Wireless Telegraphy Act Regulations
The following acts are prohibited by the Wireless Telegraphy Act.
•
Modifying and disassembling (including the antenna)
•
Removing the label of conformance
International Travel Precautions
Wireless devices are designed to conform to the channel and frequency
limits of the country they are intended to be used in. This unit is based on
the specifications of the country of sale. If this unit is used outside the
country of sale, check with a local dealer for more information.
Notes on Security when Using Wireless LAN
(Important information on customer rights (maintaining privacy))
The advantage of using a wireless LAN over a LAN cable is that, because
information is exchanged using radio signals, you can easily connect to the
network if you are within range of the radio signals. A disadvantage of this is
that within a certain range, the electromagnetic signals can pass through
barriers such as walls, so that if security countermeasures are not
implemented in some way, problems such as the following may occur.
•
Communicated data can be intercepted
A third party may be able to receive wireless transmissions without
authorization, and they could obtain personal information from these
transmissions such as IDs, passwords, or credit card numbers, or they
could intercept the contents of personal e-mail messages.
•
Unauthorized access to the network
A third party could access an individual or intra-company network
without permission and carry out any of the following activities.
- Retrieve personal data or other secret information (information leakage)
- Pose as another user and send inappropriate data (impersonation)
- Overwrite the contents of intercepted data and resend it (falsification)
- Introduce a computer virus which could cause data loss or system
crashes (damage)
Initially, the possibility that such problems could occur through settings
concerning the security of the wireless LAN product and by using the
product are decreased, because the wireless LAN card and the access
point have security measures to deal with these problems. We
recommend that you use this product after making security settings
using your own judgment and assuming full responsibility, and with your
full understanding of problems that may occur if you do not make any
security settings.
See the "User's Guide" on the "Document CD-ROM" supplied with the
projector for more information on security settings.
8