8
General information
the various connections and first power-up. It also provides a table for the peripheral
addressing process and a quick guide indicating default parameters and values and how
to programme/change them directly from the keypad.
1-5-3
User's manual
The installer should read carefully through the user's manual (supplied with each
control panel). Once the system has been installed, you must ensure that the User's
Manual is available to the users for consultation, and that they fully understand how the
system works and are aware of all the functions, settings and procedures.
It is the installer's responsibility to inform the system users that, regardless of its
capabilities, an intrusion alarm system is not a substitute for the necessary precautions
building occupants must take to prevent intrusion.
1-6
Operator Qualifications
1-6-1
Installer
The installer is the person (or group of persons) who sets up and programs the entire
security system in accordance with the purchaser's requirements and in respect of the
safety and security regulation in force. As the only individual in contact with system
users, it is the installer's responsibility to instruct them on how to use the security
system properly.
Under normal circumstances, the installer is not allowed to arm/disarm the system
without previous authorization from the user. All the system partitions must be
disarmed before accessing the parameter programming phase.
The access code of the installer is a level 3 access code.
1-6-2
User
The users are the occupants of the building where this intrusion control panel is
installed. Only authorized users can access and operate the system.
Thanks to the extreme flexibility of the system, the most common operations can be
carried out without authorization. This operating method must be expressly requested
by the main user, as it considerably lowers the security level of the system and may
cause false alarms, accidental arm/disarm operations, etc.
A system access code can be associated with each user. The programming process
allows you to define the code hierarchy:
•
User
•
Manager
•
Master
The system codes can carry out, in accordance with their assigned level in the
system hierarchy (the "User" being the lowest level), the following operations on all
other codes that are inferior hierarchically:
•• enable/disable
•• change PIN
•• change the programming parameters
If the system programming complies with security grade 3 of EN 50131, some partition
arming or delete memory operations, requested from a keypad, may be authorized by
the entry of a level 3 code (installer code) as well as by a user code.
1-7
Access Levels
The normative defines the following system-access levels, regardless of system-access
limitations:
•
Level 1
- access by any person (e.g. passer-by)
•
Level 2
- user access
•
Level 3
- installer or maintenance operator access (authorized by user - level 2)
•
Level 4
- manufacturer access
1-8
Conventions – Glossary
In order to understand the terminology used in this manual and improve your
knowledge of this system and its operating procedures, read carefully through the
glossary (refer to
Appendix A, Technical terminology and Glossary
).The appendix
contains the definitions of technical terms commonly used in the field of security,
therefore, relevant to the SmartLiving system.