1.5 | Important notes on use 1.5.1 | Application and safety instructions 1.5.2 | Restrictions on use (limitations) 1.5.3 | Data protection and IT security