1 intrusion alarm technology local vs. monitoring

20
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING

Upload: ilene-flowers

Post on 22-Dec-2015

259 views

Category:

Documents


0 download

TRANSCRIPT

1

INTRUSION ALARM TECHNOLOGY

LOCAL VS. MONITORING

2

INTRUSION ALARM TECHNOLOGY

Local referrers to an intrusion system that is designed to alert only the occupants of a secured area or anyone within the hearing range of a bell, siren, light or voice warning.

A local system is designed to warn the occupants of an intruder and to scare off intruders.

3

INTRUSION ALARM TECHNOLOGY

One of the obvious disadvantages of a local system is that someone has to be present or within the vicinity if an alarm is tripped.

Another disadvantage is that an intruder can quickly gain access to a notification device such as a siren or bell and cut the wire before the alarm sounds.

Most systems are programmed for a 60 second entry/exit delay.

4

INTRUSION ALARM TECHNOLOGY

The siren or bell can be hidden with the wires installed in the walls to eliminate that disadvantage.

Consider though that today most people ignore alarms because of the frequency in which they occur.

False alarms can become expensive, depending on the town or city you can expect a $50.00 to $500.00 dollar fine, (the first false alarm is usually free).

5

INTRUSION ALARM TECHNOLOGY

A local system relies on neighbors to contact the police if the user is not present, so it is important that the notification devices are loud enough to alert surrounding homes.

6

INTRUSION ALARM TECHNOLOGY

Local systems should also include warning signs as an added deterrent to break ins.

7

INTRUSION ALARM TECHNOLOGY

A local intrusion alarm with GPRS (general packet radio service) allows the user to receive notification via a cell phone if an alarm or trouble alert is present.

8

INTRUSION ALARM TECHNOLOGY

These cellular apps allow a user to arm and disarm a security system remotely, arm/disarm a vehicle, receive alarm and status alerts and access event logs.

Most wireless systems provide the free security system app as part of their security solution.

By combining sensors for temperature control and lighting with the security system, users can have a complete home automation system.

9

INTRUSION ALARM TECHNOLOGY

Lights and temperature can also be controlled by the cell phone app.

These intrusion systems combined with CCTV (closed circuit TV) cameras can provide a complete local system that provides excellent protection and the ability to identify and prosecute intruders.

10

INTRUSION ALARM TECHNOLOGY

The CCTV cameras can also be viewed over a user’s cell phone, an alarm will alert the user of a break in, at which time the user can start downloading live video.

SECURITY APPS CAN ALLOW A USER TO CHECK ON PETS OR CHILDERN FROM ANYWHERE IN THE WORLD OVER A CELLULAR NETWORK.

11

INTRUSION ALARM TECHNOLOGY

Of course if a user has incorporated CCTV into a local system then the appropriate signage should also be clearly displayed.

12

INTRUSION ALARM TECHNOLOGY

Monitored alarm systems are connected to a monitoring service or designed to notify property owners, police or security personnel outside the secured area.

Based on this definition the cellular app connected to a local system provides a monitoring function.

13

INTRUSION ALARM TECHNOLOGY

It is widely understood that monitored systems are supervised by a remote central station that will respond to an alarm condition.

14

INTRUSION ALARM TECHNOLOGY

Monitored systems provide more protection than local systems and are less likely to be disabled before alerting the appropriate personnel.

Monitoring is usually done through a central station.

A central station is a location, normally run by private individuals or companies, at which operators monitor receiving equipment for incoming intrusion and security system signals.

15

INTRUSION ALARM TECHNOLOGY

The central station may be a part of the same company that sold and installed the intrusion system.

You may be familiar with ADT security, they provide electronic security systems and provide a monitoring service for a monthly fee.

The security system may be installed by an ADT installer or contracted to another company.

16

INTRUSION ALARM TECHNOLOGY

Certified central station systems are monitoring facilities that are constructed and operated according to a standard.

They are inspected by a listing agency to verify compliance.

17

INTRUSION ALARM TECHNOLOGY

Monitoring requires a communication link to a central station, this can be established over the internet, over a standard phone line or by a cellular link.

Monitoring services can range in price from $19.95 to $39.95, the national average is $29.95.

18

INTRUSION ALARM TECHNOLOGY

The central station operates 24 hours a day, 7 days a week to monitor all of it’s accounts.

Most people think that burglaries are committed in the evening, but Police and FBI records show that a majority of burglaries occur during the daytime when homeowners are away at work.

This makes a strong argument for a monitoring service.

19

INTRUSION ALARM TECHNOLOGY

Because of todays technology trends most people no longer have land lines so monitoring companies will also monitor through a wireless link.

The wireless link can provide a two communications link through a keypad so that the central station can speak directly to a user during an alarm condition until help arrives.

20

INTRUSION ALARM TECHNOLOGY

Central station monitoring can dispatch police, fire and medical personnel as needed.

MICROPHONE FOR TWO COMMUNICATIONS