1.4 Data Security
1.4 Data Security
In order to use the PBX safely and correctly, the Security Requirements below must be observed. Failure to
do so may result in:
・ Loss, leaka
e, falsification or theft of user information.
・ Ille
al use of the PBX b
a third
art
.
・ Interference or sus
ension of service caused b
a third
art
.
What is User Information?
User Information is defined as:
Information sent from the PBX to a PC or a USB memor
device, such as s
stem data files.
Re
uirements
1. Always make backups of data stored on the System memory and/or perform regular system data backups
to a USB memor
device. Refer to "Maintenance-
2-3
S
stem Control-S
stem Data Backu
-
◆S
stem Data Backu
" in the Pro
rammin
Item List.
2. To
revent ille
al access from the Internet, activate a Firewall.
3. To avoid unauthorised access and possible abuse of the PBX, we strongly recommend:
a. Keeping the password secret.
b. Selecting a complex, random password that cannot be easily guessed.
c. Changing your password regularly.
4. Perform the following when sending the PBX for repair or handing it over to a third party.
a. Make a backu
of data stored on the S
stem memor
.
5. When user information is sent from the PBX to a PC or a USB memor
device, the confidentialit
of that
information becomes the responsibility of the customer. Before disposing of the PC or the USB memory
device, ensure that data cannot be retrieved from it by formatting the hard disk and/or rendering it physically
unusable.