Data Security - Panasonic KX-NS300 Installation Manual

Hybrid ip-pbx
Hide thumbs Also See for KX-NS300:
Table of Contents

Advertisement

1.4 Data Security

1.4 Data Security
In order to use the PBX safely and correctly, the Security Requirements below must be observed. Failure to
do so may result in:
Loss, leakage, falsification or theft of user information.
Illegal use of the PBX by a third party.
Interference or suspension of service caused by a third party.
What is User Information?
User Information is defined as:
1.
Information stored on the SD Memory Card:
Sound files for UM feature and call charge data.
2.
Information sent from the PBX to a PC or a USB memory device:
System data, sound files for MOH (Music on Hold) and OGM (Outgoing Messages), and activation key
files.
Requirements
1.
Always make backups of data stored on the System memory and/or perform regular system data backups
to a USB memory device.
For details about making backups of data stored on the System memory, refer to "7.2.2 Utility—File—File
Transfer PBX to PC" in the PC Programming Manual.
For details about backing up the system data to a USB memory device, refer to "6.1.1 Tool—System Data
Backup—Backup to USB" in the PC Programming Manual.
2.
To prevent illegal access from the Internet, activate a Firewall.
3.
To avoid unauthorised access and possible abuse of the PBX, we strongly recommend:
a.
Keeping the password secret.
b.
Selecting a complex, random password that cannot be easily guessed.
c.
Changing your password regularly.
4.
Perform the following when sending the PBX for repair or handing it over to a third party.
a.
Make a backup of data stored on the System memory.
5.
When user information is sent from the PBX to a PC or a USB memory device, the confidentiality of that
information becomes the responsibility of the customer. Before disposing of the PC or the USB memory
device, ensure that data cannot be retrieved from it by formatting the hard disk and/or rendering it physically
unusable.
22
Installation Manual

Advertisement

Table of Contents
loading

Table of Contents