Security Information
This manual provides additional information for the customer and organization related to
identification and risk management associated with the use of the system in connected
infrastructure. It applies to a system with the following components:
l
Fleet Management Software
l
Docking Station (IntelliDoX, MicroDoc)
l
Gas Detection Instruments
Some controls such as custom operating system, encrypted data for firmware updates, and
elimination of confidential data from the system (except for gas log files if designated as
confidential by the customer) are already built into the system. This manual is focusing on
additional controls that could be added by the customer.
Security considerations for system installation
l
To minimize unauthorized external access to the system, Fleet Management Software should
operate behind a sufficiently robust and current company firewall.
l
Ensure virus protection is installed, signature files are up-to-date, and subscriptions are
active as per applicable IT policies.
l
Allow only digitally signed software from trusted sources to run on PC, where Fleet
Management Software is installed.
l
To minimize the possibility of tampering with docking stations, instruments, and PCs, it is
recommended to limit physical access to authorized personnel only.
Security considerations for instruments equipped with wireless connectivity
l
Bluetooth communication should always be set to OFF unless the user requires this
functionality
l
If possible pair devices ONLY when in a physically secure area
System Monitoring
It is highly recommended to perform regular security inspections of the system and review
authorized access data.
Honeywell does not represent that the software is compatible with any specific third-party
hardware or software other than as expressly specified by Honeywell. The Customer is
responsible for providing and maintaining an operating environment with at least the minimum
standards specified by Honeywell. The Customer understands and warrants that Customer must
implement and maintain reasonable and appropriate security measures relating to the software,
the information used therein, and the network environment. This obligation includes complying
with applicable cybersecurity standards and best practices including, but not limited to, the
Federal Trade Commission consent decrees and other declarations of reasonable and
appropriate security measures, the National Institute of Standards and Technology (“NIST”)
Cybersecurity Framework and NIST Alerts, InfraGard Alerts, and the United States Computer
Emergency Readiness Team (“US-CERT”) Alerts and Bulletins, and their equivalents.
The software is provided “as is” without any express or implied warranties. Honeywell, its
affiliated companies, and licensors expressly disclaim any implied warranty of merchantability,
BW Icon
31
User Manual
Содержание BW Icon
Страница 2: ......
Страница 4: ...Certified Labels 29 Replacement Parts 30 Security Information 31 Contact Us 33 BW Icon 3 User Manual ...
Страница 5: ......
Страница 30: ...Certified Labels BW Icon 29 User Manual ...
Страница 35: ...www honeywellanalytics com BW Icon 34 User Manual ...
Страница 36: ... 2020 July 15 ...