1.4 Data SecurityIn order to use the Control Box safely and correctly, the Security Requirements below must be observed.Failure to do so may result in:• Loss, leakage, falsification or theft of user information.• Illegal use of the Control Box by a third party.• Interference or suspension of service caused by a third party.What is User Information?User Information is defined as:1. Information stored on the Storage Memory Card:System data and error data.2. Information sent from the Control Box to a PC:System data.Requirements1. The Storage Memory Card contains software for all the processes of the Control Box and all thecustomer data.Therefore, do not allow unauthorised access to prevent data leakage.2. Always make backups of data stored on the Storage Memory Card.3. To prevent illegal access from the Internet, activate a Firewall.4. To avoid unauthorised access and possible abuse of the Control Box, we strongly recommend:a. Keeping the password secret.b. Selecting a complex, random password that cannot be easily guessed.c. Changing your password regularly.5. Perform the following when sending the Control Box for repair or handing it over to a third party.a. Make a backup of data stored on the Storage Memory Card.b. Using a formatter, format the Storage Memory Card so that information cannot be retrieved fromit.6. To prevent data leakage, render the Storage Memory Card physically unusable before disposal.7. When user information is sent from the Control Box to a PC, the confidentiality of that informationbecomes the responsibility of the customer. Before disposing of the PC, ensure that data cannot beretrieved from it by formatting the hard disk and/or rendering it physically unusable.8. When configuring email addresses, make sure all information is entered correctly. Incorrect informationcould cause user information to be disclosed to unintended recipients.9. Note that user information may be deleted or initialised when the product is repaired.10. Refer all repairs to a trusted Panasonic service centre.11. Protect user information stored on the computer used to configure the system.• When user information is stored on a computer, the confidentiality of that information becomes theresponsibility of the installer. Take precautions to prevent the unauthorised use of the computer andthe setup tool used for performing system configuration or maintenance.• Connect the computer to the network only when performing system configuration or maintenance,and disconnect the computer from the network as soon as the work is complete.1.4 Data Security18 Installation Manual