Precautions on Using the High Security Mode .......................................................................8
Confirmation of the mode .....................................................................................................................................9