Manuals

TSMS8 Instrument Security Procedures

In many cases it is imperative that the TSMS8 mobile network scanner be used in a secured environment. Generally these highly secured environments will not allow any test equipment to leave the area unless it can be proven that no user information will leave with the test equipment. Security concerns can arise when signal analyzers need to leave a secured area to be calibrated or serviced.

This document describes the types of memory and their usage in the TSMS8 mobile network scanner. It also addresses methods of ensuring that no user data will leave the secured area should the product be removed for calibration or service needs.

Name
Type
Version
Date
Size
R&S®TSMS8 instrument security procedures
R&S®TSMS8 instrument security procedures
🛈 Please log in to access this content
Type
Security
Version
01
Date
09-Dec-2025
Size
249 kB