This document may not be copied or otherwise reproduced, in whole or in part, except as specifically permitted under US and international copyright law, without the prior written consent from GE. Document number: 10092175P1-02 (February 2006). Disclaimer THE INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. GE ASSUMES NO RESPONSIBILITY FOR INACCURACIES OR OMISSIONS AND SPECIFICALLY DISCLAIMS ANY LIABILITIES, LOSSES, OR RISKS, PERSONAL OR OTHERWISE, INCURRED AS A CONSEQUENCE, DIRECTLY OR INDIRECTLY, OF THE USE OR APPLICATION OF ANY OF THE CONTENTS OF THIS DOCUMENT. FOR THE LATEST DOCUMENTATION, CONTACT YOUR LOCAL SUPPLIER OR VISIT US ONLINE AT WWW.GESECURITY.COM. This publication may contain examples of screen captures and reports used indaily operations. Examples may include fictitious names of individuals and companies. Any similarity to names and addresses of actual businesses orpersons is entirely coincidental. Trademarks GE and the GE monogram are registered trademarks of General Electric. and patents eKEY product and logo are registered trademarks of GE Security. Other trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products. Intended use Use this product only for the purpose it was designed for; refer to the user documentation. For the latest product information, visit us online atRules and 1. Possession of Key. Each Keyholder (as defined in the Agreement entered regulations into by your Organization) is responsible for the key issued to him or her. If relating toa key is lost or requires replacement for any reason, the replacement cost use of the for the key shall be the replacement price in the Keyholder Agreement. service 2. Current Update Code. The key has an update code that expires daily to prohibit further use of the key until a new current update code is obtainedfrom Supra or your Organization and entered into the key. Update codes shall be issued only to Keyholders in good standing with the Organization. A Keyholder is in good standing if he/she is in full compliance with all obligations in the Keyholder Agreement, including, without limitation, theterms of these Rules and Regulations. 3. Security of Equipment. It is necessary to maintain the security of each key and the Personal Identification Number ("PIN") of each key to prevent the use of the key by unauthorized persons. Each party in possession of a key, whether such key is being actively used or not, shall abide by the following conditions: a. To keep the key in such party's possession or in a safe place at all times; b. Not to allow the PIN for the key to be displayed on or attached to the key for any purpose whatsoever or to be disclosed to any third party; c. Not to lend or otherwise transfer the key to any other person or entity, or permit any other person or entity to use the key for any purpose whatsoever, whether or not such other person or entity is a real estate broker or salesperson; d. Not to duplicate the key or allow any other person to do so; e. Not to assign, transfer or pledge the key; f. Not to destroy, alter, modify, disassemble or tamper with the key orknowingly or unknowingly allow anyone else to do so; g. To notify your Organization immediately in writing, and in any event within 48 hours, of a loss or theft of the key or any keyboxes, and of allcircumstances surrounding such loss or theft; h. To complete and deliver to your Organization a stolen key affidavit prior to and as a condition of the issuance of a replacement key; i. To follow all additional security procedures as specified by your Organization; and j. To safeguard the code for each keybox from all other individuals andentities, whether or not they are authorized users of the Service. 4. Authorization. Before a keybox is installed or used on any piece of real property, the prior written authorization to install or use a keybox must beobtained from the property owner, as well as from any tenant(s) inpossession of the property, if applicable. Extreme care shall be used toensure that all doors to the listed property and the keybox are locked. All owners and/or tenant(s) of real property shall be informed that the keybox is not designed or intended as a security device. iv eKEY User Manual Contents Preface. . . . . . . . . . . . .. . . . . . .. . . . . . .. . . . . . .. . . . . . . . . . . . . . . . . . . . vii Conventions used in this document. . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Chapter1. Getting started.. . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Product overview . . .. . . . . . .. . . . . . .. . . . . . .. . . . . . . . . . . . . . . . . . . .. 2 Software applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Operating systems.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 eKEY setup . . . . . . . . .. . . . . . .. . . ....