EasyManua.ls Logo

Elster EK280 - Access Rights

Elster EK280
119 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
66 Operation
6.3.6 Access rights
The following parties can access the EK280.
Access
Meaning
C
Calibration officer
CDL
5
Certification data log
A
Administrator
Cu
Customer
-
No access
Each access party has one lock and a corresponding key.
The access rights apply for entries made via the keyboard, and for access
via the optical, electrical (hard-wired) or integrated modem interface. If the
lock is closed, all attempts to enter values will result in a corresponding er-
ror message being displayed (see chapter 0, "
Error messages when entering values").
For data protection reasons, reading values from the interfaces is only
possible if one of the locks is open.
6.3.6.1 Calibration lock
The calibration lock is used to protect parameters subject to calibration
regulations. This includes all values which influence volume readings or the
volume conversion.
The calibration lock is designed as a button which is positioned inside the
EK280 housing underneath the circuit board cover. It can be protected with
an adhesive label (see chapter 5.3.1.1, "Opening the calibration lock").
The calibration lock is opened by pressing the button ("P" symbol flashes in
the display) and is closed again by pressing the same button ("P" symbol
fades). It can also be closed by deleting the value "St.PL" (see chapter
6.4.6, "Ctrl." register (Control)") via the keyboard or interface. Using the
configuration software "enSuite", a time can also be set (in minutes) after
which the calibration lock will automatically close.
The level of protection can be changed for all parameters upon request,
particularly for applications which are not subject to German calibration
guidelines or the MID.
For example, parameters which are protected by the calibration lock as
standard, can also be protected with a administrator's lock or a certification
data log.
5
If a configuration log is in a device.

Table of Contents