User's Responsibilities; Intended Use Of Equipment; Cyber Security Disclaimer - ABB ACS6080 User Manual

System drives
Hide thumbs Also See for ACS6080:
Table of Contents

Advertisement

• Are able to assess the hazards associated with the energy sources
of the drive and
act correspondingly
• Know the safe shutdown and grounding procedures for the
drive system
1.8

User's responsibilities

It is the responsibility of those in charge of the drive to ensure that each
person involved in the installation, operation or maintenance of the drive
has received the appropriate training and has thoroughly read and clearly
understood the instructions in this manual and the relevant safety
instructions.
1.9

Intended use of equipment

Those in charge of the drive must ensure that the drive is only used as
specified in the contractual documents, operated under the conditions
stipulated in the technical specifications and on the rating plate of the
drive, and serviced in the intervals specified by ABB.
Use of the drive outside the scope of the specifications is not permitted.
Intended equipment use also implies that only spare parts recommended
and approved by ABB must be used.
Unauthorized modifications and constructional changes of the drive are
not permitted.
1.10

Cyber security disclaimer

This product is designed to be connected to and to communicate
information and data via a network interface. It is the customer's
sole responsibility to provide and continuously ensure a secure
connection between the product and Customer network or any other
network (as the case may be).
Customer shall establish and maintain any appropriate measures (such as
but not limited to the installation of firewalls, application of
authentication measures, encryption of data, installation of anti-virus
programs, etc) to protect the product, the network, its system and the
interface against any kind of security breaches, unauthorized access,
interference, intrusion, leakage and/or theft of data
or information.
ABB and its affiliates are not liable for damages and/or losses related to
such security breaches, any unauthorized access, interference, intrusion,
leakage and/or theft of data or information.
3BHS842007 E01 REV C
ACS6080 USER MANUAL
01 ABOUT THIS MANUAL
36/238

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents