NEC NP-M332XS NP02LM Users Manual - Page 11

introduce computer viruses or otherwise damage data or the system, etc.

Page 11 highlights

France: Outdoor use limited to 10mW e.i.r.p. within the band 2454 - 2483.5 MHz. Derogation in French overseas departments of Guyane and La Reunion: outdoor use not allowed in band 2400 - 2420 MHz. ˔ CautionsonsecuritywhenusingwirelessLANproducts With a wireless LAN, radio waves are used instead of LAN cables for the exchange of data between the wireless access points (computers, etc.), offering the advantage that LAN connections can be made freely within the range of the radio waves. On the other hand, the radio waves reach all points within this range, regardless of walls or other obstacles, possibly resulting in the problems described below if the proper security measures are not taken. • Contentsoftransmissionsmaybeintercepted Malicious third parties may purposely intercept the radio waves and steal information contained in the transmissions, including such personal information as ID numbers, passwords, credit card numbers, e-mail messages, etc. • Improperintrusions Malicious third parties may without permission access the personal or company network and steal personal or confidential information, pretend to be someone else and leak incorrect information, rewrite information that has been intercepted, introduce computer viruses or otherwise damage data or the system, etc. Wireless LAN cards and wireless access points generally include security measures for dealing with these problems. Making the proper security settings before using the products can reduce the risk of such problems arising. We recommend that you fully understand the problems that can arise when using the products without making the security settings, then that you make the security settings based on your own decision and at your own discretion. - 11 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

- 11 -
France:
Outdoor use limited to 10mW e.i.r.p. within the band 2454 – 2483.5 MHz.
Derogation in French overseas departments of Guyane and La Reunion: outdoor
use not allowed in band 2400 - 2420 MHz.
Cautions±on±security±when±using±wireless±LAN±products±
With a wireless LAN, radio waves are used instead of LAN cables for the exchange
of data between the wireless access points (computers, etc.), offering the
advantage that LAN connections can be made freely within the range of the radio
waves.
On the other hand, the radio waves reach all points within this range, regardless of
walls or other obstacles, possibly resulting in the problems described below if the
proper security measures are not taken.
•± Contents±of±transmissions±may±be±intercepted±
Malicious third parties may purposely intercept the radio waves and steal
information contained in the transmissions, including such personal information
as ID numbers, passwords, credit card numbers, e-mail messages, etc.
•± Improper±intrusions±
Malicious third parties may without permission access the personal or company
network and steal personal or confidential information, pretend to be someone
else and leak incorrect information, rewrite information that has been intercepted,
introduce computer viruses or otherwise damage data or the system, etc.
Wireless LAN cards and wireless access points generally include security
measures for dealing with these problems. Making the proper security settings
before using the products can reduce the risk of such problems arising.
We recommend that you fully understand the problems that can arise when using
the products without making the security settings, then that you make the security
settings based on your own decision and at your own discretion.