The manufacturer is unable to accept any liability for damage or
functional errors that are caused by faulty software installation or
unsuitable computer hardware. If the operator installs additional
hardware or third party software, this occurs based on the sole
responsibility of the operator and is not covered by the manufac-
turer’s liability.
If the requirements listed above are not met, the following hazardous
situations may arise:
■
Data loss due to disconnection during data transfer between
software and IT network,
■
Unauthorized access to personal data by third parties,
■
Complete data loss due to missing data backup in the event of dis-
ruptions and/or damage to the IT network
Seite 29/69
Page 29/47
JMA-Optic
5.2. UK-Sensor OJM-UK1 (Lower Jaw Sensor)
Before the lower jaw sensor is set into operation for the fi rst time, the
transport lock, which disconnects the battery from the electronics when
it is delivered, must be removed.
Pull the safety tag in the direction of the arrow away from the housing
to activate the battery.
5.3. IT security and software installation
If the system is not shipped with a computer and properly installed software, the opera-
tor is responsible to ensure that the safety of patients, operators and environment is not compro-
mised by the computer. If in question please contact a dealer authorized by the manufacturer.
For the requirements of the software with concern to a PC / laptop, please refer to
the instructions for use on software.
In order to provide easy integration into an existing system for data backup and to store personal
date separately from the PC the data base of the application software can be installed on a
network server.
If the database of the software is stored on a storage medium connected via an
IT network, the following requirements have to be met:
■
the data connection must be secured against interference by third parties,
■
the data connection must be secured against disconnections,
■
applicable data protection regulations must be adhered to for the data connection in the
IT network as well as for the location in the IT network,
■
access to the location in the IT network must be restricted to the authorized group of persons,
■
the exchange of data between the database and the IT system is realized via the
SMB protocol,
■
the exchange of data with third party devices in the IT network is not provided.