Canon ELPH130IS IXUS 140 User Manual page 90

Table of Contents

Advertisement

o When transferring
this product
toanother
person,
disposing
ofit,or
sending
itfor r epair, besure t onote t he wireless
LAN settings
and reset
the product
toitsdefault settings
(erase settings)
ifnecessary.
o Canon will n ot m ake compensation
forloss o r theft ofthe product.
Canon accepts
noresponsibility
for d amages
incurred
due t o
unauthorized
access toregistered
data ( image
transfer
destinations,
etc.)
ifthe product
islost orstolen.
o Be sure t ouse t he product
as directed
inthis guide.
Be sure t ouse t he wireless
LAN function
ofthis p roduct
within the
guidelines
noted inthis guide. Canon accepts
noresponsibility
for
damages
orloss i fthe function
and product
are used inways other than
as described
inthis guide.
o Do not u se t he wireless
LAN function
ofthis p roduct near medical
equipment
orother electronic
equipment.
Use o fthe wireless
LAN function
near medical
equipment
or other
electronic
equipment
may a ffect operation
ofthose devices.
/ ............................................
_
Radio
Wave
|nte_erence
Precautions
o This product
may receive
interference
from other devices
that emit radio
waves.
To avoid
interference,
be sure to use this product
as far away as
possible
from such devices,
or avoid using the devices
at the same time
as this product.
Because
Wi-Fi uses radio waves to transmit
signals,
security
precautions
more stringent
than when using a LAN cable are required.
Keep the following
points in mind when using Wi-Fi.
o Only use networks
you are authorized
to use.
This product
searches
for Wi-Fi networks
in the vicinity and displays
the
results
on the screen.
Networks
you are not authorized
to use (unknown
networks)
may also be displayed.
However,
attempting
to connect
to or
using such networks
could be regarded
as unauthorized
access.
Be sure
to use only networks
you are authorized
to use, and do not attempt
to
connect
to other unknown
networks.
If security
settings
have not been properly
set, the following
problems
may
occur.
o Transmission
monitoring
Third parties
with malicious
intent may monitor
Wi-Fi transmissions
and
attempt
to acquire
the data you are sending.
o Unauthorized
network
access
Third parties
with malicious
intent may gain unauthorized
access
to
the network
you are using to steal,
modify, or destroy
information.
Additionally,
you could fall victim to other
types of unauthorized
access
such as impersonation
(where
someone
assumes
an identity to gain
access
to unauthorized
information)
or springboard
attacks
(where
someone
gains unauthorized
access
to your network
as a springboard
to
cover
their tracks when
infiltrating
other
systems).
To prevent
these types of problems
from occurring,
be sure to thoroughly
secure your Wi-Fi network.
Only use this camera's
Wi-Fi function
with a proper
understanding
of
Wi-Fi security,
and balance
risk and convenience
when adjusting
security
settings.
@@
9O

Advertisement

Table of Contents
loading

Table of Contents