IT security of the product

The product can be set to different access levels. Certain parameters are protected by these access levels. Authentication is implemented by using static access data. This data is not used to defend against attacks on IT security but to protect against unintentional modification.