4
Table of Contents
Contacting Keysight Sales and Service Offices ................................................................... 5
Products Covered by this Document ................................................................................... 6
Security Terms and Definitions ............................................................................................. 7
Instrument Memory ............................................................................................................... 8
Summary of Memory Declassification Procedures ........................................................... 10
User and Remote Interface Security Measures ................................................................. 11
Memory Sanitization Procedures For Declassifying a Faulty Instrument. ....................... 13
References ........................................................................................................................... 14