Fundamental safety instructions
12 © Festo Didactic Conveyor
2.2 Warranty and Liability for Application Examples
The application examples are not binding and do not claim to be complete regarding configuration,
equipment or any eventuality which may arise. The application examples do not represent specific customer
solutions, but are only intended to provide support for typical tasks. You are responsible for the proper
operation of the described products. These application examples do not relieve you of your responsibility
for safe handling when using, installing, operating and maintaining the equipment.
2.3 Industrial Security
Note
Festo provides products and solutions with industrial security functions that support the secure operation of
plants, systems, machines and networks. In order to protect plants, systems, machines and networks
against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art
industrial security concept. Festo products and solutions only represent one component of such a concept.
The customer is responsible for preventing unauthorized access to its plants, systems, machines and
networks. Systems, machines and components should only be connected to the enterprise network or the
internet if and to the extent necessary and with appropriate security measures (e.g. use of firewalls and
network segmentation) in place. Additionally, Festo guidance on appropriate security measures should be
taken into account.
Festo products and solutions undergo continuous development to make them more secure. Festo strongly
recommends to apply product updates as soon as available and to always use the latest product versions.
Using product versions that are no longer supported, and failing to apply the latest updates may increase
the customer’s exposure to cyber threats.
Unsafe operating states resulting from software manipulation
Software manipulations (e.g. viruses, trojans, malware or worms) can cause unsafe
operating states in your system that may lead to death, serious injury, and property
damage.
Keep the software up to date.
Incorporate the automation and drive components into a holistic, state-of-the-art
industrial security concept for the installation or machine.
Make sure that you include all installed products into the holistic industrial security
concept.
Protect files stored on exchangeable storage media from malicious software with
suitable protection measures, e.g. virus scanners.