![Square QED-2 Instruction Bulletin Download Page 10](http://html1.mh-extra.com/html/square/qed-2/qed-2_instruction-bulletin_1353433010.webp)
Power-Style™ QED-2 Switchboards
Section 2—Safety Precautions
8
© 1988–2018 Schneider Electric All Rights Reserved
80043-055-13
ENGLISH
Section 2—Safety Precautions
DANGER
HAZARD OF ELECTRIC SHOCK, EXPLOSION, OR ARC FLASH
• Apply appropriate personal protective equipment (PPE) and follow safe
electrical work practices. See NFPA 70E or CSA Z462.
• This equipment must be installed and serviced only by qualified personnel.
• Perform such work only after reading and understanding all of the instructions
contained in this bulletin.
• Turn off all power supplying this equipment before working on or
inside equipment.
• Before performing visual inspections, tests, or maintenance on this equipment,
disconnect all sources of electric power. Assume all circuits are live until they
are de-energized, tested, and tagged. Pay particular attention to the design of
the power system. Consider all sources of power, including the possibility of
backfeeding.
• Always use a properly rated voltage sensing device to confirm power is off.
• Practice lock-out/tag-out procedures according to OSHA requirements.
• Handle this equipment carefully and install, operate, and maintain it correctly
in order for it to function properly. Neglecting fundamental installation and
maintenance requirements may lead to personal injury, as well as damage to
equipment or other property.
• Carefully inspect your work area and remove any tools and objects left inside
the equipment.
• Replace all devices, doors, and covers before turning on power to
this equipment.
• All instructions in this manual assume that the customer has taken these
measures before performing maintenance or testing.
Failure to follow these instructions will result in death or serious injury.
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND
CONFIDENTIALITY
• Change default passwords to help prevent unauthorized access to device
settings and information.
• Disable unused ports/services and default accounts, where possible, to
minimize pathways for malicious attacks.
• Place networked devices behind multiple layers of cyber defenses (such as
firewalls, network segmentation, and network intrusion detection and
protection).
• Use cybersecurity best practices (for example: least privilege, separation of
duties) to help prevent unauthorized exposure, loss, modification of data and
logs, interruption of services, or unintended operation.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.