How Does Motion Security Work?
The “sensors” used in motion security systems change state (move from on to off or closed to open). If the programmable controller is set (turned on or alarmed) a sensor “state change” is “recognized” by the programmable controller as a breach of the controlled area or an intrusion.
If an intrusion is “sensed,” the controller makes an automated phone call to a 3rd party monitoring services computer. The data that is transmitted from the programmable controller identifies the business location as well as what sensor (or zone) has caused the event (tripped the alarm). The third party monitoring service database is populated with a list of phone contacts – top to bottom in the order of call notification priority. When an “event” (alarm trip) occurs, a member of the 3rd party monitoring service staff places live phone calls (in order of priority) to the various entities on the list. This is how owners and law enforcement is notified of a security breach.
Are there problems with typical motion security systems?
If an intrusion is “sensed,” the controller makes an automated phone call to a 3rd party monitoring services computer. The data that is transmitted from the programmable controller identifies the business location as well as what sensor (or zone) has caused the event (tripped the alarm). The third party monitoring service database is populated with a list of phone contacts – top to bottom in the order of call notification priority. When an “event” (alarm trip) occurs, a member of the 3rd party monitoring service staff places live phone calls (in order of priority) to the various entities on the list. This is how owners and law enforcement is notified of a security breach.
Are there problems with typical motion security systems?
________________________________________________________________
HOME
MOTION SECURITY
BACK BUTTON to PREVIOUS PAGE
HOME
MOTION SECURITY
BACK BUTTON to PREVIOUS PAGE