Veris Industries E34 Series Installation Manual page 40

Multi-circuit meters
Table of Contents

Advertisement

E34 Series Installation Guide
Cybersecurity (cont.)
Z207251-0C
Page 40 of 42
Alta Labs, Enercept, Enspector, Hawkeye, Trustat, Aerospond, Veris, and the Veris 'V' logo are trademarks or registered trademarks of Veris Industries, L.L.C. in the USA and/or other countries.
Secure Disposal Checklist
Record activities: Document disposal actions according to your company policies and standards to keep a record of activities.
Decommission related rules and sanitize records:
• Follow decommission and sanitization tasks as described by your organization or contact your network administrator.
• Decommission network and security rules, e.g. a firewall rule that could be used to get past the firewall.
• Perform records tracking sanitization tasks to remove records in related systems, e.g. monitoring SNMP servers.
Disposal and reuse: See Disposal, resuse, recycling for more details.
Disposal and Reuse
Before removing the device from its intended environment, follow the Secure disposal guidelines in this document.
Follow device removal tasks described by your organization or contact your network administrator to determine a responsible
method of disposal.
Dispose the device according to the legislation of the country. Some regulatory organizations include:
• The United States Environmental Protection Agency (EPA) for guidance on the sustainable management of electronics.
• The EPA provides an Electronic Product Environmental Assessment Tool (EPEAT) that helps assess the
environmental attributes of electronics.
• The European Waste Electrical & Electronic Equipment Directive
(WEEE Directive) is the community directive on waste electrical and electronic equipment.
• The European Restriction of Hazardous Substances Directive (RoHS) directive on the restriction of the use of certain
hazardous substances in electrical and electronic equipment.
NOTICE
UNAUTORIZED OR UNINTENDED ACCESS TO
CONFIDENTIAL DATA
Store devices that are not in service in an access-controlled or
monitored location.
Physically destroy devices that are decommissioned.
Failure to follow these instructions can result in
unauthorized or unintended access to sensitive or secure
customer data.
Device Disposal
It is recommended that the entire device is physically destroyed. Destroying the device helps prevent potential disclosure of data
contained in the device that was not removed.
Device Reuse
Store the device in a location that is access controlled or monitored if there is potential for reuse.
©2020 Veris Industries USA 800.354.8556 or +1.503.598.4564 / support@veris.com
Other companies' trademarks are hereby acknowledged to belong to their respective owners.
TM
0420

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents