emergency due to their inability to respond to the warnings in a timely manner. If the system is monitored, the response may not occur in time to protect the occupants or their belongings.
■ ■
Component Failure
■ ■
Although every effort has been made to make this system as reliable as possible, the system may fail to function as intended due to the failure of a component.
■ ■
Inadequate Testing
■ ■
Most problems that would prevent an alarm system from operating as in­tended can be found by regular testing and maintenance. The complete sys­tem should be tested weekly and immediately after a break-in, an attempted break-in, a fire, a storm, an earthquake, an accident, or any kind of construc­tion activity inside or outside the premises. The testing should include all sensing devices, keypads, consoles, alarm indicating devices and any other operational devices that are part of the system.
■ ■
Security and Insurance
■ ■
Regardless of its capabilities, an alarm system is not a substitute for prop­erty or life insurance. An alarm system also is not a substitute for prop­erty owners, renters, or other occupants to act prudently to prevent or mini­mize the harmful effects of an emergency situation.
Table of Contents
Introduction ......................................................................................................................................... 1
1.1 About Your Security System ................................................................................................ 1
1.2 General System Operation .................................................................................................. 2
1.3 Access Codes ..................................................................................................................... 2
Accessing Your Security System ...................................................................................................... 3
2.1 Local Access ....................................................................................................................... 3
2.1 Remote Access .................................................................................................................... 3
2.3 Accessing Partitions ............................................................................................................ 3
2.4 Fire, Auxiliary and Panic Alarms .......................................................................................... 4
Arming and Disarming ....................................................................................................................... 5
3.1 Away Arming ........................................................................................................................ 5
3.2 Stay Arming ......................................................................................................................... 5
3.3 Disarming ............................................................................................................................. 6
3.4 If An Alarm Sounds While You Are Home ............................................................................ 6
3.5 Alarm Memory ...................................................................................................................... 7
3.6 Bypassing Zones ................................................................................................................. 7
Trouble Conditions ............................................................................................................................. 8
Setting VPM5580TC Options.............................................................................................................. 9
5.1 Setting The Time and Date .................................................................................................. 9
5.2 Volume Control..................................................................................................................... 9
5.3 Speech Rate Control............................................................................................................ 9
5.4 Door Chime Feature...........................................................................................................10
Home Automation ............................................................................................................................. 11
6.1 Accessing the Home Automation Menu ........................................................................... 11
6.2 How to Use the Item Control Menu .................................................................................... 12
6.3 Mode Control ..................................................................................................................... 12
6.4 Global Item Control ............................................................................................................ 13
6.5 Output Control Feature ...................................................................................................... 13
6.6 Temperature Control ..........................................................................................................14
6.7 Accessing Temperature Control from an LCD5500Z Keypad ........................................... 16
6.8 Security and Automation Feature Keys ............................................................................. 16
Programming Access Codes ........................................................................................................... 19
Fire and Safety in the Home ............................................................................................................ 20
8.1 Household Fire Safety ....................................................................................................... 20
8.2 Family Escape Planning .................................................................................................... 20
Glossary ......................................................................................................................................... 21
i
Introduction
S E C T I O N 1
The Communiqué Security Interface Card (VPM5580TC) provides easy to understand audible information about the status of your security system, and makes operation simple by prompting you through each operation. In addition, you can use the VPM5580TC to control various Home Automation items. This new version of the VPM5580TC, designated ‘TC’ for Thermostat Control, now also allows you to monitor and control the temperature of your premises with the help of an EMS thermostat.
The VPM5580TC allows any touch-tone telephone to act as a keypad for your security system. The telephone could be any telephone that is on the Communiqué system, or an outside telephone which may be used to call the security system.
Some optional features described in this manual may not be available on your security system. You will not hear the voice prompts for any option that is not activated on your system.
In this manual, the voice messages are printed in bold and are enclosed in quotes, as shown here:
“Enter your access code”“Enter your access code”
“Enter your access code”
“Enter your access code”“Enter your access code”
Your installer may have programmed labels for the VPM5580TC to announce when it refers to things such as zones and partitions (e.g. you may hear "East wing" instead of "Partition 2"). Prompts that your installer may have changed are written in brace brackets, as shown here:
“To Select {Partition 2}, press [2].”“To Select {Partition 2}, press [2].”
“To Select {Partition 2}, press [2].”
“To Select {Partition 2}, press [2].”“To Select {Partition 2}, press [2].”
When instructed to press a key or keys to perform an operation, symbols for the keys will be enclosed in square brackets, as shown here:
Enter []
1.1 About Your Security System
Your DSC security equipment has been designed to give you the greatest possible flexibility and convenience. To fully benefit from the features of your security system, you should read this manual and the Instruction Manual provided with your system very carefully. Have your installer instruct you on system operation and on which features have been activated on your system. All users of the system should be instructed on its use. Fill out the System Information page in your Security System Instruction Manual and store it with the manual in a safe place for future reference.
IMPORTANT NOTE intended to alert you and, if included, a central station of an emergency situation. Security systems are generally very reliable but they may not work under all conditions and they are not a substitute for prudent security practices or life and property insurance. Your security system should be installed and serviced by qualified security professionals who should instruct you on the level of protection that has been provided and on system operation.
:
A security system cannot prevent emergencies. It is only
1
I N T R O D U C T I O N
1.2 General System Operation
Your security system is made up of a control panel, keypads, the VPM5580TC, various detection devices, and may have up to four EMS thermostats. The control panel will be mounted out of the way in a utility room or in the basement. The metal cabinet contains the system electronics, fuses and stand-by battery. There is normally no reason for anyone but the installer or service persons to have access to the control panel.
The security system has several zones—areas (e.g. rooms) or barriers (e.g. doors, windows) of protection monitored by one or more detection devices (e.g. motion detectors, door contacts, glassbreak detectors or shock sensors).
The regular keypad is an important part of your security system. It is used to send commands to the system and to display system information. Even though a telephone and the VPM5580TC can be used to operate your system, the telephone will not automatically display or indicate system status or zones in alarm. Therefore, it is essential that a regular keypad be placed in a location that is accessible to all users of the security system, and that it be checked regularly for any changes in system status.
1.3 Access Codes
When using a telephone to operate your security system, you will use the same Access Codes you use with the regular keypad. The Master Code and other access codes programmed on your system work the same as on your regular keypad. Refer to your system’s instruction manual for further information on access codes.
NOTE: It is recommended that Duress Codes not be used with the VPM5580TC.
2
Accessing Your Security System
S E C T I O N 2
With the VPM5580TC you can use a telephone (touch-tone only) to access your security system. This can be done either from a telephone on the premises (Local Access), or from a telephone off the premises anywhere in the world (Remote Access).
2.1 Local Access
To access your security system from a Communiqué telephone set, press the [SECURITY] key. If you are using a telephone connected to a Communiqué DAI station, press [7][3] (Security Functions). The system will announce
“Hello”“Hello”
“Hello”
“Hello”“Hello”
Depending on the feature activated for your system, the system may then announce
“Enter Your Access Code”.“Enter Your Access Code”.
“Enter Your Access Code”.
“Enter Your Access Code”.“Enter Your Access Code”.
Enter your [Access Code].
2.2 Remote Access
From any touch tone telephone, call your telephone number and wait for the automated
greeting. During the greeting, press the [] key along with a remote access code, if
required. Enter [7][3] at the “Enter a feature option” prompt and the system will announce
“Hello”“Hello”
“Hello”
“Hello”“Hello”
Depending on the feature activated for your system, the system may then announce
“Enter Your Access Code”“Enter Your Access Code”
“Enter Your Access Code”
“Enter Your Access Code”“Enter Your Access Code”
Enter a valid access code within 20 seconds or the system will hang up. The system will also hang up if 3 incorrect Access Codes are entered.
Once a valid access code has been entered, the system will announce one or more messages to advise of the status of the system.
2.3 Accessing Partitions
The security system has several zones (monitored areas). Each of these zones will be connected to a sensor (motion detectors, glassbreak detectors, door contacts, etc.).
Your installer may have divided the system into different partitons. Each partition includes one or more zones, and can be turned on and off independently of other partitions. Your installer should explain to you which partitions have been programmed, and which zones belong to each partition.
Each partition will have different access codes to arm and disarm them. The access codes assigned to one partition may not work on another partition. However, access codes can be assigned to more than one partition. Your installer will inform you how partitions and access codes have been assigned on your system.
NOTE: If you have a two-partition system, be sure to have your installer explain if your VPM5580TC has been enabled to control one or both partitions.
3
A C C E S S I N G Y O U R S Y S T E M
If You Have a Two-Partition System
If you have a two-partition system, the VPM5580TC may prompt you to select a partition after entering your access code (as in Section 2—Accessing Your Security System). You will have to select a partition only if:
· your VPM5580TC has been enabled to control both partitions
· the access code you enter has been programmed to access both partitions If both of these are the case, the system will prompt you to select a partition as follows:
“To Select {System}, press [1].”“To Select {System}, press [1].”
“To Select {System}, press [1].”
“To Select {System}, press [1].”“To Select {System}, press [1].”
“To Select {Partition 2}, press [2].”“To Select {Partition 2}, press [2].”
“To Select {Partition 2}, press [2].”
“To Select {Partition 2}, press [2].”“To Select {Partition 2}, press [2].”
(“{System}” in this case refers to Partition 1)
Press [1] or [2], to select a partition.
The system will announce the status of the selected partition.
NOTE: Prompt words enclosed in brace brackets, “{ },” refer to labels. The system will announce the enclosed word by default unless it has been programmed to announce a specific label (e.g. you might hear “East Wing” instead of “{Partition 2}”).
2.4 Fire, Auxiliary and Panic Keys
Your installer may have set up your system so that you can send a Fire, Auxiliary or Panic alarm at the press of a button. If so, using your Communiqué telephone you can:
• send a Fire alarm by pressing and holding the Fire button for 2 seconds
• send an Auxiliary alarm by pressing and holding the Auxiliary button for 2 seconds
• send a Panic alarm by pressing and holding the Panic button for 2 seconds.
Ask your installer for more information.
NOTE: If the keypad lockout has been triggered by the entry of a number of incorrect access codes, the Fire, Auxiliary and Panic alarm buttons will not work.
NOTE: The F, A, P keys can be enabled or disabled for each Communiqué key telephone on the system. Please see your installer for details.
4
A R M I N G A N D D I S A R M I N G
Arming and Disarming
S E C T I O N 3
With the VPM5580TC, you can use a telephone to arm your system/partition (so that alarms, or other devices, will be activated when a zone on your premises is breached, such as when an Entry-Exit Door is opened). This can be done either locally or remotely. Similarly, you can use a telephone to disarm the system/partition.
3.1 Away Arming
NOTE: When arming your system/partition from a remote telephone, the system/ partition will automatically be armed in Stay mode. (See section 3.2, below.)
Access your system (Section 2—Accessing Your Security System) and select a partition (Section 2.3—Accessing Partitions).
If the system/partition is ready to be armed, the system will prompt:
“{System} is OFF.“{System} is OFF.
“{System} is OFF.
To turn ON, enter your access code.”To turn ON, enter your access code.”
To turn ON, enter your access code.”
To turn ON, enter your access code.”To turn ON, enter your access code.”
Enter your [access code]. The system will then announce:
“Turning {System} ON. Exit Delay in progress.“Turning {System} ON. Exit Delay in progress.
“Turning {System} ON. Exit Delay in progress.
“Turning {System} ON. Exit Delay in progress.“Turning {System} ON. Exit Delay in progress.
To turn OFF, enter your access code.”To turn OFF, enter your access code.”
To turn OFF, enter your access code.”
To turn OFF, enter your access code.”To turn OFF, enter your access code.”
If the system/partition is not ready to be armed, the system will prompt:
When the “Secure before turning on” message is heard, ensure that any breached zones on the system/partition are secure (e.g. by closing any open doors that the system/partition monitors) before trying to arm the partition.
NOTE: Depending on the model of control panel you have, you may be able to toggle Stay/Away zones on or off after your system has been armed. See your system's Instruction Manual for more information.
3.2 Stay Arming
Stay Arming allows you to arm the system/partition and remain on the premises. When a system is stay armed, certain zones (Stay/Away zones) will not be armed, so that you can move freely in certain areas of the premises. Your installer should tell you which zones are Stay/Away zones. Stay Arming also cancels the Entry Delay (see the Instruction Manual of your control panel) on the Entry-Exit Doors so that an alarm will sound Exit Door is opened.
When the system prompts:
To turn ON, enter your access code.”To turn ON, enter your access code.”
To turn ON, enter your access code.”
To turn ON, enter your access code.”To turn ON, enter your access code.”
Activate the Stay Arming feature by pressing []. The system will then prompt:
“To turn the system ON without Entry Delay, press [9],”“To turn the system ON without Entry Delay, press [9],”
“To turn the system ON without Entry Delay, press [9],”
“To turn the system ON without Entry Delay, press [9],”“To turn the system ON without Entry Delay, press [9],”
Press [9]. The system will prompt:
Enter your [access code]. The system announces:
“{System} is OFF.“{System} is OFF.
“{System} is open. {Zone XX}“{System} is open. {Zone XX}
“{System} is open. {Zone XX}
“{System} is open. {Zone XX}“{System} is open. {Zone XX}
Secure before turning ON.”Secure before turning ON.”
Secure before turning ON.”
Secure before turning ON.”Secure before turning ON.”
“{System} is OFF.“{System} is OFF.
“{System} is OFF.
“{System} is OFF.“{System} is OFF.
“Enter your access code.”“Enter your access code.”
“Enter your access code.”
“Enter your access code.”“Enter your access code.”
immediately
if the Entry-
5
A R M I N G A N D D I S A R M I N G
“Turning {System} ON without Entry Delay. Exit Delay in progress”“Turning {System} ON without Entry Delay. Exit Delay in progress”
“Turning {System} ON without Entry Delay. Exit Delay in progress”
“Turning {System} ON without Entry Delay. Exit Delay in progress”“Turning {System} ON without Entry Delay. Exit Delay in progress”
After exit delay expires, the selected partition will now be armed in Stay Mode. Opening the entry-exit door will now sound an immediate alarm.
NOTE: Depending on the model of control panel you have, you may be able to toggle Stay/Away zones on or off after your system has been armed. See your system's Instruction Manual for more information.
3.3 Disarming
IMPORTANT NOTE: If you return to the premises and find that an alarm has occurred while you were away, it is possible that an intruder may still be on the premises. Do not enter the premises. Go to the nearest telephone and contact the authorities.
To disarm your system/partition, first access the system (Section 2—Accessing Your Security System) and select a partition (Section 2.3—Accessing Partitions).
If the selected partition is armed, the system prompts:
“{System} is on. To turn off, enter your access code.”“{System} is on. To turn off, enter your access code.”
“{System} is on. To turn off, enter your access code.”
“{System} is on. To turn off, enter your access code.”“{System} is on. To turn off, enter your access code.”
Enter your [access code]. The system announces:
“{System} is off.”“{System} is off.”
“{System} is off.”
“{System} is off.”“{System} is off.”
If there were no alarms while the system/partition was armed, the system announces:
“No alarms in memory.”“No alarms in memory.”
“No alarms in memory.”
“No alarms in memory.”“No alarms in memory.”
If there were any alarms when the system/partition was armed, the system can announce how many there were and which zones were breached (see Section 3.5—Alarm Memory).
When the system/partition is disarmed, additional messages may be announced to advise you of its status, or to allow you to select another partition.
3.4 If An Alarm Sounds While You Are Home
There are two possible types of alarm, a Fire Alarm and an Intrusion Alarm. Each can have its own distinctive tone. Your immediate response will depend on which has been sounded. You should have these responses planned ahead of time.
Fire Alarm
Your installer will inform you if fire detection equipment has been installed and activated on your system.
Fire alarms will sound with a pulsing tone. If a fire alarm sounds, follow your emergency evacuation response plan immediately. Refer to the guidelines for Family Escape Planning (Section 8.2) at the back of this manual to construct your response plan.
NOTE: Delay fire zones will not go into alarm while the VPM5580TC is being accessed.
Intrusion Alarm
Intrusion alarms will sound with either a continuous or pulsed tone (ask your installer). If an intrusion alarm sounds, an intruder may still be on the premises. Go to a safe place immediately. If you are certain that the premises are safe, you can silence the alarm by disarming the system.
If the alarm was unintentional, notify your central station and/or the local authorities immediately to prevent an unnecessary response.
You can determine the cause of an alarm by reviewing the alarm memory (see Section 3.5— Alarm Memory). Once the alarm has been cleared (i.e. zones secured) and the system disarmed, your system/partition can be re-armed.
6
Loading...
+ 19 hidden pages