A zone that is permanently active twenty-four (24) hours a day (such as a fire zone).
Alternating current supplied from the plugged-in transformer.
A battery that is used in a wireless alarm device or security system control panel. Lithium alarm batteries typically last longer than alkaline alarm batteries.
A service provided by a central monitoring station, in which a security system is connected 24/7 to a central station operator.
Some cities and counties are requiring owners of alarm systems to register and or purchase a permit. This allows them to keep a list of emergency contacts in case they need to contact the owner of the alarm for any reason. Check with your jurisdiction to see what the requirements are. Also note that in some jurisdictions you must register the alarm even if it is not monitored. There may be a one time or annual fee.
The act of turning your security system on, so that it is ready to detect an alarm event.
A designation assigned to each user code that determines which specific functions can be assessed by that user.
This happens when you arm to the away mode but do not leave or open an exit door. The alarm is smart enough to know that you are still inside and will arm to Stay Mode (the motion detectors will not be live). This is a nice feature to avoid false alarms caused by walking in front of a motion detector.
Adding automated lighting to an alarm system is among the most popular and beneficial features. Linking your alarm system to automated lighting can make your home look lived in when you are away and can also activate lights in response to doors opening and cars arriving. Z-Wave wireless light bulbs, lamp and appliance modules can be installed by plugging then in. Automated wall switches require a licensed electrician for installation.
Programmed to activate different types of distress signals (Burglar, Fire, Holdup/Panic, Medical). Always work, regardless of whether or not the main security system is armed.
Arming your alarm in the Away Mode means that everyone has left the home. All doors, glassbreak and motion detectors are live during this mode. When returning home opening a delay door will cause warning beeps during the established entrance time to warn you to disarm the alarm. In our connected home we can also automate your wireless thermostats, lighting and door locks at the same time. Other upgrades can monitor the status of your garage door, watch for water leaks. Away mode can also be started from our free App remotely as needed.
A type of alarm battery that ensures your security system will continue to work after losing AC power. Back-up alarm batteries typically power a system for a 24-hour period.
To remove a zone from service by causing the security system to ignore a zone. Automatically removed when the security system is disarmed.
A call list is the list of contacts that a monitoring station should call in the event of an alarm activation or other event in the home. Once the first person on the list is reached it is then their responsibility to take action as needed. For example in the event of a real burglary they should await the police before entering the premises and may also be asked to contract the repair of a broken/forced door if the owner is away from home (vacation etc). The call list is an area that requires the alarm owner to keep the contact list current and add or edit contact information as changes occur.
A type of alarm verification in which a central station operator places one or more phone calls in an attempt to verify that a real alarm has occurred and not a false alarm. Typically the first call placed is to the alarmed premise, where the operator asks for a false alarm password if there is an answer. If there is no answer, depending on the local alarm dispatch procedures, the operator may try one or more additional phone numbers in an attempt to reach someone. Eventually without an answer, the operator will dispatch the authorities to the non-verified alarm. Local jurisdictions that utilize enhanced call verification (operator must place 2 phone calls before dispatching an alarm event) have found that it greatly reduces the number of false alarms.
A device that detects the presence of the toxic gas carbon monoxide, a colorless and odorless compound produced by incomplete combustion and lethal at high levels. If a high level of carbon monoxide is detected, the device sounds an alarm, giving people in the area a chance to ventilate the area or safely leave the building. Carbon monoxide is produced from incomplete combustion of fossil fuels. In the home, carbon monoxide can be formed by open flames, space heaters, blocked chimneys or running a car inside a garage. When an alarm sounds, action must be taken immediately. This may include evacuating the premise if experiencing carbon monoxide poisoning symptoms (confusion, headaches, nausea, dizziness, vomiting, etc), ventilation of the premises, and contacting professionals to inspect carbon monoxide emitting sources. If you suspect you have suffered carbon monoxide poisoning, go outside immediately and call an emergency number. At high levels, breathing carbon monoxide gas is fatal within minutes.
Cat-5 cable is a commonly used type of cable for use with internet or internet network wiring. Upgrades to Cat-6 and beyond are possible.
The use of a cell signal to communicate with the Central Monitoring station and or send notifications to users of connected home alarm and automation systems is now the dominant method. Communications using a cell signal do not mean that you must purchase another cell phone or cell line service / subscription. Instead this fee is most often a part of your monthly alarm fees, cloud fees or automated services. Additionally the cost of this kind of cell service is substantially lower that that of a cell phone.
A type of alarm communication path that uses the digital cellular network to send an alarm signal from the control panel to a central monitoring station’s cellular receivers. This type of alarm monitoring requires a digital cellular communicator hardwired into the security system and a cellular monitoring contract. The benefits of cellular monitoring are that no phone line is needed and there is no chance of a criminal cutting your alarm communication line as it is a wireless cellular signal. Cellular monitoring is one of the most reliable ways to monitor a security system.
A secure location where alarm signals are monitored by live central station operators 24/7. The term can also be used to refer to a company that provides services to monitor burglar, fire and medical alarm systems. The central monitoring station may also provide watchmen and supervisory services as well as runner service for fire alarms. Central monitoring stations use special telephone lines, computers, receivers and trained staff to monitor their customer’s security systems and call the appropriate authorities in the event an alarm signal is received. Because quality and experience can vary greatly among central stations, a prospective customer is advised to do research on different companies before making a final choice. Some central monitoring stations are certified by independent agencies. Underwriters Laboratories (UL) is a leader in inspection and certification of central stations. UL Standards 827 and 1981 must be adhered to in order to maintain a UL listed central station license. UL conducts annual audits of these licensed facilities to ensure compliance.
The central computer or “brains” of a security system. Every sensor on the security system reports back to the control panel with supervisory signals and alarm signals. A control panel can be connected with a central monitoring station by many different alarm communication paths making it a monitored security system. A control panel is normally installed in a laundry room, closet, or garage. For hardwired security systems, the control panel typically is located in a beige metal box. Inside the box are the system’s circuit board, power supply, and back-up battery. For wireless security systems, the control panel looks more like a standard keypad so that you can arm and disarm your security system right from the control panel.
Arming your alarm in the Day Mode means that people (or sometimes pets) are still in the home. In this mode the motion detectors are not live but doors and glassbreaks are live. In Stay mode one or more doors may have a delay to warn you that the alarm is armed. For example opening a delay door to get the paper would not set off the alarm immediately. Instead you would hear the entrance delay as a warning to disarm the alarm. In our connected home we can also automate your wireless thermostats, lighting and door locks at the same time. Other upgrades can monitor the status of your garage door, watch for water leaks. Day mode can also be started from our free App remotely as needed. Some systems may call this the STAY MODE.
Any alarm device that can be connected to a security system to provide notification of an alarm event to the control panel. Door/window contacts, motion detectors, glass break detectors, and smoke detectors are some of the most common detectors found on a security system.
A digital electronic device that provides a cellular connection between a security system and a central monitoring station. These communicators have built-in SIM cards and utilize existing wireless networks. A cellular communicator send alarm signals from the security system to the central monitoring station without the need for a POTS line. At the same time, cellular communication is much more reliable than phone line communication because there is no wire exposed and available for phone line tampering.
The act of turning your security system off, so that it will no longer detect an alarm event.
The act of calling in an alarm event to the proper authorities. Central station operators are the ones typically doing the dispatch.
A self-contained wireless security system that is so easy to install that you do not need a professional alarm technician to complete the installation.
With the recent advances in wireless security system technology, a professional hardwired installation is no longer needed. Because of this, the DIY security market has emerged, and it is expected to grow immensely in the following years as people attempt to save on price of a security system. With DIY security, you no longer have to pay for expensive alarm installations.
Consists of an alarm transmitter and a magnet. The transmitter should be installed on the door or window frame while the magnet should be installed on the door or window. Installing them in the opposite position would increase the chances of a broken alarm transmitter as the door may slam and rattle the sensitive circuit board. When the door or window is closed the magnet is aligned with the transmitter and the zone is closed. If the window or door is opened the magnet becomes unaligned and you have an open zone. When the security system is armed and a door/window contact has an open zone, an alarm signal is generated. Door/window contacts are considered perimeter protection and GeoArm recommends installing a door/window contact on every accessible door or window.
Wireless door locks can be installed on most residential grade doors and come in a variety of brands, models and colors. Except of some of the oldest Z-Wave models our Techhomepro is compatible with all known models available today. When used with our Hub notifications can be sent when users unlock the door. Changing user codes can be done locally or from our free App.
Replacing existing doorbell buttons with a doorbell camera is an excellent way to add a camera at the front door. Using your existing WiFi signal you can also answer the door from inside the home or from remote locations using your smart phone or tablet. The doorbell must have typical 2 wire doorbell wiring already installed.
When arming to the Away mode the exit time starts and then waits on you to exit through a door. Should you not exit through an outside door in time, the alarm will restart the exit time (doubling the exit time) and allow you one more chance to exit before arming to stay mode.
A four digit code chosen by the user and used to alert central station operators that an authorized person is under duress without alerting the intruder that emergency help has been requested. Duress alarms are treated as panic alarms and are dispatched upon immediately without the need for any type of alarm verification. If a criminal were to break in while you were home and demand that you disarm your security system, enter your duress code and the security system would act as if you did a normal disarm. However, the central monitoring station actually receives a duress code alarm.
Monitoring the activities and welfare of the elderly or those with medical conditions using our Techhomepro system has several advantages. For example when outside, bathroom or medicine cabinet doors are opened a notification can be sent to the caregiver. In the case of the bathroom and medicine cabinet doors you may also want to track how long it has been since the last time that door was opened. Bed mat switches and chair switches can also be used to know how long they have been in bed or sat still. There are many ways to keep track of the ones you love.
A built-in delay on any entry/exit zone of a security system. This delay gives you time to enter/exit your home or business after disarming/arming your security system to avoid setting off the alarm. Entry/exit delays can be anywhere from 15 seconds to 120 seconds in duration.
When you arm your alarm the Exit time warning begins warning you to leave the premises before the adjustable time has expired. Often the last few seconds before the exit time expires changes pitch to alert you that the exit time is almost used up. When you return home the Entrance time starts to beep warning you that you must disarm the alarm. These times can be adjustable to match your lifestyle. Also see “Auto Armed to Stay”
An alarm zone that protects the area(s) most frequently used to enter your property. For home security these zones usually protect garage doors, front doors, and/or back doors. For business security these zones usually protect the front door and back doors. A keypad is usually found in an entry/exit zone along with the alarm device protecting that zone. These zones are also typically programmed with an entry/exit delay.
The most widely installed Local Area Network (LAN) technology. Specified in a standard IEEE802.3.10/100 BASE-T, the most commonly installed Ethernet system, provides transmission speed up to 100 megabits per second. Security systems that have internet alarm monitoring capability require an Ethernet connection.
See Usync manual pages 45 & 96
A device which expands the capabilities of a security system. Typically refers to zone expanders which provide additional zones for a security system beyond the manufactured settings.
A weatherproof siren that can alert neighbors and emergency responders to a location where an intrusion has occurred. External sirens typically have a much higher decibel (dB) level than an indoor siren.
A phony report of an emergency causing unnecessary panic and response. False alarms waste public resources as emergency responders spend time and money responding to an incident that is not a real emergency.
A word, name, or number used by a security system owner to verify with the central monitoring station that an alarm was actually a false alarm. When central station operators are using enhanced call verification they will always call the premises after an alarm and ask the person who answers the phone for the false alarm password.
A term commonly used to address when a door or sensor is in the violated state. In other words an open door is considered FAULTED or NOT READY and a closed door is consider NOT FAULTED or READY. A motion detector is considered faulted when it see motion and not faulted when it does not see motion. Alarm systems normally expect all door and sensors to be NON FAULTED or READY before they will allow your arm your system. This feature forces you to close all doors before leaving.
A security system device consisting of an alarm transmitter and a probe that detects the presence of water. The transmitter can be hardwired or wireless and is typically mounted well above where water is expected so the transmitter’s circuitry is safe. The probe is then mounted a few inches of the ground so that the flood is detected as early as possible. Flood detectors are typically installed in basements, cellars, bathrooms, laundry rooms, and anywhere else where there’s potential for water damage.
To activate (arm) the alarm system in spite of the presence of faulted zones. If a faulted zone is secured during the armed period, that zone is automatically armed by the security system. For example if you want to leave a window cracked open a small amount you can set this zone (window) switch to be ignored when arming the system. Also see Bypass which is used to arm an alarm when a zone (door etc) is not working.
A security system device that sends an alarm when a preset low temperature is reached. Different from temperature sensors, freeze sensors are only able to detect abnormally low temperatures. Freeze sensors are most commonly used to monitor the ambient temperature of a room with water pipes to prevent the pipes from bursting. When the central monitoring station receives a freeze sensor alarm, the central station operator calls the client to inform them of the dangerous temperature range.
A garage door interface is used to monitor the status of your garage door. With our Techhomepro system you can also close the garage door remotely using our App or Web browsers.
A virtual perimeter for the real world. Using your WiFi, Bluetooth, or GPS radios, your Smart Home software can trigger events based on your physical location. For example, you can use a geofence to automatically turn off your lights when you leave for the day.
A security system device that detects the frequency of broken glass. A glassbreak detector has a highly sensitive microphone that can distinguish between different sound frequencies and recognize the exact frequency of broken glass, which if detected causes an alarm. GDBs along with motion detectors are devices used for interior protection to provide another layer of protection beyond perimeter protection. If you only had door/window contacts, then a criminal that breaks the glass without actually opening the door or window would go undetected. One GBD can usually protect every window in a room and should be mounted on the wall across from the windows it is meant to protect. GBDs are preferable over motion detectors when large animals live in the alarms premise, since they work while the security system is in stay mode without causing false alarms.
A security system that has alarm devices connected to a control panel by low-voltage wires. While equipment for hardwired security systems is less expensive than wireless equipment, installation and service of hardwired systems far outweighs the difference in upfront equipment costs. Because multiple devices are programmed into a hardwired zone, when one goes bad it is very hard to troubleshoot the problem. You would have to check the wire connection and the alarm transmitter for every device on that zone. With wireless security systems, each device is its own zone, so if a zone has a trouble you know exactly which device needs service.
A burglar alarm or fire alarm device that detects a preset high temperature or a rapid rate-of-rise (ROR) in temperature. Heat detectors can be either electrical or mechanical in operation. The most common types are thermocouple and electro-pneumatic, which both respond to changes in ambient temperature. If the ambient temperature rises above a predetermined threshold, then an alarm signal is triggered. Heat detectors are better than smoke detectors for areas where smoke would normally be found such as a kitchen or smoking lounge, as they would not cause false alarms.
A discrete security camera used to film people without letting them know they are under surveillance. The camera is “hidden” because it is either not visible to the subject being filmed, or is disguised as another object. Hidden cameras have become popular for household video surveillance, and can be built into common household objects such as smoke detectors, clock radios, motion detectors, ball caps, plants, and cell phones. Hidden cameras may also be used commercially as security cameras.
Adding a wireless temperature switch can be used to notify you of high outside or indoor temperatures. It can also be used to start ceiling fans or other methods to reduce temperatures.
Securing a home from burglaries, fires, or environmental hazards using security systems, alarm monitoring, video monitoring, and/or video surveillance.
A mode is a term used when a group of unrelated events are triggered at the same time. For example the Awake Mode can turn on lights, start your music, adjust your thermostat and disarm your alarm. Modes can be started on a schedule or from our free Techhomepro App or from a wide variety of human interfaces.
When discussing Smart Homes, the hub is the central device that allows all the different products (lights, locks, thermostats) to work together. Most hubs will also act like a universal remote, as well as providing the tools necessary to automate your devices.
Heating, Ventilation and Air Conditioning. In the connected home automating your HVAC system is most often done by simply installing an Automated Wireless Thermostat.
A type of alarm device detection most often found in motion detectors. Infrared detectors distinguish changes in electromagnetic radiation as opposed to normal light changes. LEDs used on security cameras often use infrared technology to emit more light.
A four digit code used to enter a security system’s programming menu. User codes and master codes are usually restricted to normal system functions, while an installer code has no restrictions. Some alarm installation companies will keep their installer code a secret so that no other company is able to takeover that security system.
Monitored security systems are eligible for the discount because insurance companies know that homes protected by a monitored security system are backed up by a live central monitoring station 24/7. Often this discount can be doubled when Fire protection is added. Should your current insurance company not offer discounts, shop around as this can often total up to 20% annually. For our monitored customers you can send us your contact information and we will send official proof of coverage.
A type of zone for a security system that is usually assigned to an entry area that one must pass upon entry (after faulting the entry/exit zone) to reach the keypad. It provides an instant alarm if the entry/exit zone is not violated first, and protects an area in the event an intruder has hidden on the premises before the system is armed, or gains access to the premises through an unprotected area. It causes a delayed alarm if the entry zone is faulted first and the user code is not entered in time; and causes an instant alarm in all other situations.
A type of business or home security that secures the premises by causing an alarm after an intruder has entered the location. Motion detectors and glassbreak detectors are the most common alarm devices used for interior protection. Interior protection is often used as an added layer of security beyond perimeter protection.
A type of alarm communication path that uses an Ethernet connection to send an alarm signal over the internet from the control panel to a central monitoring station’s IP receivers. This type of alarm monitoring requires an IP communicator hardwired into the security system and an internet monitoring contract. The benefits of internet monitoring are that no phone line is required and internet communication is inexpensive. Additionally, internet communication is fully supervised so the connection is constantly polled by the central station receiver and as soon as the connection is lost a trouble alarm occurs.
Is a data-oriented protocol used for communicating data across a packet switched inter-network. In the context of smart homes, IP means a device that can send information using a computer network or the internet. It is commonly used with cameras.
A unique 12 digit code that identifies a computer or device on an IP network. XXX.XXX.XXX.XXX is the format for IP address with each X a number between 0 and 255. IP networks use the IP address to forward messages between different devices on the network.
A type of smoke detection used in most smoke detectors as it is inexpensive and better at detecting smaller amounts of smoke produced by flaming fires. Smoke detectors using ionization detection use an ionization chamber and a source of ionizing radiation to detect smoke.
A nominated person who is able to operate the security system and has keys to the property. In the event of an alarm, the dispatched authorities will often request a key holder to meet them at the alarmed location so that they have access to investigate the alarm.
A keychain remote used to arm and disarm a security system with the touch of a button. Keyfob buttons can usually be programmed for many different functions such as system armings and disarmings, panic alarms, and X10 lighting. In apartments and condominiums where there are common areas that many different people need access to, a keyfob can also double as a proximity card that allows authorized access to restricted areas.
A keyholder is someone on the Call List of authorized parties to be reached in the event that your alarm goes into alarm. The keyholder is often expected to in the event that the owner is away to be able to take care of minor damages to doors/windows caused by forced entry. The Keyholder may also be asked by responding police for a key to the door. Alarm owners should keep this list current and be aware that one or all of the keyholders on their call list may be away from your home on vacation. If so, temporary additions can be made.
Used for operating a fire or burglar alarm system. Typically found at every entry area to an alarmed location, keypads often allow one touch arming and disarming as well as other system functionality. Some keypads are more advanced such as a talking keypad that speaks system status in plain English or a touch screen keypad that can be used to control home appliances. It is important that a keypad be able to provide system status on all zones so that when the system is armed the user is made aware of any zones that are in fault. For instance, if the back door was left open, the keypad should let the user know that the backdoor zone is in trouble when the user attempts to arm the system. If a keypad can not provide system status, you run the risk of arming your system with an open zone which would leave the security system vulnerable to unauthorized entry.
This term is normally used to indicate a child that returns home from school before parents return home from work. Our Techhomepro system offers a number of ways to monitor this activity. The most common is to receive a text or email with the time that the child’s alarm code was used to disarm the system. Once disarmed you can also monitor the opening of outside doors and indoor motion detectors to track the movement of the child in the home. Camera can also be used to check in.
Stands for Liquid Crystal Display and is a common type of keypad that features english language (or other languages) that can be used to operate the alarm and connected home system.
Remote arming station with light-emitting diode display. Allows limited access to security system functions.
Any type of security system or security system monitoring that is meant to protect one’s life instead
A semiconductor diode that emits light when an electric current is applied in the forward direction of the device. This effect is a form of electroluminescence. An LED is usually a small area source, often with extra optics added to the chip that shapes its radiation pattern. The color of the emitted light depends on the composition and condition of the semi-conducting material used, and can be infrared, visible, or near-ultraviolet. LEDs are used in the security industry to amplify lighting in a dark room so that security cameras are able to capture better quality pictures.
Using Z-Wave wireless communications installed Z-Wave light bulbs, lamp and appliance modules and wall switches can be used with house modes, alarm or occupancy events, and on schedules.
With older technology alarm installations that use a phone line to communicate with the Central Dispatching Station the incoming phone line should wire to the alarm panel first and then feed all house phones from that point using an RJ31X wiring jack. If wired correctly the alarm will HANG UP all in use house phones and dial the Central Station in the event of an alarm. Line seize wiring also often causes local phone company contractors to disable the alarm from dialing out by unhooking or bypassing the connection when doing service or installing new features. This problem is avoided with modern communication methods like our Cell radio.
A group of computers and associated devices that share a common communications line.
A burglar alarm system that is not connected to a central monitoring station. When an alarm signal is received by the control panel, the system sounds a local siren. While local security systems can be programmed to dial a number, it leaves the responsibility of contacting emergency response in the property owner’s hands. Oftentimes the owner will not be available to respond or to request response, which is why local security systems are not eligible for homeowner’s insurance discounts.
A battery operated, non-monitored smoke detector used for life safety reasons only. Building codes require a certain amount of local smoke detectors to ensure that occupants would be woken up and alerted to the threat of fire. Monitored smoke detectors go a step further by attempting to protect the property as well as the occupants. While a local smoke detector will only sound a local siren, a monitored smoke detector sounds a local siren and also sends an alarm signal to a central monitoring station so that the fire department is made aware of the fire. Monitored smoke detectors protect your property and your life, and can even get you a discount on your homeowner’s insurance.
Adding a wireless temperature switch can be used to notify you of low or freezing outside or indoor temperatures.
A four digit user code for a security system that has additional privileges such as being able to delete other user codes.
A life safety system consisting of an electronic device worn on a bracelet or necklace and a control panel that can auto dial telephone numbers or dial a central monitoring station when the device is activated by the user. Depending on the severity of the situation, alarm monitoring staff will summon friends, family, or emergency personnel.
The basic idea of alarm monitoring is to inform a key holder and local police, fire, or medical response that the security system has been activated. While a local security system is meant to be a deterrent, a monitored security system is meant to catch the criminal in the act and protect anyone that may be home during a robbery.
Monitored smoke detectors go a step further by attempting to protect the property as well as the occupants. While a local smoke detector will only sound a local siren, a monitored smoke detector sounds a local siren and also sends an alarm signal to a central monitoring station so that the fire department is made aware of the fire. Monitored smoke detectors protect your property and your life, and can even get you a discount on your homeowner’s insurance.
A security camera that is set to record based on the detection of motion. These cameras can either distinguish pixilation changes to begin the recording, or they can use built-in motion detectors to activate the recording.
An alarm device that uses passive infrared or microwave detection to detect motion in an alarmed premise. Some motion detectors are even more advanced utilizing dual technology detection or pet immunity. When your security motion is activated in stay mode, motion detectors are bypassed allowing you to walk freely through your alarm premises.
A telecommunications standard for transmitting messages that contain multimedia objects such as images, video, audio, or rich text. It is an extension of the SMS standard that allows for longer message lengths and is used most often in sending picture text messages.
Arming your alarm in the Night Mode means that people (or sometimes pets) are still in the home. In this mode the motion detectors are not live but doors and glassbreaks are live. In Night all outside doors are live when the alarm is armed. For example opening a delay door to get the paper would SET off the alarm immediately. In our connected home we can also automate your wireless thermostats, lighting and door locks at the same time. Other upgrades can monitor the status of your garage door, watch for water leaks. Away mode can also be started from our free App remotely as needed. Some systems may call this the STAY MODE.
A notification is one of the most powerful and popular features found in our Techhomepro system. Owners can determine what they want to be notified of and make changes at any time using the free App. Examples including getting texts or emails of alarm events, who unlocked the door, when the gun cabinet was opened or when the door to the wine cellar was opened. With our system you will be able to gain knowledge of a wide variety of the events in your connected home.
Using doors, motion detectors (inside and outside) and driveway sensors you can activate lights, thermostats, door locks and many other features commonly found in the connected home. Turning off lights not in use and timing off closet and hall lights are common ways to use occupancy sensing to save energy. Also see path of travel.
A type of alarm that is handled by a central monitoring station with an immediate priority dispatch. No call verification is needed when a panic alarm is received by a central station operator.
A device that when pressed, causes an alarm event regardless of whether or not the security system is armed or unarmed. Panic alarms can be programmed to cause a silent alarm or a normal audible alarm.
Segmented section of a security system. A user can setup partitions, so that one area of the alarmed location can be armed, while the other areas stay unarmed. For instance, an inventory room can be partitioned from the rest of the store so that while people are working, the main areas are unarmed and the inventory room stays armed.
An alarm device that measures infrared (IR) light radiating from objects in its field of view to sense motion and activate an alarm. Once the PIR motion detector is installed, it settles into a normal state with a normal temperature. Apparent motion is detected when an infrared source with another temperature, such as a human, passes in front of the PIR detector and changes the normal temperature causing an alarm.
With our Techhomepro system you can setup events that follow your lifestyle patterns. For example opening the garage entry door can turn on the lights in your mud room and also in the next room. In addition you could light the path you take at night take the dog for a walk. Then when returning home the act of closing the outside door can activate the lighting inside your home. Why wake up and walk through a dark room again. Let your Techhomepro system light your path of travel!
A type of security in which most or all doors and windows are protected with a door/window contact. The idea behind perimeter protection is that you detect a burglary as soon as possible. With interior protection you don’t receive an alarm until the intruder walks in front of an interior protection sensor. With perimeter protection you receive an alarm as soon as the entry point is violated and therefore secure a faster dispatch.
The ability of a motion detector to ignore animals of a certain size to reduce false alarms. Pet immunity is usually obtained by lowering the sensitivity of a motion detector so that a fairly large object would need to be present to trigger an alarm.
A type of alarm communication path that utilizes a POTS line to transmit alarm signals from the control panel to the central monitoring station. A standard phone line is required for this type of alarm communication. Phone line monitoring is susceptible to “line cut” tampering because all phone lines are exposed on the outside of your house.
Stands for Plain Old Telephone System. In the connected home a POTS has little use. However your cell phone, tablet or web browser now replaces the POTS.
In the event that an electronic device freezes up or loses internet connectivity power cycling the unit may be required to get it restarted. Since this is not a common occurrence you should be aware of where your backup battery is and also where the AC power transformer or plug in is located.
A device that supplies electrical energy to an output load or to a group of output loads.
The act of regularly inspecting a security system and its alarm devices to verify that all devices are working properly. Preventative maintenance ensures your security system will work when you need it most.
The act of setting up or changing the different settings of a security system.
Wireless alarm devices and control panels use RF to transmit alarm signals.
Heat detector that triggers an alarm when a certain change in temperature is registered in a predetermined small amount of time. (e.g. 15°change in a ten minute period)
A term commonly used to address when a door or sensor is in the violated state. In other words an open door is considered NOT READY or FAULTED and a closed door is consider READY or NOT FAULTED. A motion detector is considered not ready when it see motion and ready when it does not see motion. Alarm systems normally expect all door and sensors to be READY or NON FAULTED before they will allow your arm your system. This feature forces you to close all doors before leaving.
An electronic device that receives an alarm signal and retransmits it at a higher level, or onto the other side of an obstruction, so that the signal can cover longer distances without degradation. Repeaters are used to extend the range of a security system’s control panel so that you can have alarm devices further than the normal control panel range would allow.
With older technology alarm installations that use a phone line to communicate with the Central Dispatching Station the incoming phone line should wire to the alarm panel first and then feed all house phones from that point using an RJ31X wiring jack. If wired correctly the alarm will HANG UP all in use house phones and dial the Central Station in the event of an alarm. Line seize wiring also often causes local phone company contractors to disable the alarm from dialing out by unhooking or bypassing the connection when doing service or installing new features. This problem is avoided with modern communication methods like our Cell radio.
A device that provides IP address routing, network address translation, DHCP functions, firewall functions, and LAN connectivity similar to a network switch. If the router is wireless, it can also provide connectivity for all wireless alarm devices on the LAN.
A term used when creating a automated event. For example opening the front door can automatically turn on the front porch light during certain hours. There are also many other things that rules can create with a system that has If-Then or boolean logic capabilities like our Techhomepro System.
A run away alarm is the term used when a false alarm continually occurs over and over. Alarm system can be programmed to ignore certain alarms after a preset number of times. Central Monitoring Stations may also charge a fee for these types of false alarms.
A mode is a term used when a group of unrelated events are triggered at the same time. For example a Scene called the Awake Mode can turn on lights, start your music, adjust your thermostat and disarm your alarm. Modes can be started on a schedule or from our free Techhomepro App or from a wide variety of human interfaces. Scenes are the term used with our Techhomepro system when one trigger causes multiple actions.
A high quality video camera that is used for video verification monitoring or video surveillance.
A professional organization specializing in some aspect of security, whether it’s sales, installation, service, monitoring, or all of the above.
An electronic system that is designed to prevent theft or intrusion and protect property and life. Burglar alarm systems, access control systems, fire alarm systems, and video surveillance systems are all types of security systems.
Siamese Cable is a commonly used type of cable for use with some types of camera wiring. It normally includes two types of cable in one bundle. Coax and power cable are commonly found in Siamese cables.
An alarm that makes no audible noise. The control panel notifies central station operators of an alarm without setting off the security system sirens. Silent alarms are used when apprehension of an intruder is the main goal of the security system. Because there is no audible alarm at the alarmed location, the trespasser will have no idea that he or she tripped an alarm. The central station operators immediately dispatch the police who have a chance to arrive unexpectedly and catch the criminal in the act. Panic buttons are often programmed as silent alarms.
A security system device that emits a loud noise to scare away trespassers and alert nearby witnesses that an alarm event has occurred.
A device that detects smoke and issues an alarm to alert nearby people that there is a potential fire. A household smoke detector will typically be mounted on the ceiling or on a wall near the ceiling as smoke tends to rise. To avoid the nuisance of false alarms, most smoke detectors are mounted away from kitchens or anywhere else where smoke is commonly present without a real fire. To increase the chances of waking sleeping occupants, most homes have at least one smoke detector in every bedroom, as well as in the hallway outside a bedroom. Smoke detectors are usually powered by one or more alarm batteries but some can be connected directly to household wiring. Local smoke detectors are battery operated and meant only as life safety devices. Monitored smoke detectors are directly connected to a security system so that not only will they wake up any sleeping in the location, they will also alert a UL listed central station of a potential fire. If you would like to protect your property as well as your life it is important to have monitored smoke detectors and not just local battery operated smoke detectors. Whether you have wireless monitored smoke detectors or local battery operated smoke detectors it is usually necessary to replace the batteries once a year to ensure appropriate protection. Most smoke detectors work either by optical detection or by ionization detection, but some of them use both detection methods to increase sensitivity to smoke. Smoke detectors may operate alone, be interconnected to cause all detectors in an area to sound an alarm if one is triggered, or be integrated into a fire alarm or security system. Smoke detectors with flashing lights are available for the deaf or hearing impaired, although recent research suggests that their waking effectiveness is poor.
Arming your alarm in the Stay Mode means that people (or sometimes pets) are still in the home. In this mode the motion detectors are not live but doors and glassbreaks are live. In Stay mode one or more doors may have a delay to warn you that the alarm is armed. For example opening a delay door to get the paper would not set off the alarm immediately. Instead you would hear the entrance delay as a warning to disarm the alarm. In our connected home we can also automate your wireless thermostats, lighting and door locks at the same time. Other upgrades can monitor the status of your garage door, watch for water leaks. Stay mode can also be started from our free App remotely as needed. Some systems may call this the NIGHT MODE.
An alarm signal that monitors an alarm device or alarm control panel. Wireless security system control panels constantly send out requests to all the programmed devices on the system. When an alarm device does not respond, the control panel sends a supervisory signal to the central monitoring station detailing the device that needs service.
A swinger is the term used when a false alarm continually occurs over and over. Alarm system can be programmed to ignore certain alarms after a preset number of times. Central Monitoring Stations may also charge a fee for these types of false alarms. These false alarms are also referred to as RUNAWAY ALARMS.
An industry term that describes the process of reprogramming a monitored security system so that it dials a new central alarm monitoring station. Most alarm monitoring contracts typically carry term lengths (1, 3, 5 year terms) and once the contract is up, they are free to choose a new alarm monitoring company. The new company would then “takeover” their alarm system. If you are considering having another company takeover your alarm, make sure to give written notice of your intent to cancel to your current company so that the contract does not automatically renew.
A security system keypad that performs normal keypad functions, but also can speak system status and other event notices in plain English.
A tamper circuit is commonly used with higher quality alarm sensors, alarm panels and door / window contacts. It detects when the cover or is removed in an attempt to defeat the device. This circuit is found in our Techhompro products but rarely found in some of the other DIY system on the market today.
A security system device that sends an alarm when a preset temperature is reached or a rapid change in temperature occurs. Different from freeze sensors, temperature sensors are able to detect abnormally high temperatures as well as abnormally low temperatures. When the central monitoring station receives a temperature sensor alarm, the central station operator calls the client to inform them of the dangerous temperature range.
An automated thermostat is one of the most popular features and can reduce energy use when programmed to follow the patterns of the home owners. It may communicate using Wifi or Z-Wave wirelessly but still must be wired to the existing thermostat wiring. Automated thermostats can replace the vast majority of thermostats today. However some proprietary HVAC systems to exist that can not be automated by changing the thermostat.
A touchscreen is a popular human interface for the connected home. It can be dedicated to the Techhomepro system and or can be used as a tablet for web connectivity.
A device that plugs a security system into a standard AC wall outlet.
A signal sent from a security system control panel alerting the central monitoring station of faulty zones, devices, or low batteries. Trouble signals do not usually result in a dispatch, but instead a phone call to the client to make them aware of the trouble and arrange for a solution.
A common way to refer to a central monitoring station that has demonstrated the ability to provide monitoring service that complies with UL’s strict standards. UL requirements cover building structure, receiving and monitoring equipment, staffing issues, as well as installation and ongoing service. In order to be able to provide UL complying service, the building, equipment and staffing requirements have to be met at all times. However, the handling of specific signals from specific alarm systems is only audited by UL if a certificate is in effect for that alarm system.
A common way to refer to a central monitoring station that has demonstrated the ability to provide monitoring service that complies with UL’s strict standards. UL requirements cover building structure, receiving and monitoring equipment, staffing issues, as well as installation and ongoing service. In order to be able to provide UL complying service, the building, equipment and staffing requirements have to be met at all times. However, the handling of specific signals from specific alarm systems is only audited by UL if a certificate is in effect for that alarm system.
A four digit code used to arm and disarm a security system. Certain security systems allow for multiple user codes so that you can keep track of who armed or disarmed the system.
Our Techhomepro system can be used to both protect our home while away on vacation and also make your home look lived in with Z-Wave lighting while at the same time managing your energy and guarding against water leaks. Just before returning home you can use your free APP to adjust your thermostat to a comfortable level. The TechhomePro app is ready to support these and other upgrades to help you manage your property while you are away.
A wireless communications protocol designed for home automation. It is mainly used in the residential space to provide a simple yet reliable way to wirelessly control lighting, locks, HVAC, and window treatments. One of the main benefits of Z-wave is it runs on a type of network called a mesh network.
Z-Wave Network technology also enables all your home electronics to be controlled from a single wireless network. It’s easy to install with no complicated programming and no new cables to run, yet offers sophisticated control of your network. Any Z-Wave enabled device (from multiple manufacturers) can be added to the network, and many non-Z-Wave devices can be made compatible by plugging them into a Z-Wave accessory module.
Further information is available in our Resources section.
Provide additional zones for a security system beyond what the control panel has as default.
Each device on a wireless security system is its own zone. On hardwired security systems you may have many similar devices on one zone. For instance, every window contact in the living room may be programmed on the same zone. Zones are used to identify which alarm device triggered the alarm event to occur, so that the central station operators can provide location information to the responding authorities.
A security system that uses no wires. Each alarm device reports back to the control panel using a RF wireless signal.
See Cellular Alarm Monitoring
A connection between alarm devices that does not use wires. Most wireless connections between system devices use RF wireless signals while wireless connections between security systems and central monitoring stations use cellular signals.
WiFi is the most common protocol used in smart home devices. This is largely because many consumers already have a central hub (their WiFi router) for WiFi enabled devices. WiFi is able to provide high bandwidth for devices that send a lot of data (IP Cameras) but it uses too much power for most battery powered devices.
Is a computer network that covers a broad area (any network whose communication links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links. Contrast with personal area networks (PAN’s), local area networks (LAN’s), campus area networks (CAN’s), or metropolitan area networks (MAN’s) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet.
Water Detector: See Flood Detector:
A type of security that uses a digital video recorder (DVR) as well as security cameras to monitor a location. Video data is stored on the DVR and can be retrieved in the event of an intrusion or other emergency. Most video surveillance systems give the user the ability to look in live to their property over an active internet connection allowing them to monitor the site from anywhere. A video surveillance system can be used as a management tool as well as a security system.
Monday – Saturday : 8am -6pm EST
customersupport@techhomepro.com