Safety instructions
2.2 Data protection
SIMATIC IOT2050
14
Operating Instructions, 03/2020, A5E39456816-AA
2.2
Data protection
Siemens observes the data protection guidelines, especially the requirements regarding data
minimization (privacy by design). This means the following for this SIMATIC product: The
product does not process / save any personal information, but only technical functional data
(e.g. time stamps). If the user links this data to other data (e.g. shift plans) or if the user
saves personal information on the same medium (e.g. hard disk) and therefore creates a
personal reference in the process, the user has to ensure meeting the guidelines regarding
data protection.
2.3
Notes on use
NOTICE
Possible functional restrictions in case of non-validated plant operation
The device is tested and certified based on the technical standards. In rare cases,
functional restrictions can occur during plant operation.
Validate the correct functioning of the plant to avoid functional restrictions.
Note
Use in an industrial environment without additional protective measures
This device is designed for use in a normal industrial environment according to IEC 60721-3-
3.
Security notification
●
Follows the security rules for networks.
●
Install hardware firewall before connecting to internet. Install software firewall on the
device and open necessary ports only.
●
Deploy DLP (data leakage protection) over your system to protect sensitive data.
●
Install the device in cabinets, separated rooms or controlled areas. Restrict the access to
the device with lock if possible.
●
Only authorized personal can access the device.
●
Only access secured wireless networks using secured software/hardware components.
●
Use separate accounts for admin tasks and user tasks.
●
Only enable the debug functionality (for example, TCF) when necessary.
●
Always integrate security updates from latest example image or official upstream.
●
Only install software components from trusted sources.
●
Change the system password regularly.
●
The device can be identified by collecting MAC/UID information from the system.