OPERATING INSTRUCTIONS
2.3
Improper use
en
2.4
Cybersecurity
8
O P E R A T I N G I N S T R U C T I O N S | WTT12-S
WARNING
Risk of ineffectiveness of the protective device!
The objects to be protected may not be recognized in case of non-observance.
The device acts as an indirect protective measure. It cannot protect against ejected
parts or leaking radiation. Objects within the blind zone and outside of the safety-
related detection zone as well as transparent objects will not be detected.
•
The sensor must not be used for the detection of persons.
•
The sensor of type "Absence of reference object or reference surface" must not be
used for the safety-related detection of collisions.
The device is not suitable for the following applications (this list is not exhaustive):
•
Outdoors
•
Underwater
•
In explosion-hazardous areas
•
Use beyond the technical specifications
•
In environments with increased levels of ionizing radiation
•
At altitudes greater than 3,000 m above sea level
As a safety sensor, the device is only intended to perform part of the safety function
(partial safety function) within a subsystem. In its safety function, it provides sensor
information to a downstream logic unit for further processing.
The safety function arises only in conjunction with logic and actuator units as well as
possible further risk-reducing measures in the target application, e.g., machine tools, a
mobile platform or service robot.
Requirements and features of the application may differ from the features and char‐
acteristic values of the product and must be evaluated within the scope of project
planning.
WARNING DANGER DUE TO IMPROPER USE!
Any improper use can result in dangerous situations.
Therefore, observe the following instructions:
•
Product should be used only in accordance with its intended use.
•
All information in the documentation must be strictly observed.
•
Shut down the product immediately in case of damage (e.g., to the front screen).
Overview
To protect against cybersecurity threats, it is necessary to continuously monitor and
maintain a comprehensive cybersecurity concept. A suitable concept consists of organi‐
zational, technical, procedural, electronic, and physical levels of defense and considers
suitable measures for different types of risks. The measures implemented in this
product can only support protection against cybersecurity threats if the product is used
as part of such a concept.
You will find further information at www.sick.com/psirt, e.g.:
•
General information on cybersecurity
•
Contact option for reporting vulnerabilities
•
Information on known vulnerabilities (security advisories)
8029123/2024/01/15 | SICK
Subject to change without notice