Safety Information
Important Information
Read these instructions carefully and look at the equipment to become familiar with the device before trying to install, operate, service or maintain it. The following special messages may appear throughout this bulletin or on the equipment to warn of potential hazards or to call attention to information that clarifies or simplifies a procedure.
|
|
action_zoom_plus_stroke
|
The addition of this symbol to a “Danger” or “Warning” safety label indicates that an electrical hazard exists which will result in personal injury if the instructions are not followed.
|
action_zoom_plus_stroke
|
This is the safety alert symbol. It is used to alert you to potential personal injury hazards. Obey all safety messages that follow this symbol to avoid possible injury or death.
|
Danger
|
DANGER
indicates a hazardous situation which, if not avoided,
will result in
death or serious injury.
|
Warning
|
WARNING
indicates a hazardous situation which, if not avoided,
could result in
death or serious injury.
|
Caution
|
CAUTION
indicates a hazardous situation which, if not avoided,
could result in
minor or moderate injury.
|
Notice
|
NOTICE
is used to address practices not related to physical injury.
|
Please Note
Electrical equipment should be installed, operated, serviced, and maintained only by qualified personnel. No responsibility is assumed by Schneider Electric for any consequences arising out of the use of this material.
A qualified person is one who has skills and knowledge related to the construction, installation, and operation of electrical equipment and has received safety training to recognize and avoid the hazards involved.
Controller Programming
It is important to verify that application programs are working as expected before downloading the application programs to the controllers. When the application programs are downloaded, verify that they are downloaded correctly by verifying that the system operates as expected. This applies to initial system installations, system upgrades, and changes in an operational system.
Warning
|
UNINTENDED EQUIPMENT OPERATION
Always verify that an application program is working as expected for all targeted controllers, associated equipment, and entire system before downloading the application program to the controller.
Always verify that changes to an application program that runs in an operational system is working as expected for all targeted controllers, associated equipment, and entire system before downloading the application program to the controller.
Always verify that the application program is downloaded correctly by verifying that all targeted controllers, associated equipment, and entire system operates as expected after the application program is downloaded.
Failure to follow these instructions can result in death, serious injury, or equipment damage.
|
Cybersecurity Safety Notice
Notice
|
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND CONFIDENTIALITY
Change default passwords at first use to help prevent unauthorized access to device settings, controls, and information.
Change passwords regularly to help prevent unauthorized access to device settings, controls, and information.
Do not share accounts. Each user must have their own account.
When creating user and display names, it is important to avoid using personal information, and to consider regional privacy policies. Display names will appear in event logs to identify who performed operations on the device.
It is recommended that log files be encrypted before transmission to help with security and privacy.
Disable unused ports, services, and default accounts to help minimize pathways for malicious attackers.
Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection).
Use the recommended cybersecurity safety measures (for example, least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, or interruption of services.
Failure to follow these instructions can result in loss of data, unauthorized system access, or equipment damage.
|