Skip to content
View in the app

A better way to browse. Learn more.

Security Installer Community

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Intruder Alarm Routine Inspection

Featured Replies

This is what we use

Do you really do all those checks for every maintenance reidy? :fear:

Check bell delay(if programmed) and shut off times

on every maintenance?

I wonder how many check every tamper circuit/

:ninja:

Edited by steveo44

  • Replies 100
  • Views 39k
  • Created
  • Last Reply

Do you really do all those checks for every maintenance reidy? :fear:

Check bell delay(if programmed) and shut off times

on every maintenance?

I wonder how many check every tamper circuit/

:ninja:

That's the form we got from the NSI, so I guess that's what they think we should be doing

Hey Ho, Lets Go

just out of curiosity how many actually check tampers on all devices during a routine maintenance.

Never checked all tampers but more than often checked some. Bell delay done on full set check.

Why do you ask anyway?

Never checked all tampers but more than often checked some. Bell delay done on full set check.

Why do you ask anyway?

i asked because every maintenance sheet i have ever seen always has that on it.

if we were to check all tampers we wouldnt get as many calls done and im sure cause more problems then when we started

The same will bell cut off timers.

im sure the majority of engineers never test that feature and just rely on there judgement taking into account the age and condition of the bell in general.

Indeed, i just ping a random sensor. If you start opening all PIR's, that's a guaranteed call out later that night :whistle:

depends on size, complexity & risk.

tamper wise, tend to rotate selected each visit. using fsl is an advantage.

depends on size, complexity & risk.

tamper wise, tend to rotate selected each visit. using fsl is an advantage.

How is using fsl an advantage ?

the tamper could still be disconnected inside the detector can it not

How is using fsl an advantage ?

the tamper could still be disconnected inside the detector can it not

It could but it should have been checked on commissioning of the system and if its set up for engineer/anti code no one can open a device without you knowing.

  • 1 month later...

Archived

This topic is now archived and is closed to further replies.

Recently Browsing 0

  • No registered users viewing this page.

Important Information

By using this site, you agree to our Terms of Use.

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.