|  | The Alarm Triggering Process with  
				Conventional Alarm Services Step 1 – Alarm Triggered
				   After a building has been armed by the 
				customer, the sensors are also armed. A break-in occurs.  
				Once armed, a break in the circuit (i.e. door contact opening) 
				or motion detected triggers the alarm (ie. notifies the panel).
				
				 Step 2 – The Panel Calls the Monitoring Center  After the entry delay time, the panel 
				calls the center’s monitoring computer which will sound an alarm 
				and a human operator will acknowledge the trigger and take 
				responsibility.   Step 3 – Contact Customer’s Call List  The monitor will look up from the call 
				list or contact information and attempt to contact the user 
				through a telephone voice call. Police may be dispatched at the customer’s request, but possibly 
				to a  
				
				false alarm.
 Step 4 – Attend Location  Once the customer contact is located, 
				the customer or responder must actually physically attend the 
				location to verify if the break-in is real.   Step 5 – Verification  Once at the location, the customer can 
				visually determine if the alarm was Verified or False.
				
				 Step 6 - If Verified - Too Late!  By the time verification has occurred, 
				the thieves are gone with your property. |  |   | Monitored Location Equipment  The conventional alarm monitoring service is 
				comprised of an alarm panel, a keypad, and sensors located at 
				the customer’s location.    The heart of the conventional alarm system is 
				the panel. The panel contains a logic board that monitors the 
				system components. It is also the point where the system 
				connects to the alarm monitoring centre through a dial-up 
				telephone connection.    The alarm keypad is the human interface point 
				of the system. The keypad is used to program the panel and also 
				to Arm/Disarm the system by entering a user-defined code.    Sensors are located throughout the building 
				and connected back to the panel. There are two primary types of 
				sensors: Contact Switches and Motion Sensors. Contacts are 
				normally used to monitor doors and widows. When the two contacts 
				are separated (i.e. a door or window opening) a signal is sent 
				to the panel. Motion Detectors monitor a room for movement. When 
				motion is detected in view, a signal is sent to the panel.The panel will dial-up the monitoring station and announce that 
				a sensor has been triggered and the Customer Identifier of the 
				location the sensor was detected.
 The Problem with Verification  Verification of an alarm is the only way to 
				truly get an appropriate response to a real emergency. Up until 
				recently, verification was only possible by physical attendance 
				either by the owner or a private guard response service. The 
				single biggest issue with this is the time delay. If it takes 
				1/2 hour to verify, the probability of stopping a break-in is 
				virtually nil. The Bottom Line  Conventional alarm systems are slow, 
				ineffective and often lead to  
				
				false alarms! Conventional alarms systems charge a 
				high cost for only a false sense of security.   The SecurityLine system provides a faster and 
				more reliable method.   
				Click here to see how it 
				works. |