
Security
Operating Manual PCOM sec br2
1004534-EN-04
| 12
}
Ensure that the setup mode is used only by authorised users. Use a key switch at the in-
put I0 to enable the setup mode, for example.
}
Unless otherwise documented, you should ensure that all the files created by the Secur-
ityBridge can only be used by authorised users.
3.7
Decommissioning
}
Make sure that the SecurityBridge is safely decommissioned before disposing of the
device (see chapter
Take SecurityBridge safely out of operation [
}
Where possible, perform these steps also when servicing and sending the device to Pilz.