126
Air
K
ey
s
yst
em
ma
n
u
al
v
er
si
o
n
2
.0
|
3
0
.0
7
.2
0
1
5
|
mi
sp
ri
n
ti
n
g
a
n
d
t
ech
n
ical
ch
an
g
es
res
er
ved
.
If protocols for locking components are restricted to a certain period, access
events continue to be recorded after said period. In this case, merely per-
sons' data is rendered anonymous.
Protocol entries relating to persons may also be rendered anonymous retrospectively for
reasons of data protection. Any protocol entries critical to data protection, such as access
events, are shown in the first column with a recycling bin icon.
Proceed as follows to render personal protocol entries anonymous:
>
Search for the protocol entry you would like to render anonymous and click the recy-
cling bin icon to its left.
>
A prompt appears asking you whether to delete merely this specific protocol entry or
all of this person's entries. Select the desired option.
>
Enter a comment.
>
Tick
I would like to irrevocably delete the log entry
.
>
Click
Remove
to complete the process.
Figure 153: Deleting protocol entries
Protocol entries are not deleted completely. Merely the link to persons is
deleted. As a result, protocol entries are rendered anonymous. This process
is irrevocable. Use this function with care.
Deleting protocol entries adds entries to the system protocol.
Содержание AirKey
Страница 1: ......