background image

End User License Agreement and Terms & Conditions 

 

 

34 

 

Care@Home™ Smoke Detector User Guide 

 

By downloading or using the Application or by entering the Site, you fully understand and unambiguously consent to the collection and processing of such information and to the terms of this Privacy Policy. 
If you do not agree to the terms of this Privacy Policy, you must not use the Application or Site. 

This Privacy Policy may be amended or updated from time to time. If we make any material changes to this Privacy Policy, Service Provider shall update you of these changes. Our website will reflect changes 
in the Privacy Policy as well and you are advised to consult this Privacy Policy regularly for any changes. 

 

_

Information Collection

Personally Identifiable Information 

In the course of using the Application, we might ask you to provide us with certain personally identifiable information that can be used to contact or identify you (“

Personal Information

”). Personal 

Information may include, but is not limited to, your name, country of residence, email address and website address. 

Non-Personally Identifiable Information 

When you use the Application (whether such use is performed on the System or a Device, on the Site or on a website of one of our partners or other third parties), we collect information regarding your use 
of the Application, and information that your browser sends whenever you visit a site or online service, including, without limitation, your computer's Internet Protocol (IP) address, browser type, the web 
page you were visiting before, and information for which you search. 

When you use a widget or any other tool offered by us, whether on the System or a Device, on the Site or on a third party website, including a website owned or operated by you, we may record data related 
to that activity, the deployment of the widget or tool, your location and any other account related data. 

Like many websites, we use “cookies” to collect information. A cookie is a small data file that we transfer to your computer's hard disk for record-keeping purposes. You can instruct your browser, by 
changing its options, to stop accepting cookies or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the 
Site or all functionality of the Application. 

We may present links in a format that enables us to keep track of whether these links have been followed

Third Party Sites 

This Privacy Policy applies only to the Application functionality on the System or a Device under your control, or on the Site. The Site may include links and references to the websites of others or third party 
advertisers. These other sites may place their own cookies or other files on your computer, collect data or solicit personal information from you. Other websites follow different rules regarding the use or 
disclosure of the Personal Information that you submit. We encourage you to read the privacy policies and other terms of the other websites. We do not review, approve, monitor, endorse, warrant, or make 
any representations with respect to such websites. In no event will we be responsible or liable, directly or indirectly, to anyone for any loss or damage arising from such sites, including without limitation for 
your use of such website and for any information submitted by you, or otherwise collected by such websites. 

 

 

1. Our Policy towards Children 

We do not knowingly collect personally identifiable information from children under the age of 18. If a parent or guardian becomes aware that his or her child has provided us with Personal Information 
without their consent, he or she should contact us at

 

[email protected]

. If we become aware that a child under 18 has provided us with Personal Information, we will delete such information from our 

files. 

2. Security 

We are concerned with safeguarding your information. We employ a variety of safety measures designed to protect your information from unauthorized access and disclosure. However, we cannot 
guarantee that your personal information or private communications will always remain private and secure. 

3. International Processing or Transfer 

Your information may be processed or transferred outside of your state, where the privacy laws may not be as protective as those in your jurisdiction. 

4. Disclosure 

We reserve the right to disclose any information obtained by us, including but not limited to Personal Information and Non Personally Identifiable Information, (i) if required by law or by any governmental 
authority; or (ii) in case of emergency; or (iii) to a successor entity in connection with a merger, acquisition, bankruptcy or sale of all or substantially all of our assets. 

5. Contacting Us 

If you have any concerns or questions about this Privacy Policy, please contact us at 

[email protected]

.

 

 

 

 

 

 

 

 

Copyright © 2015, Essence SmartCare Ltd., All rights reserved. 

 

 

 

 

 

 

 

 

 

Summary of Contents for Care@Home SK2

Page 1: ...Care Home Smoke Detector User Guide ESUGSC009 Version 1 0 September 2015...

Page 2: ...bove disclaimers exclusions or limitations may not apply to you By using the information contained herein you agree that the laws of the State of Israel without regard to principles of conflict of law...

Page 3: ...Installation Locations 9 3 Installation 11 3 1 Testing the SK2 15 4 Operation 16 4 1 Physical Attributes 16 4 2 Features 17 4 3 Indications 17 4 4 Stopping the Alarm 19 5 Maintenance 20 5 1 Replacing...

Page 4: ...ions with the Care Home Control Panel CP from a remote location Figure 1 Essence Smoke Detector The SK2 peripheral device model identification number is ES700SK2 NOTE The images of batteries included...

Page 5: ...al life of two years not provided NOTE To comply with the UL certification standards use GP International Ltd batteries 2 2 Location Recommendations As a fire prevention device there are standard loca...

Page 6: ...72A 72B 72C 72D and 72E for fire alarm requirements in buildings not defined as households 2 2 2 Acceptable Installation Locations For complete coverage smoke alarms should be installed in all rooms...

Page 7: ...s in a single floor residence with more than one sleep zone Figure 4 Multiple floor Residence Figure 4 above shows an example of locations for installing smoke alarms in a multiple floor residence wit...

Page 8: ...eiling no closer than 10 cm 4 in from any wall or corner If ceiling mounting is not possible and wall mounting is permitted by the local and state codes mount on a wall 10 15 cm 4 to 6 in from the cei...

Page 9: ...r choosing an installation location Avoid air streams that have combustion particles Combustion particles are by products of something that is burning A smoke alarm can sense combustion particles in n...

Page 10: ...vents air conditioners heaters or fans Fresh air vents and drafts can drive smoke away from smoke alarms Avoid dead air spaces near the top of a peaked roof or in the corners formed by ceilings and w...

Page 11: ...Remove the mounting bracket from the SK2 by rotating the bracket counter clockwise as in 2 Figure 5 below to release the bracket tabs Figure 5 Release the Mounting Bracket Attached to the SK2 Place t...

Page 12: ...o the ceiling or wall using the screws 7 WARNING Do not connect the SK2 to any other alarm or auxiliary device Connecting anything else to the SK2 prevents the proper operation of the alarm Press the...

Page 13: ...cessful the CP beeps and the ring around the CP EMERGENCY button blinks Blue three times If the pairing process is not successful the CP beeps and the ring lights up Red for two seconds If the periphe...

Page 14: ...Installation 14 Care Home Smoke Detector User Guide Figure 8 Align Slots Turn the SK2 clockwise on the bracket until you hear a click 13 Figure 9 Turn SK2 Clockwise to Install...

Page 15: ...ssful perform the following procedure Pull the smoke alarm downward to make sure it is securely attached to the mounting bracket 1 WARNING To prevent injury the SK2 must be securely attached to the ce...

Page 16: ...The alarm is real There is smoke A possible fire The alarm is false If the alarm is triggered by smoke from a non serious event such as smoke from cooking open a 2 window and fan the air to remove the...

Page 17: ...ows Power Green Fault Yellow Alarm Red 4 2 Features The following are the characteristics and features of the SK2 RF communications with the CP allows for SMS and e mail notifications The RF connectiv...

Page 18: ...alarm of 3 beeps a pause and then another 3 beeps Push the TEST MUTE button to suspend the alarm for five minutes When suspended the SK2 re assesses the smoke level If the smoke has not dissipated the...

Page 19: ...es smoke To dissipate the smoke do the following Open a window s in the room where the SK2 is installed Fan the air around the smoke alarm If the alarm persists clean the SK2 as described in section 5...

Page 20: ...ve the SK2 from the mounting base as illustrated in Figure 12 below turn the SK2 counter 1 clockwise until you hear a click The SK2 is freed from the bracket Figure 12 Open the Mounted SK2 for Mainten...

Page 21: ...ice specifications listed in Table 3 on page 25 The SK2 may not operate properly with any other kind of battery 5 2 Testing the SK2 Test the SK2 once a month or at any time the device appears not to b...

Page 22: ...ood working condition test the SK2 once a month and clean it once a year To clean the SK2 perform the following procedure To remove the SK2 from the mounting base as illustrated in Figure 12 on page 2...

Page 23: ...n the SK2 slots with the bracket tabs as illustrated in Figure 8 on page 14 and insert the 5 bracket tabs into the SK2 slots Turn the SK2 clockwise on the bracket until you hear a click 6 Test the SK2...

Page 24: ...e is computed according to ESI s standard usage parameters System Compatibility Care Home Wireless Bi directional End to End bi directional ESI protocol Modulation and Frequency FSK modulation 868 3 M...

Page 25: ...ashes rapidly 8 times Test fail The combination of the alarm and the LED indicate the specific problem Security and Safety Tamper Feature Loud continuous sound is triggered and the LED flashes continu...

Page 26: ...me or sparks Keep electrical appliances in good condition Do not overload electrical circuits Keep stoves fireplaces chimneys and barbecue grills grease free Make sure they are properly installed and...

Page 27: ...not stop to collect anything or to get dressed Feel the doors to see if they are hot If they are not hot open them carefully Do not open a door that is hot Use an alternate escape route Stay close to...

Page 28: ...waken individuals who are sound sleepers If the sound of the smoke alarm does not easily wake up children or other family members or if there are infants or family members with mobility limitations ma...

Page 29: ...er side script engine for dynamically generated web pages CP An Essence Term Control Panel DIY Do It Yourself DMZ Demilitarized Zone In computer security a DMZ is a physical or logical sub network tha...

Page 30: ...radio signals to transfer data from a tag attached to an object for automatic identification RIA Rich Internet Application Web application with many characteristics of desktop application software Ty...

Page 31: ...t of methods and a network protocol to allow an end host to discover its public IP address if it is located behind a NAT STUN is used to permit NAT traversal for applications of real time voice video...

Page 32: ...provided deployed or enforced by any functionality including without limitation digital rights management functionality contained in the Application 3 use the Application to access copy transfer or re...

Page 33: ...s and it is your responsibility to secure access to the system with pass codes and lock outs c The Application is designed to utilize your enabled cellular Device to access the System The Device will...

Page 34: ...esent links in a format that enables us to keep track of whether these links have been followed Third Party Sites This Privacy Policy applies only to the Application functionality on the System or a D...

Page 35: ...are solely responsible for providing communication pathways for the System to communicate upon activation Notwithstanding the forgoing Company shall not be responsible for loss of System connectivity...

Page 36: ...f service or down time of remote access caused by loss of Internet service or cellular used by you for the System and the access of the System You acknowledge that the System can be non functional or...

Page 37: ...y who enters your home and if said third party is a child or is under a legal guardian s responsibility their legal guardian that they may be monitored and or photographed and or recorded without thei...

Reviews: