VII
11.5 Replacing Fans...........................................................................................89
12 Cyber Security Protocol ..............................................................................91
12.1 Password Change Requirements.................................................................91
12.2 Port Protection and Isolation........................................................................91
12.3 Network Cables and Tamper Evident Seals Inspection ..................................91
13 Cybersecurity Best Practice .......................................................................93
14 Appendix .......................................................................................................94
14.1 Technical Parameters .................................................................................94
14.2 Tightening Torques .....................................................................................96
14.3 Quality Assurance ......................................................................................96
14.4 Contact Information ....................................................................................97