Konica Minolta SONIMAGE HS2 Operation Manual page 37

Ultrasound system
Table of Contents

Advertisement

(26) Observe the instructions below to prevent damage of the user's network environment (e .g ., unstable operation
and security hole) .
• Users should configure secure environment, manage risks and follow the instructions for use when using net-
work/external storage media/printer .
– Users should identify, analyze, assess and manage the risks .
– Repeated change of network/external storage media/printer may lead to another risk, which will require ad-
ditional analysis .
– Change of network/external storage media/printer includes the following .
– Change of configuration of network/external storage media/printer
– Connection of additional device to network/external storage media/printer
– Removal of the device from network/external storage media/printer
– Update of the device connected to network/external storage media/printer
– Upgrade of the device connected to network/external storage media/printer
– Connection should be made after confirmation of the network environment.
– Check specifications of the LAN cable. (This system supports 100BASE-T.)
– Do not duplicate a network ID .
– Do not share files.
– Do not use file-sharing software.
– Do not perform any other actions that may adversely affect the network environment.
– Keep the environment protected from unauthorized access .
– Do not connect the system to the Internet .
(27) Observe the instructions below in using wireless LAN .
• Turn off the system before attaching or detaching the wireless LAN adapter.
• Do not connect multiple wireless LAN adapters to the system at the same time .
(28) Observe the instructions below in using Reference Signal Unit .
• Turn off the system before connecting or disconnecting the USB cable of the Reference Signal Unit.
(29) Please observe the following instructions as cyber security controls .
• In the facility/organization this system is used, or in the operation facility of the network connected with this
system, if the information security management system has not been established, please recommend the chief
administrator of the facility to establish the system .
• In the facility/organization this system is used, or in the operation facility of the network connected with this
system, if the risk management of IT network has not been implemented, please recommend the chief admin-
istrator of the facility to implement the risk management .
• If the education about information security has not been provided to the users of this system, please recom-
mend to educate them .
• Please do not connect the devices that are not allowed to be connected with this system .
• Please use anti-virus license (optional) if a virus infection risk is assumed .
• If anti-virus license is used and the message "The handle is invalid ." is displayed, there is a possibility of a se-
curity breach . In this case, promptly disconnect the system from the network, report to the chief administrator
of the facility, and then provide a response based on the information management procedures in the facility . To
continue the examination in an emergency, conduct with the system disconnected from the network .
• Please establish and maintain the operating rules for the User Account, such as the followings .
– The password must contain some numbers, upper / lower case, the number of characters must be 8 char-
acters or more, etc . in order not to be guessed by a third party easily .
– Do not leave the record of the password in order not to be known to a third party .
– Set the expiration date for the password and change regularly .
• Please establish and maintain the operating rules for services account, such as the following .
– Manage the user name and password for the Maintenance function appropriately in order not to be known
to a third party .
37
Important Information

Advertisement

Table of Contents
loading

Related Products for Konica Minolta SONIMAGE HS2

Table of Contents