
code IS assigned IS considered to be user #2. In some apphcations
(commercial installations for example), user #2 (with Master code) WN
be the main user of the system (see Application 1 on a following page)
In other applications [such as m an apartment complex, for example),
user f12(with Master code) may not be the aclual end user of the system
(see Application 2 on a following page).
Secondary security codes are assigned by user lf2 [with Master Code)
as follows
Master Code + CODE key + User # (03-15) + Secondary Code
The system wdl emd a single beep when each secondary code has been
successfully entered.
Note: When a secondary code is inadvertently repeated for different
users, or one user’s code is another’s duress code, the lower user
wdl take priority.
Indtwdual secondary security codes can be deleted by user M2 (with
Master Code) as follows.
Master Code + CODE key + User # (03-15) + Master Code
Note: All security codes, Master and secondary, permit access to the
system for arming, disarming, etc.
Secondary (Temporary) Security Codes:
As stated prewously, up to thwteen secondary codes can be assigned —
to users 3 through 15. The configuration in Application 1 shows that
secondary (or temporary) codes may be assigned by the primary user
(user #2) to as many as thirteen employees, each with a unique code
Note that user #3 can also assign secondary codes to users 4-14 if
required, but in the typical arrangement shown in Application 1, there
may never be a practical need for this. If so, the primary user (#2) can
elect to omit user #3 when assigning secondary codes
In the configuration shown in Application 2, user #3, who is the primary
user, may need to assign secondary (temporary) codes to maids, clean-
ing persons, etc. Since the system allows user #3 to assign secondary or
temporary codes to as many as eleven users (4-1 4), this need can be
met User #3 cannot assign (or delete) user #1 5’s code, which ISstrictly
under the control of user #2, who may be the building manager or owner
m the configuration shown in Application 2, See Table B, which illustrates
the various levels of authority that exist for security codes,
User H3 can assign secondary (temporary) codes for users, 4-14 as
follows’
User #3 Code + CODE key + User # (04-14) + Secondary Code
User #3 can delete secondary codes assigned to users 4-14 as follows:
User #3 code + CODE key+ User # (04-14) + User #3 Code
TABLE B. LEVELS OF AUTHORITY FOR SECURITY
CODES
User
Can assign or delete
No. Sacondary Code of User:
#1 (Installer) NONE
#2 #3 through #15
#3 #4 through #14
#4- Ff15 NONE
Komentarze do niniejszej Instrukcji