The following rules also apply when defining unsolicited data points:
Application addresses.
Data type and size.
Update criteria.
Array points.
Unique point registration.
More information
Defining points for unsolicited data.