EasyManua.ls Logo

Sinexcel INTERSTELLAR Series - Cyber Security; Security Warnings and Platform Use; Security Disclaimer

Sinexcel INTERSTELLAR Series
45 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
41
7. Cyber security
7.1 Warning
Please use the security protocol mentioned in this manual to connect. Otherwise, there will be network
security risks.
7.2 Operator platform
As the EVSE starts to work, it is connected to the Sinexcel charging facility platform, which can
realize functions such as remote management, diagnosis, configuration, maintenance, and upgrade.
Sinexcel requires the use of secure communication protocols (HTTPS/TLS1.2 or higher secure
cryptographic algorithms) for product communication. If a consumer insists on using non-secure
communication protocols, he/she needs to sign a disclaimer. All accidents and losses caused by the use of
non-secure communication protocols shall be borne by the user.
7.3 Cyber security disclaimer
The owner is responsible for providing and continuing to ensure a secure connection between the product
and the network or any other networks. And the owner also has to formulate and maintain appropriate
measures (including but not limited to installing firewalls, authentication, encrypting data and using anti-
virus programs, etc.) to protect products, networks, systems and interfaces from any types of security
breaches, unauthorized access, interference, intrusion, or information leakage and loss.
SINEXCEL ELECTRIC CO., LTD is not liable for damages and losses related to such security breaches,
any unauthorized access, interference, intrusion, leakage and theft of data or information.
Although Sinexcel provides functional testing for products and updates, the owner should develop testing
procedures for product updates or other major system updates (including but not limited to code changes,
configuration file changes, third-party software updates or patches, hardware replacement, etc.) to ensure
that the security measures implement are not compromised.