Security - Panasonic PT-VZ585N Operating Instructions Manual

Commercial use
Table of Contents

Advertisement

over 500 mm
(19-11/16")
over 500 mm
(19-11/16")
f Do not install the projector in a confined space.
When placing the projector in a confined space, a ventilation and/or air conditioning system is required. Exhaust
heat may accumulate when the ventilation is not enough, triggering the protection circuit of the projector.
f Panasonic takes no responsibility for any damage to the product caused by an inappropriate choice of location
for installing the projector, even if the warranty period of the product has not expired.

Security

When using this product, take safety measures against the following incidents.
f Personal information being leaked via this product
f Unauthorized operation of this product by a malicious third party
f Interfering or stopping of this product by a malicious third party
Take sufficient security measures.
f Make your password as difficult to guess as possible.
f Change your password periodically. The password can be set in the [SECURITY] menu → [PASSWORD
CHANGE] or the [NETWORK/USB] menu → [Panasonic APPLICATION] → [PASSWORD CHANGE].
f Panasonic Corporation or its affiliate company never inquires a password directly to a customer. Do not tell your
password in case you receive such an inquiry.
f The connecting network must be secured by firewall or others.
f Set a password for web control function appropriately and restrict the users who can log in. The password for
the web control function can be set on the [Change password] page of the web control screen.
rSecurity cautions for using the wireless LAN product
The advantage of a wireless LAN is that information can be exchanged between a PC or other such equipment
and an access point using radio waves as long as you are within range for radio transmissions.
On the other hand, because the radio waves can travel through obstacles (such as walls) and are available
everywhere within a given range, problems of the type listed below may occur if security-related settings are not
made sufficiently.
f Communication content leak
The following communication information may be leaked by a malicious third-part who intentionally intercept the
transmitted data.
g Personal information such as your ID, password, and/or credit card numbers
g The e-mail content
f Unauthorized access
A malicious third-party may access your personal or corporate network without authorization and engage in the
following types of behavior.
g Retrieve personal and/or secret information (information leak)
g Spread false information by impersonating a particular person (spoofing)
Chapter 1 Preparation - Precautions for use
over 1 000 mm
(39-3/8")
over 200 mm
(7-7/8")
ENGLISH - 21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pt-vw545nPt-vx615nPt-vz585nu

Table of Contents