********************
COMMENT ON POLICE DEPT IN NY OFFERS ALARM RESPONSE WITH EMERGENCY APP FROM SEPTEMBER 16, 2016 ARTICLE
*********************
Ken
    Wow, that’s a lot of money. Considering that Bric Security’s i-ACS web app can provide the same functionality, (without GPS) controlling cameras and doors as low as $15 per door. Free to municipalities.
Mitch Cohen
BRIC SECURITY
********************
COMMENT ON TALKING TO KEY HOLDERS FROM SEPTEMBER 16, 2016 ARTICLE
********************
Ken,
    With regard to "Talking to key holders" I think the question and answers have to go a little deeper.
    So, you're saying that if the key holder, who is on the contact list and has the password and who has the authority to arm and disarm the system and stop the police from coming to the premise ...... requests information to ..... lets say ..... bypass a troubled zone that ..... without a stated policy regarding permission .... we shouldn't help them to avoid another false alarm?  That it would be better to let the system not be armed until the owner ( who, lets say, is away on vacation) returns? Ok, I'll direct the owners telephone call to you when he returns from vacation. 
    I haven't given it much though but I don't believe I could come up with a general rule that would cover all contingencies about the authority of key holders or people on the contact list with passwords. It seems to me that there would be an endless list of exceptions that would have to be ironed out for special situations for each customer. ( My sister has the password and can do whatever she wants but I don't want my brother in law to be able to bypass the zone for my gun closet but it's ok for my son to bypass the gun closet but not the liquor cabinet)
    The only rule that I can think of is " People on the contact list who have a password have full authority" which I don't think has to be stated at all. As rare as it is now days ...... it would seem to me to be just common sense.
    And ...... Also ....  over the telephone you would have no real idea of who you were talking to anyway. It could be the owner or not .... with or without a permission policy ......( " are you the owner ..... Ummmmmm ahhhhh Oh yeah, sure")
    So ..... you couldn't have a permission policy regarding key holders unless the owner had a different password. And the owner may have given his password to a trusted employee ...... but you would never know that ....... and so on and so on. The instructions to central station regarding passwords would wind up being in the form of a complete book which the central station or alarm company employee would have to review in it's entirety each time a call came in and which the end user would quickly forget it's contents an get angry at you for following his instructions. 
    The password is, in fact. what it is  ....... "the password"
    Once you try to define it ......It's a whole can of worms.
Gene