Safety precautions

Installation, wiring, testing and service must be performed in accordance with all local and national electrical codes.



  • Apply appropriate Personal Protective Equipment (PPE) and follow safe electrical work practices. See NFPA 70E, CSA Z462 or other local standards.
  • Turn off all power supplying this device and the equipment in which it is installed before working on or in the equipment.
  • Follow guidelines in the Wiring section of the related Installation Guide.
  • Always use a properly rated voltage sensing device to confirm that all power is off.
  • Do not use the data from the meter to confirm power is off.
  • Do not exceed the maximum ratings of this device.
  • Do not short secondary terminals of Voltage Transformer (VT).
  • Do not open secondary terminals of Current Transformer (CT).
  • Ground secondary circuit of CTs.
  • Do not install CTs in equipment where they exceed 75% of the wiring space of any cross-sectional area in the equipment.
  • Do not install CTs in areas where ventilation openings may be blocked or in areas of breaker arc venting.
  • Do not install CTs using Class 2 wiring methods or connect to Class 2 equipment. See NFPA 70.
  • Secure CT secondary conductors to ensure they do not contact live circuits.
  • Assume communications and I/O wiring are hazardous live until determined otherwise.
  • Replace all devices, doors and covers before turning on power to this equipment.

Failure to follow these instructions will result in death or serious injury.

NOTE: See IEC 60950-1 for more information on communications and I/O wiring connected to multiple devices.


unintended operation

Do not use this device for critical control or protection of persons, animals, property, or equipment.

Failure to follow these instructions can result in death, serious injury, or equipment damage.




  • Change default passwords/passcodes to help prevent unauthorized access to device settings and information.
  • Disable unused ports/services and default accounts, where possible, to minimize pathways for malicious attacks.
  • Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection).
  • Use cybersecurity best practices (for example: least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, interruption of services, or unintended operation.

Failure to follow these instructions can result in death or serious injury or equipment damage.