The safety laser scanner is not suitable for the following applications, among others:
•
Outdoors
•
Underwater
•
In explosion-hazardous areas
2.4
Cybersecurity
Overview
To protect against cybersecurity threats, it is necessary to continuously monitor and
maintain a comprehensive cybersecurity concept. A suitable concept consists of organi‐
zational, technical, procedural, electronic, and physical levels of defense and considers
suitable measures for different types of risks. The measures implemented in this
product can only support protection against cybersecurity threats if the product is used
as part of such a concept.
You will find further information at
, e.g.:
•
General information on cybersecurity
•
Contact option for reporting vulnerabilities
•
Information on known vulnerabilities (security advisories)
Communication interfaces
•
USB
•
Display and pushbuttons
Further topics
•
"Managing passwords", page 100
•
2.5
Requirements for the qualification of personnel
The product must be configured, installed, connected, commissioned, and serviced by
qualified safety personnel only.
Project planning
You need safety expertise to implement safety functions and select suitable products
for that purpose. You need expert knowledge of the applicable standards and regula‐
tions.
Mounting, electrical installation and commissioning
You need suitable expertise and experience. You must be able to assess if the machine
is operating safely.
Configuration
You need suitable expertise and experience. You must be able to assess if the machine
is operating safely.
Operation and maintenance
You need suitable expertise and experience. You must be instructed in machine oper‐
ation by the machine operator. For maintenance, you must be able to assess if the
machine is operating safely.
SAFETY INFORMATION
2
8017784/1ELL/2022-01-21 | SICK
O P E R A T I N G I N S T R U C T I O N S | microScan3 Core I/O AIDA
11
Subject to change without notice