Emerson Rosemount 648 Reference Manual page 3

Wireless temperature transmitter with rosemount x-well technology
Hide thumbs Also See for Rosemount 648:
Table of Contents

Advertisement

WARNING
Explosions
Explosions could result in death or serious injury.
Installation of this transmitter in an explosive environment must be in accordance with the appropriate local, national, and
international standards, codes, and practices. Review the approvals section of this manual for any restrictions associated with a
safe installation.
Before connecting a communicator in an explosive atmosphere, ensure the instruments in the segment are installed in
accordance with intrinsically safe or non-incendive field wiring practices.
Process leaks
Process leaks could result in death or serious injury.
Install and tighten process connectors before applying pressure.
Electrical shock
Electrical shock could cause death or serious injury.
Avoid contact with the leads and terminals. High voltage that may be present on leads can cause electrical shock.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause undesired operation.
This device must be installed to ensure a minimum antenna separation distance of 8-in. (20 cm) from all persons.
The power module may be replaced in a hazardous area. The power module has surface resistivity greater than one gigaohm and
must be properly installed in the wireless device enclosure. Care must be taken during transportation to and from the point of
installation to prevent electrostatic charge build-up.
Physical access
Unauthorized personnel may potentially cause significant damage to and/or misconfiguration of end users' equipment. This could
be intentional or unintentional and needs to be protected against.
Physical security is an important part of any security program and fundamental to protecting your system. Restrict physical access
by unauthorized personnel to protect end users' assets. This is true for all systems used within the facility.
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents