background image

End User License Agreement and Terms & Conditions 

 

 

32 

 

Care@Home™ Indoor Photo Detector User Guide 

 

By downloading or using the Application or by entering the Site, you fully understand and unambiguously consent to the collection and processing of such information and to the terms of this Privacy Policy. 
If you do not agree to the terms of this Privacy Policy, you must not use the Application or Site. 

This Privacy Policy may be amended or updated from time to time. If we make any material changes to this Privacy Policy, Service Provider shall update you of these changes. Our website will reflect changes 
in the Privacy Policy as well and you are advised to consult this Privacy Policy regularly for any changes. 

 

_

Information Collection

Personally Identifiable Information 

In the course of using the Application, we might ask you to provide us with certain personally identifiable information that can be used to contact or identify you (“

Personal Information

”). Personal 

Information may include, but is not limited to, your name, country of residence, email address and website address. 

Non-Personally Identifiable Information 

When you use the Application (whether such use is performed on the System or a Device, on the Site or on a website of one of our partners or other third parties), we collect information regarding your use 
of the Application, and information that your browser sends whenever you visit a site or online service, including, without limitation, your computer's Internet Protocol (IP) address, browser type, the web 
page you were visiting before, and information for which you search. 

When you use a widget or any other tool offered by us, whether on the System or a Device, on the Site or on a third party website, including a website owned or operated by you, we may record data related 
to that activity, the deployment of the widget or tool, your location and any other account related data. 

Like many websites, we use “cookies” to collect information. A cookie is a small data file that we transfer to your computer's hard disk for record-keeping purposes. You can instruct your browser, by 
changing its options, to stop accepting cookies or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the 
Site or all functionality of the Application. 

We may present links in a format that enables us to keep track of whether these links have been followed

Third Party Sites 

This Privacy Policy applies only to the Application functionality on the System or a Device under your control, or on the Site. The Site may include links and references to the websites of others or third party 
advertisers. These other sites may place their own cookies or other files on your computer, collect data or solicit personal information from you. Other websites follow different rules regarding the use or 
disclosure of the Personal Information that you submit. We encourage you to read the privacy policies and other terms of the other websites. We do not review, approve, monitor, endorse, warrant, or make 
any representations with respect to such websites. In no event will we be responsible or liable, directly or indirectly, to anyone for any loss or damage arising from such sites, including without limitation for 
your use of such website and for any information submitted by you, or otherwise collected by such websites. 

 

 

1. Our Policy towards Children 

We do not knowingly collect personally identifiable information from children under the age of 18. If a parent or guardian becomes aware that his or her child has provided us with Personal Information 
without their consent, he or she should contact us at

 

[email protected]

. If we become aware that a child under 18 has provided us with Personal Information, we will delete such information from our 

files. 

2. Security 

We are concerned with safeguarding your information. We employ a variety of safety measures designed to protect your information from unauthorized access and disclosure. However, we cannot 
guarantee that your personal information or private communications will always remain private and secure. 

3. International Processing or Transfer 

Your information may be processed or transferred outside of your state, where the privacy laws may not be as protective as those in your jurisdiction. 

4. Disclosure 

We reserve the right to disclose any information obtained by us, including but not limited to Personal Information and Non Personally Identifiable Information, (i) if required by law or by any governmental 
authority; or (ii) in case of emergency; or (iii) to a successor entity in connection with a merger, acquisition, bankruptcy or sale of all or substantially all of our assets. 

5. Contacting Us 

If you have any concerns or questions about this Privacy Policy, please contact us a

[email protected]

.

 

Copyright © 2015, Essence SmartCare Ltd., All rights reserved. 

Summary of Contents for Care@Home ES700IPD

Page 1: ...Care Home Indoor Photo Detector User Guide ESUGSC006 Version 1 0 September 2015 ...

Page 2: ...above disclaimers exclusions or limitations may not apply to you By using the information contained herein you agree that the laws of the State of Israel without regard to principles of conflict of laws will govern any dispute of any sort that might arise between you and Essence regarding the information contained herein and any such dispute shall be settled exclusively in the competent courts of ...

Page 3: ... 12 4 2 Pet Immune Lens 13 4 3 Closing the IPD 15 5 Operation 17 5 1 IPD Physical Attributes 17 5 2 Notifications 17 5 3 Supervision 18 6 Maintenance 19 6 1 Replacing the Battery 19 7 Specifications 21 Appendix A Installation Method Alternatives 23 Using Mounting Tape 23 Using Screws 25 Required Equipment 25 Installing the IPD with Screws 26 Appendix B Terms Abbreviations and Acronyms 27 Appendix ...

Page 4: ...P Data security ensured with 128 bit AES encryption Up to 500 m 1640 ft RF range open air communication Detection algorithms including false alarm suppression Sealed optics with insect immunity Tamper reporting Utilizes multi zone spherical lens for Detection coverage 120o horizontal 105o vertical Detection range of about 12 m 40 ft Daylight immunity White ESI 4th Generation DragonflyEye Multi Zon...

Page 5: ...er is ES700IPD NOTE The images of batteries included in this User Guide are for illustration purposes only Only batteries thoroughly tested and approved by Essence should be used to meet the device s specifications A list of the approved batteries and their specifications is provided in Table 2 on page 22 ...

Page 6: ... view of main point of entry onto the premises A flat wall surface or a corner in a room A surface that is clean dry and smooth Within 700 m 2296 ft of the CP open air nominal A coverage area within view of the IPD detection angle and range Maximum detection angle of 105 horizontal 80 vertical Maximum detection range of 12 m 40 ft Optimum Height 2 1 m 6 9 ft to 2 3 m 7 5 ft above the floor Avoid i...

Page 7: ...Installation Preparation Care Home Indoor Photo Detector User Guide 7 Avoid wet hot and humid areas such as a bathroom Avoid facing sunlight or other light sources such as opposite a window ...

Page 8: ... Identify the location for mounting the IPD according to the criteria in section 2 2 on page 6 2 Clean the surface of the mounting location thoroughly Make sure the location is dry 3 Release the IPD mounting base by lifting the tab and pushing it forward as illustrated in Figure 2 below Figure 2 Release the Mounting Base NOTE Refer to the section Using Screws of Appendix A on page 25 for informati...

Page 9: ...ed on the right side of the front of the CP for five seconds to begin the pairing process to establish a communication channel between the IPD and the CP The pairing process adds the IPD to the Care Home system The CP beeps and the ring around the EMERGENCY button lights up in Blue with a circular movement effect 7 Open the battery compartment as illustrated in Figure 3 below Push the tab a Lift t...

Page 10: ...e following results If the pairing process is successful the CP beeps and the ring around the CP EMERGENCY button blinks Blue three times If the pairing process is not successful the CP beeps and the ring lights up Red for two seconds If the peripheral device is already paired the CP beeps and the ring lights up alternating between Blue and Red If no additional peripheral devices can be integrated...

Page 11: ...e test is used to determine the detection area of the IPD The Walk Test mode starts automatically after the IPD powers up such as When a new battery is inserted After adding and pairing a new IPD with the Care Home system This mode lasts 10 minutes During the Walk Test any motion detection is signaled by the LED on the IPD The IPD sends a notification of the motion detection event to the CP ...

Page 12: ...ce false detections by suppressing motion detections of small objects such as pets Figure 6 The Pet Immune Lens 4 1 Opening the IPD To open the IPD perform the following procedure Caution Perform this procedure with special care since the top part of the front panel is made of very thin plastic covering which might break if too much pressure is applied 1 If the device is already installed on the p...

Page 13: ...uit board and other parts of the device 4 2 Pet Immune Lens To install the Pet Immune Lens in the IPD perform the following procedure 1 Open the IPD as instructed in section 4 1 on page 12 2 Release the IPD outer lens from the front panel with a flat screwdriver by releasing the three latch tabs which hold the outer lens into place as shown in Figure 8 below Release the tabs as follows Push the si...

Page 14: ...lens is not released insert a dull thin object through the oval opening and gently push the outer lens and release it as illustrated in Figure 9 below Figure 9 Back Cover Oval Opening 4 Insert the pet immune lens into the opening for the lens in the IPD front panel The pet immune lens fits inside the opening of the IPD as illustrated in Figure 10 below Figure 10 Assembling the Pet Immune Lens ...

Page 15: ...IPD Lens Insertion The side and center latch tabs hold both lenses in place 7 Close the IPD according to the instructions in section 4 3 below 4 3 Closing the IPD To close the IPD perform the following procedure 1 Insert the tabs at the bottom end of the front panel into the inner square slots at the bottom end of the back cover as illustrated in Figure 12 below Figure 12 Align and Insert Tabs in ...

Page 16: ...Home Indoor Photo Detector User Guide 3 Attach the front panel to the back cover using the two screws 4 Insert the batteries 5 Return the IPD onto the mounting base such that the lens is pointing downward Figure 13 Align Holes for Screws ...

Page 17: ...ever motion is detected or a tamper event occurs 5 2 Notifications The IPD sends notifications to the CP for the following events A motion detection event The room temperature on the premises passes the configured temperature thresholds The battery charge for the IPD is low requiring replacement The tamper switch in the IPD is disturbed registering a tamper event Use the Care Home CMS software app...

Page 18: ...stalled on your Resident s premises 5 3 Supervision The IPD is a supervised device The IPD periodically transmits its status via an I m alive message to the CP The frequency of the reporting periods can be configured locally or remotely If after a pre defined time period the CP does not receive the I m alive message the CP sends a no communication report to the monitoring station ...

Page 19: ...lode if it is incorrectly installed Be careful to replace the battery only with the same or equivalent type recommended by the manufacturer Discard used batteries responsibly To replace the battery perform the following procedure 1 Remove the device from the mounting base as illustrated in Figure 15 below While pushing the tab at the bottom of the IPD towards the wall slide the IPD downwards off t...

Page 20: ...ternal tamper prevention mechanism No damage has occurred to the IPD 5 Insert the new batteries as illustrated in Figure 4 on page 10 NOTE To comply with the UL certification standards use GP International Limited batteries When the batteries are inserted the LED behind the lens lights up Red indicating that the IPD has powered up successfully 6 Close the battery compartment cover 7 Return the IPD...

Page 21: ... Dual element low noise Pyro Ceramic sensor RFI shielding Insect Immunity Sealed Optics Lens White ESI 4th Generation DragonflyEye Multi Zone spherical lens 12 m detection range 105 horizontal 80 vertical 102 zones 6 vertical beams Daylight Immunity Electrical Power Supply Three 1 5V AA Alkaline batteries manufactured by GP with a battery capacity of 2100 mAh Voltage and current ratings Batteries ...

Page 22: ... Automatic after power up 10 minutes Visual Indications 1 LED for detection tampering walk test etc Environmental RFI Protection Over 30 V m Operating Temperatures 0 49 C 32 120 2 F Storage Temperatures 20 60 C 4 F 140 F Physical Dimensions 123 x 60 x 60 mm L x W x D 4 84 x 2 36 x 2 36 in Weight 210 g incl battery 0 165 lb Color Glossy White Mounting Standard ESI wall mount Standard ESI 2 screws a...

Page 23: ...hod consider the following Installation with the mounting tape is more common The screws on the right side of the inside of the mounting base covering the punch out holes on the left side of the IPD are for tamper protection Installation with screws supports the device when installing on a difficult angle Using Mounting Tape Figure 19 below shows the double sided adhesive mounting tape on the back...

Page 24: ...Cover The IPD can be installed using mounting tape The mounting tape is approved for the following surfaces ABS Polycarbonate PC Aluminum Galvanized Steel Enameled Steel Stainless Steel Nickel Coated ABS PVC Glass Epoxy Ceramic PBT Glass with and without silane coating Acrylic Polyurethane paint Polyester Paint ...

Page 25: ... angle facing to the right On an angle facing to the left In a corner The thin plastic covering over the holes can be removed if necessary All the corner support holes are blocked by the mounting tape You can drill through the tape if needed Figure 19 Screw Locations in IPD Mounting Base Required Equipment Before beginning prepare the following equipment A drill with a standard appropriate bit Two...

Page 26: ... in Figure 2 on page 8 2 For wall mounting Use a flat screwdriver to remove the punch outs 1 and 2 as shown in Figure 21 above a Clean the surface where the IPD is to be installed b Place and hold the base on the desired mounting location and mark the drilling spots c Drill the holes d Insert two dowels if needed e Place the base over the dowels and screw in the two screws f 3 For corner mounting ...

Page 27: ... server side script engine for dynamically generated web pages CP An Essence Term Control Panel DIY Do It Yourself DMZ Demilitarized Zone In computer security a DMZ is a physical or logical sub network that contains and exposes an organization s external facing services to a larger and untrusted network usually the Internet The purpose of a DMZ is to add an additional layer of security to an organ...

Page 28: ...sing radio signals to transfer data from a tag attached to an object for automatic identification RIA Rich Internet Application Web application with many characteristics of desktop application software Typically delivered by way of a site specific browser a browser plug in an independent sandbox extensive use of JavaScript or a virtual machine RSU Remote Software Update SHA 1 Secure Hash Algorithm...

Page 29: ...ed set of methods and a network protocol to allow an end host to discover its public IP address if it is located behind a NAT STUN is used to permit NAT traversal for applications of real time voice video messaging and other interactive IP communications STUN is documented in RFC 5389 STUN is intended to be a tool to be used by other protocols such as ICE Telnet Telnet is a network protocol that a...

Page 30: ...tion digital rights management functionality contained in the Application 3 use the Application to access copy transfer or retransmit content in violation of any law or third party rights or 4 remove obscure or alter the Company s copyright notices trademarks logos or other proprietary rights notices affixed to or contained within or accessed in conjunction with or through the Application b USERNA...

Page 31: ...des and lock outs c The Application is designed to utilize your enabled cellular Device to access the System The Device will work only in areas where the cellular service has coverage and Company has no control over such coverage Company is authorized to record and maintain audio transmissions data and communications and shall be the exclusive owner of such property You are responsible for all per...

Page 32: ...ay present links in a format that enables us to keep track of whether these links have been followed Third Party Sites This Privacy Policy applies only to the Application functionality on the System or a Device under your control or on the Site The Site may include links and references to the websites of others or third party advertisers These other sites may place their own cookies or other files...

Page 33: ...ate upon activation Notwithstanding the forgoing Company shall not be responsible for loss of System connectivity or data due to cellular network disconnections The System must be used as intended and for no other purpose The System contains small particles and electricity wires and is not intended for use by children or anyone who is not capable of understanding the System s purpose and how to us...

Page 34: ...vices used for access are lost or accessed by others and Company shall have no liability for such third party unauthorized access 3 The System will work only in areas where the cellular service has coverage and Company has no control over such coverage Company is authorized to record and maintain data and shall be the exclusive owner of such property You are responsible for all permits and permit ...

Page 35: ...red and or photographed and or recorded without their knowledge and prior authorization 1 Security We are concerned with safeguarding your information We employ a variety of safety measures designed to protect your information from unauthorized access and disclosure However we cannot guarantee that your personal information or private communications will always remain private and secure 2 Internat...

Reviews: