Safety Precautions
During installation or use of this software, pay attention to all safety messages that occur in the software and that are included in the documentation.
The following safety messages apply to this software in its entirety:
warning
inaccurate data results
● | Do not incorrectly configure the software or the devices. |
● | Do not base your maintenance or service actions solely on messages and information displayed by the software. |
● | Do not rely solely on software messages and reports to determine if the system is functioning correctly or meeting all applicable standards and requirements. |
● | Consider the implications of unanticipated transmission delays or failures of communication links. |
Failure to follow these instructions can result in death, serious injury, equipment damage, or permanent loss of data.
warning
HAZARD OF FIRE
● | Do not use Energy Hub as a safety system for your facility. |
● | Do not rely solely on software messages and reports to determine the correct operation of your building systems. |
● | Do not base your maintenance or service actions solely on information provided by the software. |
Failure to follow these instructions can result in death, serious injury, or equipment damage.
warning
MISSED ALARMS
● | Do not use Energy Hub for critical applications where human or equipment safety relies on alarming. |
● | Use reliable communication networks to connect devices, equipment, communication gateways, and Energy Hub. |
● | Consider the impact of unexpected transmission delays or communication failures. |
● | Configure alarms correctly. |
● | Do not disable notifications for important alarms. |
● | Send alarm notifications to more than one person. |
● | Check for email and mobile push notifications regularly. |
● | Do not solely rely on notifications. Check alarms regularly in Energy Hub. |
● | Do not let the Energy Hub subscriptions expire. |
Failure to follow these instructions can result in death, serious injury, or equipment damage.
warning
potential compromise of System availability, integrity, and confidentiality
Use cybersecurity best practices to help prevent unauthorized access to the software.
Failure to follow these instructions can result in death, serious injury, equipment damage, or permanent loss of data.
Work with facility IT System Administrators to ensure that the system adheres to the site-specific cybersecurity policies.