Installation Process Overview............................................................................................................ 5
Controls and indicators....................................................................................................................... 5
Status LEDs................................................................................................................................................. 5
Specifications and features........................................................................................................................... 8
The HSM2HOSTx two-way wireless transceiver adds wireless capability to alarm controllers, models
HS2016, HS2032, HS2064, HS2128, HS3128, HS3032.The HSM2HOST receives signals from wireless
zones and wireless keys, and provides information to the alarm controller. This manual describes
how to install, program and maintain the HSM2HOST.
Note: Only one HSM2HOST or one RFK keypad can be enrolled on the alarm system.
Before installing complete the following steps:
1.Plan the placement and wiring of the security system (see system installation manual).
2.Install the control panel and optional modules.
3.Temporarily mount all wireless devices in the intended location.
Installation Process Overview
About this task:
To install and set up the HSM2HOST and wireless devices:
1.Temporarily mount and wire the HSM2HOST module (See "Mounting").
2.Enroll the HSM2HOST and the first wireless keypad (See "Enroll The HSM2HOST").
3.Check the location for RF interference levels (See "[804][801] RF Jam Detect").
4.Enroll wireless devices (See "[804][000] Enroll Wireless Devices").
5.Complete zone and other programming on the system (See "Wireless Device Setup and
Programming").
6.Test the placement of all the wireless devices (See "[904] Placement Testing Wireless
Devices").
7.Permanently mount the HSM2HOST and wireless devices (See "Permanently Mount").
Controls and indicators
Status LEDs
The LEDs on the front of the HSM2HOST provide feedback regarding the installation, operation and
troubleshooting of the unit. The LEDs function as follows:
Table 1: Status LEDs
Red LEDOperation
Module Power Up:On steady during module power-up sequence then off.
Slow flashing = update in progress
Firmware Update:
Rapid flashing = update failed
•No trouble: 1 rapid flash every 10 seconds.
If troubles are present, a series of flashes occur every 2 seconds. Each
series of flashes indicate troubles as follows:
Trouble Condition:
•1 flash: Module not enrolled
•2 flashes: Loss of contact with module for over 60 seconds
Module Confirmation:Flashes rapidly during module confirmation process.
Placement Test:On steady when location is unsuitable. Off when location is suitable.
Green LEDOperation
On steady when location is suitable. Off when location is unsuitable.
Placement Test:
Note: For UL/ULC listed systems, signal must be Strong. See
Wireless Device Status Indications for details.
Tamper
The HSM2HOST has built-in wall and case tampers. The tamper function is disabled by default on
the NA version (enabled on the EU version). The tamper function can be enabled or disabled in
Option 3, [804][810] Wireless Option 1. The case tamper activates when the case is opened and
restores when the case is closed. The wall tamper on the back of the unit is depressed by the
mounting surface when properly installed. If the unit is removed, the tamper activates. Ensure
the mounting surface is smooth and free of obstructions that block access to the rear of the unit.
Electrical wires should not run over or under the module when it is mounted.
Note: The built-in wall and case tamper must be installed and enabled for UL/ULC listed
Commercial/ Residential Burglary applications.
Read the safety information before you install the equipment.
Important: This equipment must be installed by a skilled person only. A skilled person is an
installer with appropriate technical training. The installer must be aware of potential hazards
during installation and measures available to minimize risks to the installer and other people.
•Before you install this equipment, disconnect all power sources (for example mains, battery,
and telephone line) connected to the alarm panel.
•Install the equipment indoors in a non-hazardous environment where the following
conditions are met:
-Pollution degree - Maximum 2
-Over voltages - Category II
•Internal wiring must be routed to prevent strain on wire and terminal connections, loose
terminal connections, and damage to conductor insulation.
•Instruct the user that there are no user serviceable parts in this equipment. All equipment
must be serviced by a skilled person.
•Zones - can receive signals from up to 128 wireless zones, and 16 wireless keypads
•Supports up to 32 wireless keys or 32 panic pendants
•Supervisory - programmable supervisory window
•Can be wired up to 1000 ft. / 230 m from the main panel with 22 AWG wire
•Connects to Corbus
•Compatibility: The HSM2HOST is used with PowerSeries Neo or PowerSeries Pro alarm panels
•Operating temperature: NA= 0°C to +49°C (32°F to 122°F); EU= -10°C to +55°C
•Relative humidity: 93% non-condensing
•Built-in wall and case tampers
Note: For Commercial BURG (UL) the Supervisory window shall be set to 4 hours. For
Residential Fire (UL/ULC) the Supervisory window shall be set to 200 seconds. For Residential
BURG (UL/ULC) the supervisory window shall be set to 24 hours. For UL Home Healthcare
applications the supervisory window shall be set to 24 hours Only models operating in the
band 912-919 MHz are UL/ULC listed where indicated. Only UL approved devices are to be used
with UL/ULC listed systems.
The HSM2HOSTx (x= 4/8/9) can receive signals from the devices listed in the following table. For
more information, refer to the individual device instruction sheet.
Note: Throughout this document, x in the model number represents the operating frequency
of the device for one of the following models: 9 (912-919 MHz), 8 (868MHz), 4 (433MHz).
Table 2: Compatible wireless devices
Alarm Controllers
HS2016/HS2032/
Alarm Controllers
Modules
Wireless keypads
Wireless Devices
PowerG wireless short range ceiling mount detector with temperature
monitoring
PowerG wireless long range ceiling mount detector with temperature
monitoring
PowerG wireless outdoor curtain PIR
PowerG wireless PRI motion detector with optional animal resistance
PowerG wireless PIR motion detector with temperature monitoring
PowerG wireless curtain PIR motion detector
PowerG wireless PIR motion detector with camera
PowerG wireless outdoor PIR motion detector with camera and with antimasking
PowerG wireless mirror optic PIR motion detector
PowerG wireless dual technology (PIR and MW) with anti-masking
PowerG wireless outdoor PIR motion detector with anti-maskingPGx994
PowerG wireless recessed door/window contactPGx307
PowerG wireless outdoor contact with auxiliary input, temperature monitoring,
and anti-masking
PowerG wireless door/window contact with auxiliary input
HS2064/HS2128/
HS3032/HS3128/
HS3248
HS2LCDWFx/
HS2LCDWFPx/
HS2LCDWFPVx
PGx862
PGx872
PGx902
PGx904(P)
PGx914(P)
PGx924
PGx934(P)
PGx944(P)
PGx974(P)
PGx984(P)
PGx312
PGx945
UL
UL
UL
UL
UL
UL
UL
UL
UL
UL
UL
UL
PowerG wireless vanishing door/window contact
PowerG wireless glassbreak detector
PowerG wireless shock detector with auxiliary input
This section describes how to install the HSM2HOST module.
Temporary mounting requirements
Before installing the HSM2HOST, you must temporarily mount the HSM2HOST in a location that
meets the following requirements.
•Ensure that the location is dry.
•Ensure that the location is within the operating temperature range.
•Ensure that the location is central to the proposed placement of all wireless devices.
•Mount the module in a high location. Mounting the module below ground level can reduce
the range of the system.
•Mount the module in a location that is far away from sources of interference, such as
computers, electric motors, appliances, heating, air conditioning units, and other sources
of electrical noise. Large metal objects like heating ducts and plumbing can also shield the
electromagnetic waves
•Ensure that there are no obstructions blocking the rear of the unit.
Connecting the HSM2HOST to the alarm panel
About this task:
WARNING: Ensure that you disconnect all power supplies from the system before connecting
the modules to the Corbus. Power supplies can include AC, DC, and telephone lines.
To connect the HSM2HOST to the alarm panel, complete the following steps:
1.Connect the HSM2HOST to the four-wire Corbus in the alarm panel. For more information,
see Figure 1.
The following actions can be performed on the HSM2HOST:
SectionAction
[902][106]Delete the HSM2HOST from the alarm system.
[903][106]Confirm that the HSM2HOST is enrolled.
[000][806]Add a label to appear on LCD keypads.
[900][461]View HSM2HOST model information.
This section describes how to enroll and program wireless devices such as contacts, motion sensors
and sirens on the alarm panel.
[804][000] Enrolling wireless devices
About this task:
After the HSM2HOST is installed and enrolled on the alarm panel, wireless devices can be enrolled
using the following method:
1.Enter Installer Programming section [804][000].
2.When prompted, either activate the device (see device installation sheet) to enroll
immediately or enter a device ID number. Do the latter to pre-enroll devices then enroll them
later at the customer site. The alarm panel determines the type of device being enrolled and
presents the appropriate programming options.
Table 3: Wireless Device Options
Device TypeProgramming Options
(01) Zone type
Zone
Wireless Key
Siren
Repeater(01) Repeater label
3.Use the scroll keys or type in the corresponding number to select an option.
4.Scroll through the available selections, key in a number or enter text as appropriate.
5.Press [*] to accept and move to the next option.
6.After all options are configured, the system prompts you to enroll the next device.
7.Repeat the above steps until all wireless devices are enrolled.
Note: The configuration options listed above can be modified using [804][911] Modify
Device.
(02) Partition assignment
(03) Zone label
(01) Partition assignment
(02) User label
(01) Partition assignment
(02) Siren label
[804][001]-[716] Wireless Device Configuration
To configure wireless devices, complete the following steps:
1.Enter Installer Programming section [804] then select one of the following sub-sections:
-001-248 – Configure Wireless Zones
-601-632 – Configure Wireless Keys
-701-716 – Configure Wireless Keypads
2.Select a device to configure using the scroll keys or go directly to a specific device by entering
3.Use the scroll buttons or enter a hotkey to select a configuration option for the device. See
wireless device installation sheets for details.
4.Press [*] to accept and move to the next option.
5.After all options are configured, the system returns to the base configuration menu.
6.Repeat the above steps to configure other wireless devices.
Note: The configuration options listed above can be modified using [804][911] Modify
Device.
[804][801] RF Jam Detect
About this task:
RF jam detection (continuous interfering transmissions on the radio network) can be turned on or
off. When on, RF jamming is logged and reported.
To configure RF jamming, complete the following steps:
1.Enter Installer Programming section [804][801] then select one of the following options:
Jamming detection and reporting is enabled/disabled.
00 Disabled
01 UL 20/20-USAContinuous RF jamming for 20 seconds
02 EN 30/60-Europe30 seconds of accumulated jamming within 60 seconds
Class 6 30/60-
03
British
Note: Must be enabled for UL/ULC listed installations.
As EN (30/60) but reported only if the jamming duration exceeds 5 minutes
2.Press [*] to accept the selection.
3.Press [#] to exit the section.
[804][802] Wireless supervisory time window
About this task:
This option is used to program the length of time a wireless device can be absent from the system
before a fault is generated.
Before programming the wireless supervisory time window, note the following UL/ULC
specifications:
UL/ULC specificationsMaximum wireless supervision time window
UL Residential Burglary (UL1023)24 hours
Home Health Care (UL1637)24 hours
ULC Residential Burglary (ULC/ORD-C1023)24 hours
UL Residential Fire (UL985) installations200 seconds
UL Commercial Burglary (UL1610/UL365)4 hours
ULC Residential Fire (ULC-S545)4 hours
To program the wireless supervisory time window, complete the following steps:
1.Enter Installer Programming section [804][802].
2.Select one of the following options by scrolling or entering the hot key:
For EN installations, 1 hour or 2 hours must be selected.
When option 06 is used, which configures the system to generate fault conditions after a device has
been detected as absent for 24 hours, smoke detectors generate a fault condition after a maximum
of 18 hours when the 200s supervision toggle option is disabled.
[804][810] Wireless Option 1
About this task:
To program wireless options, complete the following steps:
1.Enter Installer Programming section [804][810].
2.Select one of the following options by scrolling or entering the hotkey:
01
02
03
04
05
RF
Delinquency
Wireless
Supervisory/
RF Jam Alarm
Wireless
Tamper
Fire
Supervision
Smart
Temperature
Reporting
On: the system cannot be armed if a wireless supervisory trouble exists.
An RF delinquency trouble is generated.
Off: wireless supervisory troubles do not prevent arming.
On: if a supervisory or jamming trouble occurs during Away arming, the
siren activates and the event is logged and reported.
Off: supervisory or RF jam troubles during Away arming do not activate
the siren or get logged and reported.
On: module tampers are logged and reported.
Off: module tampers are not logged or reported.
On: fire devices are supervised every 200 seconds. If the device fails to
report within this window, a supervision trouble is generated.
Off: fire devices follow the supervision window programmed in section
802, up to a maximum of 18 hours. The supervisory window can be
programmed with a higher value, but detectors still go into fault after
18 hours.
On: Wireless devices with smart temperature reporting support will
periodically report their ambient temperature to the control panel.
Off: Smart temperature reporting is disabled on all devices.
3.Press [*] to accept the selection and [#] to exit.
To program motion cameras, complete the following steps:
1.Enter Installer Programming section [804][841].
2.Select one of the following options by scrolling or entering the hotkey:
[001]
[002]
[003]
Visual
Verification
View Time
Window
View Other
Alarms
A maximum of 8 zones can be assigned to a PIR camera to initiate video capture. When an
alarm occurs on any of the 8 zones, the panel initiates video capture from the PIR camera.
On: Alarms trigger image capture from PIR Cameras
Off: Alarms do not trigger image capture from PIR Cameras
01 Alarm + 5 Minutes
02 Alarm + 15 minutes
03 Alarm + 1 Hour
Note: The Video on Demand via Integration sessions follow this
configuration.
01 Fire key enabled/disabled
02 Duress enabled/disabled
03 Medical key enabled/disabled
04 Panic key enabled/disabled
Note: Video on Demand by third-party integrators follow this
configuration.
Note: This option is only available with a PIR camera, for example the PGx934 or
PGx944.
[804][901]-[905] Deleting wireless devices
About this task:
To delete wireless devices, complete the following steps:
1.Enter Installer Programming section [804] then select one of the following sub-sections:
Use this option to replace a faulty device enrolled on the system with another device of the same
type while maintaining the configuration of the original. The faulty device does not need to be
deleted.
2.Press [*] to select a sub-section. The first available device is displayed.
3.Scroll or enter a hotkey to select a device, press [*].
4.When prompted, activate the device (full enrollment) or enter the device ID (pre-enrollment).
A message is displayed confirming enrollment.
[804][990][001 – 005] Show all devices
About this task:
Use this section to review wireless devices enrolled on the system and to view serial numbers
associated with each device.
To review wireless device information, complete the following steps:
1.Enter Installer Programming section [804][990] then select one of the following sub-sections:
-[001] – All zones
-[002] – Repeaters
-[004] – Wireless keys
-[005] – keypads
2.Press [*] to select a wireless device type. The first available device is displayed.
3.Use the scroll keys to view the enrolled devices.
Note: This option is not fully supported by LED and ICON keypads.
[804][999] Reset to factory defaults
Selecting this option resets HSM2HOST programming to factory default settings.
[904] Placement testing of wireless devices
This test is used to determine RF signal status for wireless devices and can be performed at a
system keypad or at the individual device. These instructions pertain to testing at the keypad. For
instructions on placement testing at the device, refer to the installation sheet provided with the
wireless equipment. The following test modes are available:
[904][001]-[128]Test wireless zones
[904][521]-[528]Test all repeaters
[904][551]-[566]Test all sirens
[904][601]-[632]Test all wireless keys
[904][701]-[716]Test all keypadsTest each enrolled keypad. 701-716 for keypads 1-16
Test wireless devices individually by zone. Zones with
vanishing contacts must be activated to placement test.
Test each enrolled wireless repeater. 521-528 for
repeaters 1-8
Test each enrolled wireless siren. 551-566 for sirens
1-16
Test individual wireless keys. Once in this section, press
a button on the wireless key to begin the test. 601-632
for wireless keys 1-32.
Digital Security Controls warrants the original purchaser that for a period of twelve months from
the date of purchase, the product shall be free of defects in materials and workmanship under
normal use. During the warranty period, Digital Security Controls shall, at its option, repair or
replace any defective product upon return of the product to its factory, at no charge for labour and
materials. Any replacement and/or repaired parts are warranted for the remainder of the original
warranty or ninety (90) days, whichever is longer. The original purchaser must promptly notify
Digital Security Controls in writing that there is defect in material or workmanship, such written
notice to be received in all events prior to expiration of the warranty period. There is absolutely no
warranty on software and all software products are sold as a user license under the terms of the
software license agreement included with the product. The Customer assumes all responsibility for
the proper selection, installation, operation and maintenance of any products purchased from DSC.
Custom products are only warranted to the extent that they do not function upon delivery. In such
cases, DSC can replace or credit at its option.
International Warranty
The warranty for international customers is the same as for any customer within Canada and the
United States, with the exception that Digital Security Controls shall not be responsible for any
customs fees, taxes, or VAT that may be due.
Warranty Procedure
To obtain service under this warranty, please return the item(s) in question to the point of
purchase. All authorized distributors and dealers have a warranty program. Anyone returning
goods to Digital Security Controls must first obtain an authorization number. Digital Security
Controls will not accept any shipment whatsoever for which prior authorization has not been
obtained.
Conditions to Void Warranty
This warranty applies only to defects in parts and workmanship relating to normal use. It does not
cover:
•damage incurred in shipping or handling
•damage caused by disaster such as fire, flood, wind, earthquake or lightning;
•damage due to causes beyond the control of Digital Security Controls such as excessive
voltage, mechanical shock, water damage;
•damage caused by unauthorized attachment, alterations, modifications or foreign objects;
•damage caused by peripherals (unless such peripherals were supplied by Digital Security
Controls Ltd.);
•defects caused by failure to provide a suitable installation environment for the products;
•damage caused by use of the products for purposes other than those for which it was
designed;
•damage from improper maintenance;
•damage arising out of any other abuse, mishandling or improper application of the products.
Items Not Covered by Warranty
In addition to the items which void the Warranty, the following items shall not be covered by
Warranty: (i) freight cost to the repair centre; (ii) products which are not identified with DSC's
product label and lot number or serial number; (iii) products disassembled or repaired in such a
manner as to adversely affect performance or prevent adequate inspection or testing to verify any
warranty claim. Access cards or tags returned for replacement under warranty will be credited or
replaced at DSC's option. Products not covered by this warranty, or otherwise out of warranty due
to age, misuse, or damage shall be evaluated, and a repair estimate shall be provided. No repair
work will be performed until a valid purchase order is received from the Customer and a Return
Merchandise Authorization number (RMA) is issued by DSC's Customer Service.
Digital Security Controls Ltd.’s liability for failure to repair the product under this warranty after a
reasonable number of attempts will be limited to a replacement of the product, as the exclusive
remedy for breach of warranty. Under no circumstances shall Digital Security Controls be liable
for any special, incidental, or consequential damages based upon breach of warranty, breach of
contract, negligence, strict liability, or any other legal theory. Such damages include, but are not
limited to, loss of profits, loss of the product or any associated equipment, cost of capital, cost
of substitute or replacement equipment, facilities or services, down time, purchaser’s time, the
claims of third parties, including customers, and injury to property. The laws of some jurisdictions
limit or do not allow the disclaimer of consequential damages. If the laws of such a jurisdiction
apply to any claim by or against DSC, the limitations and disclaimers contained here shall be to the
greatest extent permitted by law. Some states do not allow the exclusion or limitation of incidental
or consequential damages, so that the above may not apply to you.
Disclaimer of Warranties
This warranty contains the entire warranty and shall be in lieu of any and all other warranties,
whether expressed or implied (including all implied warranties of merchantability or fitness for a
particular purpose) and of all other obligations or liabilities on the part of Digital Security Controls.
Digital Security Controls neither assumes responsibility for, nor authorizes any other person
purporting to act on its behalf to modify or to change this warranty, nor to assume for it any other
warranty or liability concerning this product. This disclaimer of warranties and limited warranty are
governed by the laws of the province of Ontario, Canada.
WARNING: Digital Security Controls recommends that the entire system be completely tested on a
regular basis. However, despite frequent testing, and due to, but not limited to, criminal tampering
or electrical disruption, it is possible for this product to fail to perform as expected.
Out of Warranty Repairs
Digital Security Controls will at its option repair or replace out-of-warranty products which are
returned to its factory according to the following conditions. Anyone returning goods to Digital
Security Controls must first obtain an authorization number. Digital Security Controls will not
accept any shipment whatsoever for which prior authorization has not been obtained.
Products which Digital Security Controls determines to be repairable will be repaired and returned.
A set fee which Digital Security Controls has predetermined and which may be revised from time to
time, will be charged for each unit repaired.
Products which Digital Security Controls determines not to be repairable will be replaced by the
nearest equivalent product available at that time. The current market price of the replacement
product will be charged for each replacement unit.
WARNING – READ CAREFULLY
Note to Installers
This warning contains vital information. As the only individual in contact with system users, it is
your responsibility to bring each item in this warning to the attention of the users of this system.
System Failures
This system has been carefully designed to be as effective as possible. There are circumstances,
however, involving fire, burglary, or other types of emergencies where it may not provide
protection. Any alarm system of any type may be compromised deliberately or may fail to operate
as expected for a variety of reasons. Some but not all of these reasons may be:
A security system must be installed properly in order to provide adequate protection. Every
installation should be evaluated by a security professional to ensure that all access points and areas
are covered. Locks and latches on windows and doors must be secure and operate as intended.
Windows, doors, walls, ceilings and other building materials must be of sufficient strength and
construction to provide the level of protection expected. A reevaluation must be done during
and after any construction activity. An evaluation by the fire and/or police department is highly
recommended if this service is available.
Criminal Knowledge
This system contains security features which were known to be effective at the time of
manufacture. It is possible for persons with criminal intent to develop techniques which reduce the
effectiveness of these features. It is important that a security system be reviewed periodically to
ensure that its features remain effective and that it be updated or replaced if it is found that it does
not provide the protection expected.
Access by Intruders
Intruders may enter through an unprotected access point, circumvent a sensing device, evade
detection by moving through an area of insufficient coverage, disconnect a warning device, or
interfere with or prevent the proper operation of the system.
Power Failure
Control units, intrusion detectors, smoke detectors and many other security devices require an
adequate power supply for proper operation. If a device operates from batteries, it is possible for
the batteries to fail. Even if the batteries have not failed, they must be charged, in good condition
and installed correctly. If a device operates only by AC power, any interruption, however brief, will
render that device inoperative while it does not have power. Power interruptions of any length
are often accompanied by voltage fluctuations which may damage electronic equipment such as a
security system. After a power interruption has occurred, immediately conduct a complete system
test to ensure that the system operates as intended.
Failure of Replaceable Batteries
This system’s wireless transmitters have been designed to provide several years of battery life
under normal conditions. The expected battery life is a function of the device environment,
usage and type. Ambient conditions such as high humidity, high or low temperatures, or large
temperature fluctuations may reduce the expected battery life. While each transmitting device has
a low battery monitor which identifies when the batteries need to be replaced, this monitor may fail
to operate as expected. Regular testing and maintenance will keep the system in good operating
condition.
Compromise of Radio Frequency (Wireless) Devices
Signals may not reach the receiver under all circumstances which could include metal objects
placed on or near the radio path or deliberate jamming or other inadvertent radio signal
interference.
System Users
A user may not be able to operate a panic or emergency switch possibly due to permanent or
temporary physical disability, inability to reach the device in time, or unfamiliarity with the correct
operation. It is important that all system users be trained in the correct operation of the alarm
system and that they know how to respond when the system indicates an alarm.
Smoke Detectors
Smoke detectors that are a part of this system may not properly alert occupants of a fire for a
number of reasons, some of which follow. The smoke detectors may have been improperly installed
or positioned. Smoke may not be able to reach the smoke detectors, such as when the fire is in
a chimney, walls or roofs, or on the other side of closed doors. Smoke detectors may not detect
smoke from fires on another level of the residence or building.
Every fire is different in the amount of smoke produced and the rate of burning. Smoke detectors
cannot sense all types of fires equally well. Smoke detectors may not provide timely warning of
fires caused by carelessness or safety hazards such as smoking in bed, violent explosions, escaping
gas, improper storage of flammable materials, overloaded electrical circuits, children playing with
matches or arson.
Even if the smoke detector operates as intended, there may be circumstances when there is
insufficient warning to allow all occupants to escape in time to avoid injury or death.
Motion Detectors
Motion detectors can only detect motion within the designated areas as shown in their respective
installation instructions. They cannot discriminate between intruders and intended occupants.
Motion detectors do not provide volumetric area protection. They have multiple beams of detection
and motion can only be detected in unobstructed areas covered by these beams. They cannot
detect motion which occurs behind walls, ceilings, floor, closed doors, glass partitions, glass doors
or windows. Any type of tampering whether intentional or unintentional such as masking, painting,
or spraying of any material on the lenses, mirrors, windows or any other part of the detection
system will impair its proper operation.
Passive infrared motion detectors operate by sensing changes in temperature. However their
effectiveness can be reduced when the ambient temperature rises near or above body temperature
or if there are intentional or unintentional sources of heat in or near the detection area. Some of
these heat sources could be heaters, radiators, stoves, barbeques, fireplaces, sunlight, steam vents,
lighting and so on.
Warning Devices
Warning devices such as sirens, bells, horns, or strobes may not warn people or waken someone
sleeping if there is an intervening wall or door. If warning devices are located on a different level
of the residence or premise, then it is less likely that the occupants will be alerted or awakened.
Audible warning devices may be interfered with by other noise sources such as stereos, radios,
televisions, air conditioners or other appliances, or passing traffic. Audible warning devices,
however loud, may not be heard by a hearing-impaired person.
Telephone Lines
If telephone lines are used to transmit alarms, they may be out of service or busy for certain
periods of time. Also an intruder may cut the telephone line or defeat its operation by more
sophisticated means which may be difficult to detect.
Insufficient Time
There may be circumstances when the system will operate as intended, yet the occupants will
not be protected from the emergency due to their inability to respond to the warnings in a timely
manner. If the system is monitored, the response may not occur in time to protect the occupants or
their belongings.
Component Failure
Although every effort has been made to make this system as reliable as possible, the system may
fail to function as intended due to the failure of a component.
Inadequate Testing
Most problems that would prevent an alarm system from operating as intended can be found by
regular testing and maintenance. The complete system should be tested weekly and immediately
after a break-in, an attempted break-in, a fire, a storm, an earthquake, an accident, or any kind of
construction activity inside or outside the premises. The testing should include all sensing devices,
keypads, consoles, alarm indicating devices and any other operational devices that are part of the
system.
Regardless of its capabilities, an alarm system is not a substitute for property or life insurance.
An alarm system also is not a substitute for property owners, renters, or other occupants to act
prudently to prevent or minimize the harmful effects of an emergency situation.
IMPORTANT - READ CAREFULLY: DSC Software purchased with or without Products and
Components is copyrighted and is purchased under the following license terms:
•This End-User License Agreement (“EULA”) is a legal agreement between You (the company,
individual or entity who acquired the Software and any related Hardware) and Digital Security
Controls, a division of Tyco Safety Products Canada Ltd. (“DSC”), the manufacturer of the
integrated security systems and the developer of the software and any related products or
components (“HARDWARE”) which You acquired.
•If the DSC software product (“SOFTWARE PRODUCT” or “SOFTWARE”) is intended to be
accompanied by HARDWARE, and is NOT accompanied by new HARDWARE, You may not
use, copy or install the SOFTWARE PRODUCT. The SOFTWARE PRODUCT includes computer
software, and may include associated media, printed materials, and “online” or electronic
documentation.
•Any software provided along with the SOFTWARE PRODUCT that is associated with a separate
end-user license agreement is licensed to You under the terms of that license agreement.
•By installing, copying, downloading, storing, accessing or otherwise using the SOFTWARE
PRODUCT, You agree unconditionally to be bound by the terms of this EULA, even if this EULA
is deemed to be a modification of any previous arrangement or contract. If You do not agree
to the terms of this EULA, DSC is unwilling to license the SOFTWARE PRODUCT to You, and
You have no right to use it.
SOFTWARE PRODUCT LICENSE
The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as
well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.
1. GRANT OF LICENSE This EULA grants You the following rights:
(a) Software Installation and Use - For each license You acquire, You may have only one copy of the
SOFTWARE PRODUCT installed.
(b) Storage/Network Use - The SOFTWARE PRODUCT may not be installed, accessed, displayed, run,
shared or used concurrently on or from different computers, including a workstation, terminal or
other digital electronic device (“Device”). In other words, if You have several workstations, You will
have to acquire a license for each workstation where the SOFTWARE will be used.
(c) Backup Copy - You may make back-up copies of the SOFTWARE PRODUCT, but You may only
have one copy per license installed at any given time. You may use the back-up copy solely for
archival purposes. Except as expressly provided in this EULA, You may not otherwise make copies of
the SOFTWARE PRODUCT, including the printed materials accompanying the SOFTWARE.
2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS
(a) Limitations on Reverse Engineering, Decompilation and Disassembly - You may not reverse
engineer, decompile, or disassemble the SOFTWARE PRODUCT, except and only to the extent that
such activity is expressly permitted by applicable law notwithstanding this limitation. You may not
make any changes or modifications to the Software, without the written permission of an officer
of DSC. You may not remove any proprietary notices, marks or labels from the Software Product.
You shall institute reasonable measures to ensure compliance with the terms and conditions of this
EULA.
(b) Separation of Components - The SOFTWARE PRODUCT is licensed as a single product. Its
component parts may not be separated for use on more than one HARDWARE unit.
(c) Single INTEGRATED PRODUCT - If You acquired this SOFTWARE with HARDWARE, then the
SOFTWARE PRODUCT is licensed with the HARDWARE as a single integrated product. In this case,
the SOFTWARE PRODUCT may only be used with the HARDWARE as set forth in this EULA.
(d) Rental - You may not rent, lease or lend the SOFTWARE PRODUCT. You may not make it available
to others or post it on a server or web site.
(e) Software Product Transfer - You may transfer all of Your rights under this EULA only as part
of a permanent sale or transfer of the HARDWARE, provided You retain no copies, You transfer
all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials,
any upgrades and this EULA), and provided the recipient agrees to the terms of this EULA. If
the SOFTWARE PRODUCT is an upgrade, any transfer must also include all prior versions of the
SOFTWARE PRODUCT.
f) Termination - Without prejudice to any other rights, DSC may terminate this EULA if You fail to
comply with the terms and conditions of this EULA. In such event, You must destroy all copies of the
SOFTWARE PRODUCT and all of its component parts.
(g) Trademarks - This EULA does not grant You any rights in connection with any trademarks or
service marks of DSC or its suppliers.
3. COPYRIGHT - All title and intellectual property rights in and to the SOFTWARE PRODUCT
(including but not limited to any images, photographs, and text incorporated into the SOFTWARE
PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE PRODUCT,
are owned by DSC or its suppliers. You may not copy the printed materials accompanying the
SOFTWARE PRODUCT. All title and intellectual property rights in and to the content which may be
accessed through use of the SOFTWARE PRODUCT are the property of the respective content owner
and may be protected by applicable copyright or other intellectual property laws and treaties. This
EULA grants You no rights to use such content. All rights not expressly granted under this EULA are
reserved by DSC and its suppliers.
4. EXPORT RESTRICTIONS - You agree that You will not export or re-export the SOFTWARE PRODUCT
to any country, person, or entity subject to Canadian export restrictions.
5. CHOICE OF LAW - This Software License Agreement is governed by the laws of the Province of
Ontario, Canada.
6. ARBITRATION - All disputes arising in connection with this Agreement shall be determined by
final and binding arbitration in accordance with the Arbitration Act, and the parties agree to be
bound by the arbitrator’s decision. The place of arbitration shall be Toronto, Canada, and the
language of the arbitration shall be English.
7. LIMITED WARRANTY
(a) NO WARRANTY - DSC PROVIDES THE SOFTWARE “AS IS” WITHOUT WARRANTY. DSC DOES NOT
WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT OPERATION OF THE
SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE.
(b) CHANGES IN OPERATING ENVIRONMENT - DSC shall not be responsible for problems caused by
changes in the operating characteristics of the HARDWARE, or for problems in the interaction of the
SOFTWARE PRODUCT with non-DSC-SOFTWARE or HARDWARE PRODUCTS.
(c) LIMITATION OF LIABILITY; WARRANTY REFLECTS ALLOCATION OF RISK - IN ANY EVENT, IF ANY
STATUTE IMPLIES WARRANTIES OR CONDITIONS NOT STATED IN THIS LICENSE AGREEMENT, DSC’S
ENTIRE LIABILITY UNDER ANY PROVISION OF THIS LICENSE AGREEMENT SHALL BE LIMITED TO
THE GREATER OF THE AMOUNT ACTUALLY PAID BY YOU TO LICENSE THE SOFTWARE PRODUCT
AND FIVE CANADIAN DOLLARS (CAD$5.00). BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE
ABOVE LIMITATION MAY NOT APPLY TO YOU.
(d) DISCLAIMER OF WARRANTIES - THIS WARRANTY CONTAINS THE ENTIRE WARRANTY AND SHALL
BE IN LIEU OF ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESSED OR IMPLIED (INCLUDING
ALL IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE)
AND OF ALL OTHER OBLIGATIONS OR LIABILITIES ON THE PART OF DSC. DSC MAKES NO OTHER
WARRANTIES. DSC NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON PURPORTING TO ACT
ON ITS BEHALF TO MODIFY OR TO CHANGE THIS WARRANTY, NOR TO ASSUME FOR IT ANY OTHER
WARRANTY OR LIABILITY CONCERNING THIS SOFTWARE PRODUCT.
(e) EXCLUSIVE REMEDY AND LIMITATION OF WARRANTY - UNDER NO CIRCUMSTANCES SHALL
DSC BE LIABLE FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL OR INDIRECT DAMAGES BASED
UPON BREACH OF WARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT LIABILITY, OR ANY
OTHER LEGAL THEORY. SUCH DAMAGES INCLUDE, BUT ARE NOT LIMITED TO, LOSS OF PROFITS,
LOSS OF THE SOFTWARE PRODUCT OR ANY ASSOCIATED EQUIPMENT, COST OF CAPITAL, COST OF
SUBSTITUTE OR REPLACEMENT EQUIPMENT, FACILITIES OR SERVICES, DOWN TIME, PURCHASERS
TIME, THE CLAIMS OF THIRD PARTIES, INCLUDING CUSTOMERS, AND INJURY TO PROPERTY.
WARNING: DSC recommends that the entire system be completely tested on a regular basis.
However, despite frequent testing, and due to, but not limited to, criminal tampering or electrical
disruption, it is possible for this SOFTWARE PRODUCT to fail to perform as expected.
This equipment generates and uses radio frequency energy and if not installed and used properly,
in strict accordance with the manufacturer’s instructions, may cause interference to radio and
television reception. It has been type tested and found to comply with the limits for Class B device
in accordance with the specifications in Subpart “B” of Part 15 of FCC Rules, which are designed to
provide reasonable protection against such interference in any residential installation. However,
there is no guarantee that interference will not occur in a particular installation. If this equipment
does cause interference to television or radio reception, which can be determined by turning the
equipment off and on, the user is encouraged to try to correct the interference by one or more of
the following measures:
- Re-orient the receiving antenna
- Relocate the alarm control with respect to the receiver
- Move the alarm control away from the receiver
- Connect the alarm control into a different outlet so the alarm control & receiver are on different
circuits.
If necessary, the user should consult the dealer or an experienced radio/television technician for
additional suggestions. The user may find the following booklet prepared by the FCC helpful: “How
to Identify and Resolve Radio/Television Interference Problems”. This booklet is available from the
U.S. Government Printing Office, Washington, D.C. 20402, Stock # 004-000-00345-4.
IC Statement
This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to
the following two conditions: (1) this device may not cause interference, and (2) this device must
accept any interference, including interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio
exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil
ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage
radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
This Class B digital apparatus meets all requirements of the Canadian interference-causing
equipment regulations.
Cet appareil numérique de la Classe B respecte toutes les exigences de règlement sur le matériel
brouilleur du Canada.
IC:160A-HS2HOST9.
The term ‘IC:’ before the radio certification number only signifies that Industry Canada technical
specifications were met.
EU Compliance Statement
The Model HSM2HOST8 Wireless Transceiver has been certified by Telefication according to
EN50131-1:2006 + A1:2009 and EN50131-3:2009, for Grade 2, Class II.
Note: For EN50131 compliant installations only, the intrusion portion of the alarm system has
been investigated. Fire Alarm and Auxiliary (Medical) Alarm functions were not included in the
evaluation of this product under the requirements of the above mentioned standards.
The trademarks, logos, and service marks displayed on this document are registered in the
United States [or other countries]. Any misuse of the trademarks is strictly prohibited and Tyco
will aggressively enforce its intellectual property rights to the fullest extent of the law, including
pursuit of criminal prosecution wherever necessary. All trademarks not owned by Tyco are the
property of their respective owners, and are used with permission or allowed under applicable
laws. Product offerings and specifications are subject to change without notice. Actual products
may vary from photos. Not all products include all features. Availability varies by region; contact
your sales representative.