Security - Panasonic PT-VMZ40 Operating Instructions Manual

Hide thumbs Also See for PT-VMZ40:
Table of Contents

Advertisement

over 500 mm
(19-11/16")
over 500 mm
(19-11/16")
f Do not install the projector in a confined space.
When placing the projector in a confined space, a ventilation and/or air conditioning system is required. Exhaust
heat may accumulate when the ventilation is not enough, triggering the protection circuit of the projector.
f Panasonic takes no responsibility for any damage to the product caused by an inappropriate choice of location
for installing the projector, even if the warranty period of the product has not expired.

Security

When using this product, take safety measures against the following incidents.
f Personal information being leaked via this product
f Unauthorized operation of this product by a malicious third party
f Interfering or stopping of this product by a malicious third party
Take sufficient security measures.
f Make your password as difficult to guess as possible.
f Change your password periodically. The password can be set in the [SECURITY] menu → [PASSWORD
CHANGE].
f Panasonic Corporation or its affiliate company never inquires a password directly to a customer. Do not tell your
password in case you receive such an inquiry.
f The connecting network must be secured by firewall or others.
f Set a password for web control function appropriately and restrict the users who can log in. The password for
the web control function can be set on the [Change password] page of the web control screen.
rSecurity when using the wireless LAN product
The advantage of a wireless LAN is that information can be exchanged between a computer or other such
equipment and a wireless access point using radio waves, instead of using a LAN cable, as long as you are within
range for radio transmissions.
On the other hand, because the radio wave can travel through an obstacle (such as a wall) and is accessible from
anywhere within a given range, following problems may occur if security setting is insufficient.
f Transmitted data may be intercepted
A malicious third party may intentionally intercept radio waves and monitor the following transmitted data.
g Personal information such as your ID, password, credit card number
g Content of an Email
f Illegally accessed
A malicious third party may access your personal or corporate network without authorization and engage in the
following types of behavior.
g Retrieve personal and/or secret information (information leak)
g Spread false information by impersonating a particular person (spoofing)
g Overwrite intercepted communications and issue false data (tampering)
Chapter 1 Preparation - Precautions for use
over 1 000 mm
(39-3/8")
over 200 mm
(7-7/8")
ENGLISH - 19

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pt-vmz50Pt-vmw50Pt-vmw50u

Table of Contents