EasyManua.ls Logo

Checkpoint CLASSIC Series - User Manual

Checkpoint CLASSIC Series
40 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
ElectronicArticleSurveillance
NorthAmericaUsersGuide
Copyright
C
2014.CheckpointSystems,Inc.
CheckpointSystems,Inc.
ElectronicArticleSurveillance
UsersGuide

Questions and Answers

Summary

Important Information to our Users in North America

FCC Regulatory Compliance Statement

Details FCC compliance for Class A digital devices and RF exposure limits.

Equipment Safety Compliance Statement

States compliance with safety standards like UL 60950-1 and CSA C22.2.

Industry Canada Regulatory Compliance Statement

Outlines Industry Canada compliance for radio transmitters and antenna gain.

Important Information to our Users in Europe

CE Regulatory Compliance Statement

Covers CE conformity with R&TTE, EMC, and Low Voltage directives.

RoHS Compliance Statement

Explains compliance with the directive restricting hazardous substances in electronics.

WEEE Compliance Statement

REACH Compliance Statement

Discusses compliance with the European REACH regulation for chemicals.

Packaging Compliance Statement

Details compliance regarding hazardous substances in packaging materials.

Introduction

Behind the Technology

Explains how Checkpoint's EAS systems use radio frequency waves for detection.

System Basics

Equipment Care Dos and Donts

EAS Antennas

EAS Digital Antennas

Troubleshooting guide

EVOLVE 360 RF - Pulse Listen

Provides steps for diagnosing issues when the antenna does not alarm.

Hard Tag Application

General Guidelines

Offers advice on applying hard tags for maximum deterrence and security.

Tagging Procedures - Hard Tags

Step-by-step visual guide on how to correctly attach hard tags to merchandise.

Where to Apply Hard Tags

Specifies recommended locations for applying hard tags on different types of apparel and accessories.

Hard Tagging Dos and Donts

Lists best practices and common mistakes to avoid when applying hard tags.

Hard Tag Removal

Labels

General Guidelines

Provides instructions for applying EAS labels smoothly and effectively on products.

Where to Apply Labels

Guides on optimal placement of clear and white labels on various product types.

Paper Label Dos and Donts

Offers crucial advice on applying paper labels correctly to avoid issues.

Source Tagging

Soft Label Deactivation

Omni Verifier

Deactivation

USE OF VERIFIER UNITS

Explains how portable verifiers detect if EAS security tags are ON or OFF.

TIPS FOR INSTALLED PADS

Advises on placement and usage of deactivator pads to ensure proper function.

TIPS FOR WAND DEACTIVATORS

Guides on using handheld wands for deactivating items without removal from shopping carts.

Counterpoint Intelligent Deactivator-RF (CPID-RF)

Introduction

Introduces the CPID-RF as a future-ready POS solution for deactivation and detection.

CPID-RF Training

Highlights benefits for new employees and how managers can train them on tag verification.

Using CPID-RF

Details basic operation, integration with POS, and supported methods like interlocks.

Counterpoint Intelligent Deactivator-RF (CPID-RF) Settings

Apply User-Selected Settings

Explains how to configure system features and performance using DIP switches and reset.

SYSTEM SETTINGS

Covers access to DIP switches for adjusting mode, power, and gain.

Operation Modes

Describes global system settings configuring deactivation, detection, or verification.

OTHER USER CONTROLS

Details controls like reset button, mode changes, sensitivity, status LEDs, and volume.

Counterpoint Intelligent Deactivator-RF (CPID-RF) Troubleshooting

Testing Procedures

EAS Pedestals

Recommends daily testing of pedestals using a test tag for confidence.

Omni Verifier

Guides on testing the Omni Verifier for deactivation field presence.

Troubleshooting

Phantom Alarms

Offers suggestions for diagnosing and resolving false alarms caused by interference.

Counterpoint Deactivation Units

Provides troubleshooting steps for deactivation units, OMNI, and DV1000 devices.

Possible Alarm Causes

Lists common scenarios that can lead to false alarms and suggests remedies.

A Guide to Handling Alarm Activations

Alarm Activation Log

Recording Alarms

Emphasizes keeping a written record of all alarms for system analysis.

Using the Alarm Log

Explains how to choose and use log sheet formats for recording alarm data.

What to Record

Suggests key information to include in the alarm log, such as date, time, and type of alarm.

Customer Service Procedures

Points to Remember

Customer Service Contact Information

Provides contact details for customer service needs via phone or email.

Checkpoint CLASSIC Series Specifications

General IconGeneral
Tamper DetectionYes
Wireless CommunicationYes
Firewall ThroughputN/A (Security System, not a firewall)
VPN ThroughputN/A (Security System, not a VPN device)
Maximum Concurrent ConnectionsN/A (Security System, not a network device)
New Connections per SecondN/A (Security System, not a network device)

Related product manuals