Canon PowerShot G9 X Mark II User Manual - Page 218

Personal Information and Security Precautions, Trademarks and Licensing, Third-Party Software

Page 218 highlights

●● Unauthorized network access Third parties with malicious intent may gain unauthorized access to the network you are using to steal, modify, or destroy information. Additionally, you could fall victim to other types of unauthorized access such as impersonation (where someone assumes an identity to gain access to unauthorized information) or springboard attacks (where someone gains unauthorized access to your network as a springboard to cover their tracks when infiltrating other systems). To prevent these types of problems from occurring, be sure to thoroughly secure your Wi-Fi network. Only use this camera's Wi-Fi function with a proper understanding of Wi-Fi security, and balance risk and convenience when adjusting security settings. Third-Party Software ●● expat.h Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Personal Information and Security Precautions If personal information and/or Wi-Fi security settings, such as passwords, etc., are saved on the camera, please be aware that such information and settings may still remain in the camera. When transferring the camera to another person, disposing of it, or sending it for repair, be sure to take the following measures to prevent the leakage of such information and settings. ●● Erase registered personal information by choosing [Erase Info] in the Face ID settings. ●● Erase registered Wi-Fi security information by choosing [Reset Settings] in the Wi-Fi settings. Trademarks and Licensing ●● Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. ●● Macintosh and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. ●● App Store, iPhone, and iPad are trademarks of Apple Inc. ●● The SDXC logo is a trademark of SD-3C, LLC. ●● HDMI, the HDMI logo and High-Definition Multimedia Interface are trademarks or registered trademarks of HDMI Licensing, LLC. ●● The iFrame logo and the iFrame symbol are trademarks of Apple Inc. ●● Wi-Fi®, Wi-Fi Alliance®, WPA™, WPA2™ and Wi-Fi Protected Setup™ are trademarks or registered trademarks of the Wi-Fi Alliance. ●● The Bluetooth® word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Canon Inc. is under license. Other trademarks and trade names are those of their respective owners. ●● The N-Mark is a trademark or registered trademark of NFC Forum, Inc. in the United States and in other countries. ●● All other trademarks are the property of their respective owners. ●● This device incorporates exFAT technology licensed from Microsoft. Before Use Basic Guide Advanced Guide Camera Basics Auto Mode / Hybrid Auto Mode Other Shooting Modes P Mode Tv, Av, M, and C Mode Playback Mode Wireless Features Setting Menu Accessories Appendix Index 218

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219

218
Camera Basics
Auto Mode /
Hybrid Auto Mode
Other Shooting Modes
P Mode
Tv, Av, M, and C Mode
Playback Mode
Wireless Features
Setting Menu
Accessories
Appendix
Before Use
Basic Guide
Advanced Guide
Index
Personal Information and Security Precautions
If personal information and/or Wi-Fi security settings, such as passwords,
etc., are saved on the camera, please be aware that such information and
settings may still remain in the camera.
When transferring the camera to another person, disposing of it, or
sending it for repair, be sure to take the following measures to prevent the
leakage of such information and settings.
Erase registered personal information by choosing [Erase Info] in the
Face ID settings.
Erase registered Wi-Fi security information by choosing [Reset
Settings] in the Wi-Fi settings.
Trademarks and Licensing
Microsoft and Windows are trademarks or registered trademarks of
Microsoft Corporation in the United States and/or other countries.
Macintosh and Mac OS are trademarks of Apple Inc., registered in the
U.S. and other countries.
App Store, iPhone, and iPad are trademarks of Apple Inc.
The SDXC logo is a trademark of SD-3C, LLC.
HDMI, the HDMI logo and High-Definition Multimedia Interface are
trademarks or registered trademarks of HDMI Licensing, LLC.
The iFrame logo and the iFrame symbol are trademarks of Apple Inc.
Wi-Fi
®
, Wi-Fi Alliance
®
, WPA™, WPA2™ and Wi-Fi Protected Setup™
are trademarks or registered trademarks of the Wi-Fi Alliance.
The Bluetooth
®
word mark and logos are registered trademarks owned
by Bluetooth SIG, Inc. and any use of such marks by Canon Inc. is
under license. Other trademarks and trade names are those of their
respective owners.
The N-Mark is a trademark or registered trademark of NFC Forum, Inc.
in the United States and in other countries.
All other trademarks are the property of their respective owners.
This device incorporates exFAT technology licensed from Microsoft.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard
to cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
Third-Party Software
expat.h
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
“Software”), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, subject to the
following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.