background image

End User License Agreement and Terms & Conditions 

 

 

30 

 

Care@Home™ Indoor Photo Detector User Guide 

 

Appendix C

 

End User License Agreement and Terms & 
Conditions 

BY USING THE APPLICATION AND/OR THE SOFTWARE, YOU INDICATE YOUR AGREEMENT WITH THE FOLLOWING TERMS AND CONDITIONS. IF YOU DO 
NOT AGREE WITH THE END USER LICENSE AGREEMENT and THE TERMS AND CONDITIONS, (hereinafter called the “

Terms and Conditions

”), DO NOT 

USE THE APPLICATION AND/OR THE SOFTWARE. 

_

Definitions

_

 

The following terms will have the meaning ascribed to them in this Terms and Conditions:

 

The Company

”: Essence SmartCare Ltd. 

The System

”: related social alarm product(s) and monitoring applications, products and solutions for home or any control systems or any part thereof. 

Device

”: A mobile phone, personal computer, tablet or any other device or any other application interface that you own and/or use and/or hold and/or control, which may enable access to third parties 

services and applications. 

Service Provider

”: the entity (not being the Company) that provides services and/or call-center services and/or other services through the System and enables you to use the Application. 

Monitored Party

”: the third party whose activities of daily living are being monitored. 

The Company provides a user interface application (including any updates and/or upgrades and/or patches thereto) subject always to the terms hereto for monitoring and/or controlling the System via 
your Device(s) (hereinafter, respectively, the “

Application

”). By downloading the Application, installing or using the Application or  any part thereof, you irrevocably agree to the following terms and 

conditions in this 

Terms and Conditions

Certain information about you or otherwise is subject to the Privacy Policy; for more information, see the full Privacy Policy at 

ADDENDUM A

_

Article I – SCOPE OF USE

a. The Company grants you non-exclusive, non-transferable, non-sub-licensable, non-assignable, limited right to use the Application solely and exclusively for your personal use via your Device(s) license for 
the intended purpose of monitoring the consenting Monitored Party for a limited time period as specified herein below (the “

License

”). For the avoidance of doubt, the License allows you to install and use 

the Application on several Devices provided that such are owned at all times solely by you; 

b. You agree that you shall be solely responsible for (and that the Company has no responsibility to you or to any third party) the use of the Application, for any breach of the obligations under the Terms 
and Conditions, and for the consequences (including any loss or damage which the Company and/or you and/or any third party may suffer and/or incur) as a result of any such breach. 

c. As a condition to using the Application, you agree that certain updates, upgrades and/or patches to the Application may be automatically received and installed on your Device(s) from time to time. 

d. As a condition to using the Application, you agree that you will receive certain messages from the Company and/or the Service Provider and/or the System , including notifications sent from the System 
to your Device(s); modifications, improvements and patches of the Application; information with respect to the Company's other products; personalized information, including advertisements, from third 
parties, unless you elect not to receive such third party contents (“

opt out

”); and such other messages as the Company believes may be to your benefit or interest from time to time. 

_

Article II – PROPRIETARY RIGHTS

a. You hereby agree and acknowledge that (a) the Application contains Intellectual Property Rights as well as other proprietary and confidential information that is protected by applicable 
intellectual property and other laws, and (b) The Company owns all rights, title and interest in and to the Application and content, including without limitation upgrade, modification thereto 
including without limitation all Intellectual Property Rights therein and thereto. “

Intellectual Property Rights

” means any and all rights existing from time to time under patent law, copyright law, 

trade secret law, trademark law, unfair competition law, and any and all other proprietary rights, and any and all applications, renewals, extensions and restorations thereof, now or hereafter in force 
and effect worldwide. You agree that you will not, and will not allow any third party to, (1) copy, sell, license, distribute, transfer, modify, adapt, translate, prepare derivative works from, decompile, 
reverse engineer, disassemble or otherwise attempt to derive source code from the Application or content that may be presented or accessed through the Application  for any purpose, without the 
express written consent of the Company, (2) take any action to circumvent or defeat the security or content usage rules provided, deployed or enforced by  any functionality (including without 
limitation digital rights management functionality) contained in the Application , (3) use the Application  to access, copy, transfer or retransmit content in violation of any law or third party rights, or 
(4) remove, obscure, or alter the Company's copyright notices, trademarks, logos or other proprietary rights notices affixed to or contained within or accessed in conjunction with or through the 
Application. 

b. USERNAME AND PASSWORD: In order to access and use the Application you must obtain a valid username and password. You are solely responsible for maintaining the confidentiality of your 
username and password. For security reasons and to avoid unauthorized access, you are required to logout in an orderly manner from the Application at the end of each session. In any case, the 
Company shall not be liable for any damage or loss of any kind or nature incurred and/or suffered by you and/or by any third party as a result of the Application being accessed and/or used by 
unauthorized user/s. 

c. TERMINATION: The License is effective until terminated by the Company for any reason whatsoever (including without limitation in case that the agreement between the Company and the Service 
Provider expires or terminates for any reason), and will terminate automatically without notice from   the Company if you fail to comply with any Terms and Conditions; in any such event the 
Company may block you from using and/or accessing the Application and you shall not have any claim against the Company in connection with such restriction. 

_

Article III – DISCLAIMER OF WARRANTIES

_

 

a. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT USE OF THE APPLICATION IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND 
EFFORT IS WITH YOU. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE APPLICATION  IS PROVIDED “

AS IS

” AND “

AS AVAILABLE

”, WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY 

KIND, AND THE COMPANY HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS WITH RESPECT TO THE APPLICATION , EITHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, 
THE IMPLIED WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY, OF SATISFACTORY QUALITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF  ACCURACY, OF QUIET ENJOYMENT, AND NON-
INFRINGEMENT OF THIRD PARTY RIGHTS. THE COMPANY DOES NOT WARRANT AGAINST INTERFERENCE WITH YOUR ENJOYMENT OF THE APPLICATION, THAT THE FUNCTIONS CONTAINED IN, OR 
PERFORMED OR PROVIDED BY THE APPLICATION WILL MEET YOUR REQUIREMENTS, THAT THE OPERATION OF THE APPLICATION WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT DEFECTS IN THE 
APPLICATION WILL BE CORRECTED. THE COMPANY DOES NOT WARRANT THAT THE APPLICATION SHALL BE COMPATIBLE WITH EACH WEB BROWSER (AND EACH VERSION THEREOF) AND YOU ARE 
SOLELY RESPONSIBLE FOR OBTAINING A BROWSER SUPPORTING THE APPLICATION FROM YOUR APPLICABLE PROVIDER. USAGE OF THE APPLICATION MAY REQUIRE DOWNLOADING AND INSTALLING A 
THIRD PARTY SOFTWARE (E.G., PDF VIEWER APPLICATION) AND YOU ARE SOLELY RESPONSIBLE FOR OBTAINING SUCH THIRD PARTY SOFTWARE, WITH COMPANY ASSUMING NO LIABILITY WHATSOEVER 
IN CONNECTION WITH SUCH SOFTWARE INCLUDING ITS AVAILABILITY (OR LACK THEREOF), PERFORMANCE, COST, OR ANY RESULTS CAUSED BY THE OPERATION OF SUCH SOFTWARE. NO ORAL OR 
WRITTEN INFORMATION OR ADVICE GIVEN BY THE COMPANY OR ITS AUTHORIZED REPRESENTATIVE SHALL CREATE A WARRANTY, OTHER THAN SUCH AS EXPLICITLY SET FORTH IN WRITING IN THESE 
TERMS AND CONDITIONS. SHOULD THE APPLICATION PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 

b. YOU ARE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR DEVICE(S), OR LOSS OF DATA THAT RESULTS FROM USING THE APPLICATION. 

c. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY THAT SOME OR ALL OF THE INFORMATION SENT VIA THE APPLICATION WILL BE 
SENT AND/OR REACH THE INTENDED RECIPIENT AND/OR NOT BE SENT AND/OR NOT REACH OTHER THIRD PARTIES, IN WHICH CASE THE COMPANY WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR 
LOSS OF ANY KIND OR NATURE INCURRED AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF. 

d. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY THAT THE APPLICATION WILL SUCCESSFULLY PROVIDE NOTICES TO YOUR DEVICE 
OR TO YOUR SERVICE PROVIDER, NOR THAT THE SYSTEM AND/OR ANY PART OF THE SYSTEM WILL SUCCESSFULLY TRIGGER NOTICES OR OTHERWISE WILL CONFORM OR OPERATE, IN WHICH CASE THE 
COMPANY WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR LOSS OF ANY KIND OR NATURE INCURRED AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF. 

e. YOU EXPRESSLY DECLARE: THAT YOU HAVE RECEIVED THE MONITORED PARTY’S PRIOR WRITTEN CONSENT TO VIEW AND/OR MONITOR THE SYSTEM INFORMATION AS DEFINED HEREIN; THAT YOU 
WILL TREAT THE SYSTEM INFORMATION WITH THE UPMOST DISCRETION; AND, THAT YOU WILL NOT STORE AND/OR SHARE AND/OR PUBLISH THE SYSTEM INFORMATION OR ANY PART THEREOF. YOU 
UNDERSTAND AND AGREE THAT THE INFORMATION GATHERED AND/OR STORED BY THE SYSTEM OR THE APPLICATION (THE “

INFORMATION

”) (INCLUDING BUT NOT LIMITED TO VIDEO SEGMENTS 

Summary of Contents for Care@Home ES700IPD

Page 1: ...Care Home Indoor Photo Detector User Guide ESUGSC006 Version 1 0 September 2015 ...

Page 2: ...above disclaimers exclusions or limitations may not apply to you By using the information contained herein you agree that the laws of the State of Israel without regard to principles of conflict of laws will govern any dispute of any sort that might arise between you and Essence regarding the information contained herein and any such dispute shall be settled exclusively in the competent courts of ...

Page 3: ... 12 4 2 Pet Immune Lens 13 4 3 Closing the IPD 15 5 Operation 17 5 1 IPD Physical Attributes 17 5 2 Notifications 17 5 3 Supervision 18 6 Maintenance 19 6 1 Replacing the Battery 19 7 Specifications 21 Appendix A Installation Method Alternatives 23 Using Mounting Tape 23 Using Screws 25 Required Equipment 25 Installing the IPD with Screws 26 Appendix B Terms Abbreviations and Acronyms 27 Appendix ...

Page 4: ...P Data security ensured with 128 bit AES encryption Up to 500 m 1640 ft RF range open air communication Detection algorithms including false alarm suppression Sealed optics with insect immunity Tamper reporting Utilizes multi zone spherical lens for Detection coverage 120o horizontal 105o vertical Detection range of about 12 m 40 ft Daylight immunity White ESI 4th Generation DragonflyEye Multi Zon...

Page 5: ...er is ES700IPD NOTE The images of batteries included in this User Guide are for illustration purposes only Only batteries thoroughly tested and approved by Essence should be used to meet the device s specifications A list of the approved batteries and their specifications is provided in Table 2 on page 22 ...

Page 6: ... view of main point of entry onto the premises A flat wall surface or a corner in a room A surface that is clean dry and smooth Within 700 m 2296 ft of the CP open air nominal A coverage area within view of the IPD detection angle and range Maximum detection angle of 105 horizontal 80 vertical Maximum detection range of 12 m 40 ft Optimum Height 2 1 m 6 9 ft to 2 3 m 7 5 ft above the floor Avoid i...

Page 7: ...Installation Preparation Care Home Indoor Photo Detector User Guide 7 Avoid wet hot and humid areas such as a bathroom Avoid facing sunlight or other light sources such as opposite a window ...

Page 8: ... Identify the location for mounting the IPD according to the criteria in section 2 2 on page 6 2 Clean the surface of the mounting location thoroughly Make sure the location is dry 3 Release the IPD mounting base by lifting the tab and pushing it forward as illustrated in Figure 2 below Figure 2 Release the Mounting Base NOTE Refer to the section Using Screws of Appendix A on page 25 for informati...

Page 9: ...ed on the right side of the front of the CP for five seconds to begin the pairing process to establish a communication channel between the IPD and the CP The pairing process adds the IPD to the Care Home system The CP beeps and the ring around the EMERGENCY button lights up in Blue with a circular movement effect 7 Open the battery compartment as illustrated in Figure 3 below Push the tab a Lift t...

Page 10: ...e following results If the pairing process is successful the CP beeps and the ring around the CP EMERGENCY button blinks Blue three times If the pairing process is not successful the CP beeps and the ring lights up Red for two seconds If the peripheral device is already paired the CP beeps and the ring lights up alternating between Blue and Red If no additional peripheral devices can be integrated...

Page 11: ...e test is used to determine the detection area of the IPD The Walk Test mode starts automatically after the IPD powers up such as When a new battery is inserted After adding and pairing a new IPD with the Care Home system This mode lasts 10 minutes During the Walk Test any motion detection is signaled by the LED on the IPD The IPD sends a notification of the motion detection event to the CP ...

Page 12: ...ce false detections by suppressing motion detections of small objects such as pets Figure 6 The Pet Immune Lens 4 1 Opening the IPD To open the IPD perform the following procedure Caution Perform this procedure with special care since the top part of the front panel is made of very thin plastic covering which might break if too much pressure is applied 1 If the device is already installed on the p...

Page 13: ...uit board and other parts of the device 4 2 Pet Immune Lens To install the Pet Immune Lens in the IPD perform the following procedure 1 Open the IPD as instructed in section 4 1 on page 12 2 Release the IPD outer lens from the front panel with a flat screwdriver by releasing the three latch tabs which hold the outer lens into place as shown in Figure 8 below Release the tabs as follows Push the si...

Page 14: ...lens is not released insert a dull thin object through the oval opening and gently push the outer lens and release it as illustrated in Figure 9 below Figure 9 Back Cover Oval Opening 4 Insert the pet immune lens into the opening for the lens in the IPD front panel The pet immune lens fits inside the opening of the IPD as illustrated in Figure 10 below Figure 10 Assembling the Pet Immune Lens ...

Page 15: ...IPD Lens Insertion The side and center latch tabs hold both lenses in place 7 Close the IPD according to the instructions in section 4 3 below 4 3 Closing the IPD To close the IPD perform the following procedure 1 Insert the tabs at the bottom end of the front panel into the inner square slots at the bottom end of the back cover as illustrated in Figure 12 below Figure 12 Align and Insert Tabs in ...

Page 16: ...Home Indoor Photo Detector User Guide 3 Attach the front panel to the back cover using the two screws 4 Insert the batteries 5 Return the IPD onto the mounting base such that the lens is pointing downward Figure 13 Align Holes for Screws ...

Page 17: ...ever motion is detected or a tamper event occurs 5 2 Notifications The IPD sends notifications to the CP for the following events A motion detection event The room temperature on the premises passes the configured temperature thresholds The battery charge for the IPD is low requiring replacement The tamper switch in the IPD is disturbed registering a tamper event Use the Care Home CMS software app...

Page 18: ...stalled on your Resident s premises 5 3 Supervision The IPD is a supervised device The IPD periodically transmits its status via an I m alive message to the CP The frequency of the reporting periods can be configured locally or remotely If after a pre defined time period the CP does not receive the I m alive message the CP sends a no communication report to the monitoring station ...

Page 19: ...lode if it is incorrectly installed Be careful to replace the battery only with the same or equivalent type recommended by the manufacturer Discard used batteries responsibly To replace the battery perform the following procedure 1 Remove the device from the mounting base as illustrated in Figure 15 below While pushing the tab at the bottom of the IPD towards the wall slide the IPD downwards off t...

Page 20: ...ternal tamper prevention mechanism No damage has occurred to the IPD 5 Insert the new batteries as illustrated in Figure 4 on page 10 NOTE To comply with the UL certification standards use GP International Limited batteries When the batteries are inserted the LED behind the lens lights up Red indicating that the IPD has powered up successfully 6 Close the battery compartment cover 7 Return the IPD...

Page 21: ... Dual element low noise Pyro Ceramic sensor RFI shielding Insect Immunity Sealed Optics Lens White ESI 4th Generation DragonflyEye Multi Zone spherical lens 12 m detection range 105 horizontal 80 vertical 102 zones 6 vertical beams Daylight Immunity Electrical Power Supply Three 1 5V AA Alkaline batteries manufactured by GP with a battery capacity of 2100 mAh Voltage and current ratings Batteries ...

Page 22: ... Automatic after power up 10 minutes Visual Indications 1 LED for detection tampering walk test etc Environmental RFI Protection Over 30 V m Operating Temperatures 0 49 C 32 120 2 F Storage Temperatures 20 60 C 4 F 140 F Physical Dimensions 123 x 60 x 60 mm L x W x D 4 84 x 2 36 x 2 36 in Weight 210 g incl battery 0 165 lb Color Glossy White Mounting Standard ESI wall mount Standard ESI 2 screws a...

Page 23: ...hod consider the following Installation with the mounting tape is more common The screws on the right side of the inside of the mounting base covering the punch out holes on the left side of the IPD are for tamper protection Installation with screws supports the device when installing on a difficult angle Using Mounting Tape Figure 19 below shows the double sided adhesive mounting tape on the back...

Page 24: ...Cover The IPD can be installed using mounting tape The mounting tape is approved for the following surfaces ABS Polycarbonate PC Aluminum Galvanized Steel Enameled Steel Stainless Steel Nickel Coated ABS PVC Glass Epoxy Ceramic PBT Glass with and without silane coating Acrylic Polyurethane paint Polyester Paint ...

Page 25: ... angle facing to the right On an angle facing to the left In a corner The thin plastic covering over the holes can be removed if necessary All the corner support holes are blocked by the mounting tape You can drill through the tape if needed Figure 19 Screw Locations in IPD Mounting Base Required Equipment Before beginning prepare the following equipment A drill with a standard appropriate bit Two...

Page 26: ... in Figure 2 on page 8 2 For wall mounting Use a flat screwdriver to remove the punch outs 1 and 2 as shown in Figure 21 above a Clean the surface where the IPD is to be installed b Place and hold the base on the desired mounting location and mark the drilling spots c Drill the holes d Insert two dowels if needed e Place the base over the dowels and screw in the two screws f 3 For corner mounting ...

Page 27: ... server side script engine for dynamically generated web pages CP An Essence Term Control Panel DIY Do It Yourself DMZ Demilitarized Zone In computer security a DMZ is a physical or logical sub network that contains and exposes an organization s external facing services to a larger and untrusted network usually the Internet The purpose of a DMZ is to add an additional layer of security to an organ...

Page 28: ...sing radio signals to transfer data from a tag attached to an object for automatic identification RIA Rich Internet Application Web application with many characteristics of desktop application software Typically delivered by way of a site specific browser a browser plug in an independent sandbox extensive use of JavaScript or a virtual machine RSU Remote Software Update SHA 1 Secure Hash Algorithm...

Page 29: ...ed set of methods and a network protocol to allow an end host to discover its public IP address if it is located behind a NAT STUN is used to permit NAT traversal for applications of real time voice video messaging and other interactive IP communications STUN is documented in RFC 5389 STUN is intended to be a tool to be used by other protocols such as ICE Telnet Telnet is a network protocol that a...

Page 30: ...tion digital rights management functionality contained in the Application 3 use the Application to access copy transfer or retransmit content in violation of any law or third party rights or 4 remove obscure or alter the Company s copyright notices trademarks logos or other proprietary rights notices affixed to or contained within or accessed in conjunction with or through the Application b USERNA...

Page 31: ...des and lock outs c The Application is designed to utilize your enabled cellular Device to access the System The Device will work only in areas where the cellular service has coverage and Company has no control over such coverage Company is authorized to record and maintain audio transmissions data and communications and shall be the exclusive owner of such property You are responsible for all per...

Page 32: ...ay present links in a format that enables us to keep track of whether these links have been followed Third Party Sites This Privacy Policy applies only to the Application functionality on the System or a Device under your control or on the Site The Site may include links and references to the websites of others or third party advertisers These other sites may place their own cookies or other files...

Page 33: ...ate upon activation Notwithstanding the forgoing Company shall not be responsible for loss of System connectivity or data due to cellular network disconnections The System must be used as intended and for no other purpose The System contains small particles and electricity wires and is not intended for use by children or anyone who is not capable of understanding the System s purpose and how to us...

Page 34: ...vices used for access are lost or accessed by others and Company shall have no liability for such third party unauthorized access 3 The System will work only in areas where the cellular service has coverage and Company has no control over such coverage Company is authorized to record and maintain data and shall be the exclusive owner of such property You are responsible for all permits and permit ...

Page 35: ...red and or photographed and or recorded without their knowledge and prior authorization 1 Security We are concerned with safeguarding your information We employ a variety of safety measures designed to protect your information from unauthorized access and disclosure However we cannot guarantee that your personal information or private communications will always remain private and secure 2 Internat...

Reviews: