Disarming The System; How To Turn Off The System Alarm; How To Detect A Tamper Condition; How The System Alarm Is Activated - Pontiac 2006 Solstice Owner's Manual

Hide thumbs Also See for 2006 Solstice:
Table of Contents

Advertisement

Disarming the System

You can disarm the system by doing any one of the
following:
Press the remote keyless entry transmitter unlock
button.
Turn the ignition on.
If the system is armed and the trunk is opened using the
trunk release button on the transmitter, the system will
temporarily disarm itself and re-arm when the trunk has
been closed. This allows the you to exit the vehicle, lock
the doors using the transmitter, and open the trunk using
the transmitter without having to disarm and re-arm the
system.
Once the system is disarmed, the security light will stop
flashing.

How the System Alarm is Activated

If the system is armed, it can be activated by either:
Opening the driver's door or trunk. This will cause a
ten second pre-alarm chirp followed by a thirty
second full alarm of horn and lights.
Opening any other door. This will immediately cause
a full alarm of horn and lights for thirty seconds.
When an alarm event has finished, the system will
re-arm itself automatically.
2-14

How to Turn Off the System Alarm

To turn off the system alarm, do one of the following:
Press the lock button on the remote keyless
entry transmitter. The system will then re-arm itself.
Press the unlock button on the remote keyless entry
transmitter. This will also disarm the system.
Insert the key in the ignition and turn it on. This will
also disarm the system.

How to Detect a Tamper Condition

If you hear three chirps when you press the unlock,
lock, or trunk release buttons on the remote keyless
transmitter, it means that the content theft security
system alarm was activated previously.
®
PASS-Key
III+
®
The PASS-Key
III+ system operates on a radio
frequency subject to Federal Communications
Commission (FCC) Rules and with Industry Canada.
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received,
including interference that may cause undesired
operation.

Advertisement

Table of Contents
loading

Table of Contents