When Does Warranty Begin?

A closer look at one of the most debated topics at the end of a project

Most of us have been at the end of a project when the owner/ client asks the popular question: “When does the one-year warranty begin?” The answer becomes one of the most debated topics, only second to the end-of-project, door-locking hardware debacle.

So, when does warranty begin?

In more than 90 percent of the specifications that I have either written or read, the warranty is a 12-month period from the end of the project. The conversation of the duration of 12 months is seldom in question. It is the conversation of what triggers the beginning of a warranty that really sparks the debate.

As a consultant, it is my fiduciary duty in representing my client—typically the end user—to make sure that the start date of the warranty is at the appropriate time: at the end of construction when the security integrator has completed the install. After all, why should my client’s 12-month period, when parts and labor are provided free of charge, start any earlier than at the end of the construction period?

As integrators have continually asked me, though, “Why should we start a warranty at a time after our 12-month manufacturers’ warranty has already begun?” I don’t disagree.

The most common terminology used to define the trigger of the beginning of a warranty period is “substantial completion,” the particular time toward the end of a project when the installation period is complete and only smaller items typically found on a punch list are left to install. In some cases, there is no issue with this: a substantial completion form is completed in a reasonable amount of time and the 12-month warranty begins.

However, in my experience, substantial completion ends up being possibly six to 12 months later than the time when the system(s) actually began being used and incurring wear and tear. The end result in these circumstances is that the integrator loses the manufacturer’s warranty period and becomes responsible for the entire cost of any defective equipment. (There are a few examples where the manufacturer chipped in and restarted the warranty period for the integrator, but those are rare and not the norm.)

I offer that there is another acceptable but seldom used term to trigger the beginning of the warranty period, which is “beneficial use,” the period of time at which the system is able to be used by the client. This is typically before substantial completion but indicates that the system is fully functional and incurring wear and tear. I have suggested that this term be acceptable to my clients and have suggested to integrators that they set the stage at the onset of a project by requesting that the beginning of the warranty period start at the beginning of beneficial use.

So, does a warranty begin at substantial completion, beneficial use or with the close out documentation? The answer will vary by project and client. As integrators, if you don’t suggest at the beginning of a project your preference and produce a document that can be signed by both parties, a warranty will be no earlier than substantial completion, regardless of when the system(s) start getting used.

This article originally appeared in the September 2014 issue of Security Today.

About the Author

Charlie Howell is an independent security consultant in Northern California.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.