1.1.4 Data SecurityIn order to use the PBX safely and correctly, the Security Requirements below must be observed. Failure todo so may result in:• Loss, leakage, falsification or theft of user information.• Illegal use of the PBX by a third party.• Interference or suspension of service caused by a third party.What is User Information?User Information is defined as:1. Information stored on the Storage Memory Card:System data, error data and activation key files.2. Information sent from the PBX to a PC or a USB memory device:System data, sound files for MOH (Music on Hold) and OGM (Outgoing Messages), and activation keyfiles.Requirements1. The Storage Memory Card contains software for all the processes of the PBX and all the customer data.Therefore, do not allow unauthorised access to prevent data leakage.2. Always make backups of data stored on the Storage Memory Card and/or perform regular system databackups to a USB memory device. For details, consult your dealer.3. To prevent illegal access from the Internet, activate a Firewall.4. To avoid unauthorised access and possible abuse of the PBX, we strongly recommend:a. Keeping the password secret.b. Selecting a complex, random password that cannot be easily guessed.c. Changing your password regularly.5. Perform the following when sending the PBX for repair or handing it over to a third party.a. Make a backup of data stored on the Storage Memory Card.b. Using a formatter, format the Storage Memory Card so that information cannot be retrieved from it.6. To prevent data leakage, render the Storage Memory Card physically unusable before disposal.7. When user information is sent from the PBX to a PC or a USB memory device, the confidentiality of thatinformation becomes the responsibility of the customer. Before disposing of the PC or the USB memorydevice, ensure that data cannot be retrieved from it by formatting the hard disk and/or rendering it physicallyunusable.22 User Manual1.1.4 Data Security