What to do in case of inadequate service or defective product?
If you are dissatisfied with the services of your access control vendor or functionality of the access control components (such as readers, controllers, communication modules, contactless cards, software, etc.) that you purchased, you will have to fill in a return material authorization form (RMA form) that usually can be found on your vendor’s website.
In case you don’t know what a RMA form is, it is a special form that enables you to make a claim to the supplier and send back a product or service in case of its malfunction. It should be noted that a RMA form can be created within validity of the manufacturer’s warranty. You should also read carefully your vendor’s terms and conditions before making a claim. In some cases warranty does not cover damage which occurs because of neglect, repair or attempted repair by an unauthorized person, etc.
Usually the form is quite straightforward and contains customer information, product information and a reason for return. You can find a sample of RMA form here.
Once you make a claim, fill in a RMA form and receive a RMA number, you can send back the faulty or unused product to your supplier.
What to do in case you would like to migrate access control?
If you consider shifting from legacy access control to IP-based one, you might think you need to start from square one and de-install access control altogether in order to implement a new cloud-based system. Luckily, advanced technologies allow you to upgrade your access control and transfer it to cloud without the need of new hardware and wiring. This is achieved thanks to the interoperability of the modern solutions.
If you choose to migrate access control to IP-based access control from legacy access control, you will be surprised how efficient and cost-effective it is. Because there are many players in the market who offer IP-based access control systems, you can select the one that is capable of adapting cloud-based access control to your needs and can support legacy hardware with the PoE door locks and cloud-based access control software.
Another great thing about transition to the cloud-based access control is that it does not have to be immediate. You can take one step at a time and implement IP-based access control gradually thanks to the available open-architecture technologies. You can first convert specific doors, then take care of the controllers, etc. This does not only give you a chance for budget planning but also a possibility to test how cloud-based software functions.
All in all, thanks to the cutting-edge technologies and a large number of players in the security market, you have a few options to choose from if your current access control vendor does not live up to your expectations. Whether it is a matter of faulty equipment or your wish to upgrade your access control system, there is no need to de-install access control for the sake of obtaining new one. Thanks to the open and flexible solutions migrating to the cloud-based access control could not be easier!
Regain Full Control the Easy Way
Discover what makes Kisi the most advanced cloud access control solution.