background image

End User License Agreement and Terms & Conditions 

 

 

32 

 

Care@Home™ Smoke Detector User Guide 

 

Appendix C

 

End User License Agreement and Terms & 
Conditions 

 

BY USING THE APPLICATION AND/OR THE SOFTWARE, YOU INDICATE YOUR AGREEMENT WITH THE FOLLOWING TERMS AND CONDITIONS. IF YOU DO 
NOT AGREE WITH THE END USER LICENSE AGREEMENT and THE TERMS AND CONDITIONS, (hereinafter called the “

Terms and Conditions

”), DO NOT 

USE THE APPLICATION AND/OR THE SOFTWARE. 

_

Definitions

_

 

The following terms will have the meaning ascribed to them in this Terms and Conditions:

 

The Company

”: Essence SmartCare Ltd. 

The System

”: related social alarm product(s) and monitoring applications, products and solutions for home or any control systems or any part thereof. 

Device

”: A mobile phone, personal computer, tablet or any other device or any other application interface that you own and/or use and/or hold and/or control, which may enable access to third parties 

services and applications. 

Service Provider

”: the entity (not being the Company) that provides services and/or call-center services and/or other services through the System and enables you to use the Application. 

Monitored Party

”: the third party whose activities of daily living are being monitored. 

The Company provides a user interface application (including any updates and/or upgrades and/or patches thereto) subject always to the terms hereto for monitoring and/or controlling the System via 
your Device(s) (hereinafter, respectively, the “

Application

”). By downloading the Application, installing or using the Application or any part thereof, you irrevocably agree to the following terms and 

conditions in this 

Terms and Conditions

Certain information about you or otherwise is subject to the Privacy Policy; for more information, see the full Privacy Policy at 

ADDENDUM A

_

Article I – SCOPE OF USE

a. The Company grants you non-exclusive, non-transferable, non-sub-licensable, non-assignable, limited right to use the Application solely and exclusively for your personal use via your Device(s) license for 
the intended purpose of monitoring the consenting Monitored Party for a limited time period as specified herein below (the “

License

”). For the avoidance of doubt, the License allows you to install and use 

the Application on several Devices provided that such are owned at all times solely by you; 

b. You agree that you shall be solely responsible for (and that the Company has no responsibility to you or to any third party) the use of the Application, for any breach of the obligations under the Terms 
and Conditions, and for the consequences (including any loss or damage which the Company and/or you and/or any third party may suffer and/or incur) as a result of any such breach. 

c. As a condition to using the Application, you agree that certain updates, upgrades and/or patches to the Application may be automatically received and installed on your Device(s) from time to time. 

d. As a condition to using the Application, you agree that you will receive certain messages from the Company and/or the Service Provider and/or the System , including notifications sent from the System 
to your Device(s); modifications, improvements and patches of the Application; information with respect to the Company's other products; personalized information, including advertisements, from third 
parties, unless you elect not to receive such third party contents (“

opt out

”); and such other messages as the Company believes may be to your benefit or interest from time to time. 

_

Article II – PROPRIETARY RIGHTS

a. You hereby agree and acknowledge that (a) the Application contains Intellectual Property Rights as well as other proprietary and confidential information that is protected by applicable intellectual property and 
other laws, and (b) The Company owns all rights, title and interest in and to the Application and content, including without limitation upgrade, modification thereto including without limitation all Intellectual 
Property Rights therein and thereto. “

Intellectual Property Rights

” means any and all rights existing from time to time under patent law, copyright law, trade secret law, trademark law, unfair competition law, and 

any and all other proprietary rights, and any and all applications, renewals, extensions and restorations thereof, now or hereafter in force and effect worldwide. You agree that you will not, and will not allow any 
third party to, (1) copy, sell, license, distribute, transfer, modify, adapt, translate, prepare derivative works from, decompile, reverse engineer, disassemble or otherwise attempt to derive source code from the 
Application or content that may be presented or accessed through the Application  for any purpose, without the express written consent of the Company, (2) take any action to circumvent or defeat the security 
or content usage rules provided, deployed or enforced by any functionality (including without limitation digital rights management functionality) contained in the Application , (3) use the Application  to access, 
copy, transfer or retransmit content in violation of any law or third party rights, or (4) remove, obscure, or alter the Company's copyright notices, trademarks, logos or other proprietary rights notices affixed to or 
contained within or accessed in conjunction with or through the Application. 

b. USERNAME AND PASSWORD: In order to access and use the Application you must obtain a valid username and password. You are solely responsible for maintaining the confidentiality of your username and 
password. For security reasons and to avoid unauthorized access, you are required to logout in an orderly manner from the Application at the end of each session. In any case, the Company shall not be liable for 
any damage or loss of any kind or nature incurred and/or suffered by you and/or by any third party as a result of the Application being accessed and/or used by unauthorized user/s. 

c. TERMINATION: The License is effective until terminated by the Company for any reason whatsoever (including without limitation in case that the agreement between the Company and the Service Provider 
expires or terminates for any reason), and will terminate automatically without notice from   the Company if you fail to comply with any Terms and Conditions; in any such event the Company may block you from 
using and/or accessing the Application and you shall not have any claim against the Company in connection with such restriction. 

_

Article III – DISCLAIMER OF WARRANTIES

_

 

a. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT USE OF THE APPLICATION IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND 
EFFORT IS WITH YOU. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE APPLICATION  IS PROVIDED “

AS IS

” AND “

AS AVAILABLE

”, WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY 

KIND, AND THE COMPANY HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS WITH RESPECT TO THE APPLICATION , EITHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, 
THE IMPLIED WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY, OF SATISFACTORY QUALITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF  ACCURACY, OF QUIET ENJOYMENT, AND NON-
INFRINGEMENT OF THIRD PARTY RIGHTS. THE COMPANY DOES NOT WARRANT AGAINST INTERFERENCE WITH YOUR ENJOYMENT OF THE APPLICATION, THAT THE FUNCTIONS CONTAINED IN, OR 
PERFORMED OR PROVIDED BY THE APPLICATION WILL MEET YOUR REQUIREMENTS, THAT THE OPERATION OF THE APPLICATION WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT DEFECTS IN THE 
APPLICATION WILL BE CORRECTED. THE COMPANY DOES NOT WARRANT THAT THE APPLICATION SHALL BE COMPATIBLE WITH EACH WEB BROWSER (AND EACH VERSION THEREOF) AND YOU ARE 
SOLELY RESPONSIBLE FOR OBTAINING A BROWSER SUPPORTING THE APPLICATION FROM YOUR APPLICABLE PROVIDER. USAGE OF THE APPLICATION MAY REQUIRE DOWNLOADING AND INSTALLING A 
THIRD PARTY SOFTWARE (E.G., PDF VIEWER APPLICATION) AND YOU ARE SOLELY RESPONSIBLE FOR OBTAINING SUCH THIRD PARTY SOFTWARE, WITH COMPANY ASSUMING NO LIABILITY WHATSOEVER 
IN CONNECTION WITH SUCH SOFTWARE INCLUDING ITS AVAILABILITY (OR LACK THEREOF), PERFORMANCE, COST, OR ANY RESULTS CAUSED BY THE OPERATION OF SUCH SOFTWARE. NO ORAL OR 
WRITTEN INFORMATION OR ADVICE GIVEN BY THE COMPANY OR ITS AUTHORIZED REPRESENTATIVE SHALL CREATE A WARRANTY, OTHER THAN SUCH AS EXPLICITLY SET FORTH IN WRITING IN THESE 
TERMS AND CONDITIONS. SHOULD THE APPLICATION PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 

b. YOU ARE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR DEVICE(S), OR LOSS OF DATA THAT RESULTS FROM USING THE APPLICATION. 

c. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY THAT SOME OR ALL OF THE INFORMATION SENT VIA THE APPLICATION WILL BE 
SENT AND/OR REACH THE INTENDED RECIPIENT AND/OR NOT BE SENT AND/OR NOT REACH OTHER THIRD PARTIES, IN WHICH CASE THE COMPANY WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR 
LOSS OF ANY KIND OR NATURE INCURRED AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF. 

d. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY THAT THE APPLICATION WILL SUCCESSFULLY PROVIDE NOTICES TO YOUR DEVICE 
OR TO YOUR SERVICE PROVIDER, NOR THAT THE SYSTEM AND/OR ANY PART OF THE SYSTEM WILL SUCCESSFULLY TRIGGER NOTICES OR OTHERWISE WILL CONFORM OR OPERATE, IN WHICH CASE THE 
COMPANY WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR LOSS OF ANY KIND OR NATURE INCURRED AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF. 

e. YOU EXPRESSLY DECLARE: THAT YOU HAVE RECEIVED THE MONITORED PARTY’S PRIOR WRITTEN CONSENT TO VIEW AND/OR MONITOR THE SYSTEM INFORMATION AS DEFINED HEREIN; THAT YOU 
WILL TREAT THE SYSTEM INFORMATION WITH THE UPMOST DISCRETION; AND, THAT YOU WILL NOT STORE AND/OR SHARE AND/OR PUBLISH THE SYSTEM INFORMATION OR ANY PART THEREOF. YOU 

Содержание Care@Home SK2

Страница 1: ...Care Home Smoke Detector User Guide ESUGSC009 Version 1 0 September 2015...

Страница 2: ...bove disclaimers exclusions or limitations may not apply to you By using the information contained herein you agree that the laws of the State of Israel without regard to principles of conflict of law...

Страница 3: ...Installation Locations 9 3 Installation 11 3 1 Testing the SK2 15 4 Operation 16 4 1 Physical Attributes 16 4 2 Features 17 4 3 Indications 17 4 4 Stopping the Alarm 19 5 Maintenance 20 5 1 Replacing...

Страница 4: ...ions with the Care Home Control Panel CP from a remote location Figure 1 Essence Smoke Detector The SK2 peripheral device model identification number is ES700SK2 NOTE The images of batteries included...

Страница 5: ...al life of two years not provided NOTE To comply with the UL certification standards use GP International Ltd batteries 2 2 Location Recommendations As a fire prevention device there are standard loca...

Страница 6: ...72A 72B 72C 72D and 72E for fire alarm requirements in buildings not defined as households 2 2 2 Acceptable Installation Locations For complete coverage smoke alarms should be installed in all rooms...

Страница 7: ...s in a single floor residence with more than one sleep zone Figure 4 Multiple floor Residence Figure 4 above shows an example of locations for installing smoke alarms in a multiple floor residence wit...

Страница 8: ...eiling no closer than 10 cm 4 in from any wall or corner If ceiling mounting is not possible and wall mounting is permitted by the local and state codes mount on a wall 10 15 cm 4 to 6 in from the cei...

Страница 9: ...r choosing an installation location Avoid air streams that have combustion particles Combustion particles are by products of something that is burning A smoke alarm can sense combustion particles in n...

Страница 10: ...vents air conditioners heaters or fans Fresh air vents and drafts can drive smoke away from smoke alarms Avoid dead air spaces near the top of a peaked roof or in the corners formed by ceilings and w...

Страница 11: ...Remove the mounting bracket from the SK2 by rotating the bracket counter clockwise as in 2 Figure 5 below to release the bracket tabs Figure 5 Release the Mounting Bracket Attached to the SK2 Place t...

Страница 12: ...o the ceiling or wall using the screws 7 WARNING Do not connect the SK2 to any other alarm or auxiliary device Connecting anything else to the SK2 prevents the proper operation of the alarm Press the...

Страница 13: ...cessful the CP beeps and the ring around the CP EMERGENCY button blinks Blue three times If the pairing process is not successful the CP beeps and the ring lights up Red for two seconds If the periphe...

Страница 14: ...Installation 14 Care Home Smoke Detector User Guide Figure 8 Align Slots Turn the SK2 clockwise on the bracket until you hear a click 13 Figure 9 Turn SK2 Clockwise to Install...

Страница 15: ...ssful perform the following procedure Pull the smoke alarm downward to make sure it is securely attached to the mounting bracket 1 WARNING To prevent injury the SK2 must be securely attached to the ce...

Страница 16: ...The alarm is real There is smoke A possible fire The alarm is false If the alarm is triggered by smoke from a non serious event such as smoke from cooking open a 2 window and fan the air to remove the...

Страница 17: ...ows Power Green Fault Yellow Alarm Red 4 2 Features The following are the characteristics and features of the SK2 RF communications with the CP allows for SMS and e mail notifications The RF connectiv...

Страница 18: ...alarm of 3 beeps a pause and then another 3 beeps Push the TEST MUTE button to suspend the alarm for five minutes When suspended the SK2 re assesses the smoke level If the smoke has not dissipated the...

Страница 19: ...es smoke To dissipate the smoke do the following Open a window s in the room where the SK2 is installed Fan the air around the smoke alarm If the alarm persists clean the SK2 as described in section 5...

Страница 20: ...ve the SK2 from the mounting base as illustrated in Figure 12 below turn the SK2 counter 1 clockwise until you hear a click The SK2 is freed from the bracket Figure 12 Open the Mounted SK2 for Mainten...

Страница 21: ...ice specifications listed in Table 3 on page 25 The SK2 may not operate properly with any other kind of battery 5 2 Testing the SK2 Test the SK2 once a month or at any time the device appears not to b...

Страница 22: ...ood working condition test the SK2 once a month and clean it once a year To clean the SK2 perform the following procedure To remove the SK2 from the mounting base as illustrated in Figure 12 on page 2...

Страница 23: ...n the SK2 slots with the bracket tabs as illustrated in Figure 8 on page 14 and insert the 5 bracket tabs into the SK2 slots Turn the SK2 clockwise on the bracket until you hear a click 6 Test the SK2...

Страница 24: ...e is computed according to ESI s standard usage parameters System Compatibility Care Home Wireless Bi directional End to End bi directional ESI protocol Modulation and Frequency FSK modulation 868 3 M...

Страница 25: ...ashes rapidly 8 times Test fail The combination of the alarm and the LED indicate the specific problem Security and Safety Tamper Feature Loud continuous sound is triggered and the LED flashes continu...

Страница 26: ...me or sparks Keep electrical appliances in good condition Do not overload electrical circuits Keep stoves fireplaces chimneys and barbecue grills grease free Make sure they are properly installed and...

Страница 27: ...not stop to collect anything or to get dressed Feel the doors to see if they are hot If they are not hot open them carefully Do not open a door that is hot Use an alternate escape route Stay close to...

Страница 28: ...waken individuals who are sound sleepers If the sound of the smoke alarm does not easily wake up children or other family members or if there are infants or family members with mobility limitations ma...

Страница 29: ...er side script engine for dynamically generated web pages CP An Essence Term Control Panel DIY Do It Yourself DMZ Demilitarized Zone In computer security a DMZ is a physical or logical sub network tha...

Страница 30: ...radio signals to transfer data from a tag attached to an object for automatic identification RIA Rich Internet Application Web application with many characteristics of desktop application software Ty...

Страница 31: ...t of methods and a network protocol to allow an end host to discover its public IP address if it is located behind a NAT STUN is used to permit NAT traversal for applications of real time voice video...

Страница 32: ...provided deployed or enforced by any functionality including without limitation digital rights management functionality contained in the Application 3 use the Application to access copy transfer or re...

Страница 33: ...s and it is your responsibility to secure access to the system with pass codes and lock outs c The Application is designed to utilize your enabled cellular Device to access the System The Device will...

Страница 34: ...esent links in a format that enables us to keep track of whether these links have been followed Third Party Sites This Privacy Policy applies only to the Application functionality on the System or a D...

Страница 35: ...are solely responsible for providing communication pathways for the System to communicate upon activation Notwithstanding the forgoing Company shall not be responsible for loss of System connectivity...

Страница 36: ...f service or down time of remote access caused by loss of Internet service or cellular used by you for the System and the access of the System You acknowledge that the System can be non functional or...

Страница 37: ...y who enters your home and if said third party is a child or is under a legal guardian s responsibility their legal guardian that they may be monitored and or photographed and or recorded without thei...

Отзывы: