Jump to content
Security Installer Community

Security Smart Phone App


lamplight73

Recommended Posts

Saw an app today from a major security co that, even though the system is armed by the end user, will still gain access to the the engineer mode. It will record in the local log that this has happened, if it is to an ARC it may well be configured to send an 'engineer on site' signal, but I feel uncomfortable that this is even possible. 

 

Is this normal and acceptable?

 

I fully understand that we, as professional companies, can gain access to remotely service a system even though it is armed, subscriber may well sign a document to accept this, but most of the time if UDL is required to actually go into engineer mode and change settings etc, they will have to acknowledge in some way that we are dialling in.

 

Potentially, somebody with the eng code could get into a system, disable all ccts, get someone to break in, then re- enable ccts. 

 

Most apps have clauses so they can see messages, phone calls, Facebook profiles, track info etc, so maybe traceable, but….

 

I remember a massive fuss being made over a certain Canadian panel having a 'management code' that would disarm the system even though the customer had set it.

 

This is taking it to a new level. Would the customer be happy if they new this was possible?

 

Surely, from a phone app, if the system is armed it shouldn't give access to the engineer?

 

Thoughts?

 

 

 

 

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.