Data Security - Panasonic KX-NS1000 User Manual

Pure ip-pbx
Hide thumbs Also See for KX-NS1000:
Table of Contents

Advertisement

1.1.4 Data Security

1.1.4 Data Security
In order to use the PBX safely and correctly, the Security Requirements below must be observed. Failure to
do so may result in:
Loss, leakage, falsification or theft of user information.
Illegal use of the PBX by a third party.
Interference or suspension of service caused by a third party.
What is User Information?
User Information is defined as:
1.
Information stored on the Storage Memory Card:
System data, error data and activation key files.
2.
Information sent from the PBX to a PC or a USB memory device:
System data, sound files for MOH (Music on Hold) and OGM (Outgoing Messages), and activation key
files.
Requirements
1.
The Storage Memory Card contains software for all the processes of the PBX and all the customer data.
Therefore, do not allow unauthorised access to prevent data leakage.
2.
Always make backups of data stored on the Storage Memory Card and/or perform regular system data
backups to a USB memory device or a NAS. For details, consult your dealer.
3.
To prevent illegal access from the Internet, activate a Firewall.
4.
To avoid unauthorised access and possible abuse of the PBX, we strongly recommend:
a.
Keeping the password secret.
b.
Selecting a complex, random password that cannot be easily guessed.
c.
Changing your password regularly.
5.
Perform the following when sending the PBX for repair or handing it over to a third party.
a.
Make a backup of data stored on the Storage Memory Card.
b.
Using a formatter, format the Storage Memory Card so that information cannot be retrieved from it.
6.
To prevent data leakage, render the Storage Memory Card physically unusable before disposal.
7.
When user information is sent from the PBX to a PC or a USB memory device, the confidentiality of that
information becomes the responsibility of the customer. Before disposing of the PC or the USB memory
device, ensure that data cannot be retrieved from it by formatting the hard disk and/or rendering it physically
unusable.
22
User Manual

Advertisement

Table of Contents
loading

Table of Contents