Canon SELPHY CP910 Blue User Guide - Page 64

While Printing, Security Precautions

Page 64 highlights

FCC/IC Notice Model: CD1112 (including WLAN Module Model WM318, FCC ID: AZD318) This equipment complies with FCC/IC radiation exposure limits set forth for an uncontrolled environment and meets the FCC radio frequency (RF) Exposure Guidelines in Supplement C to OET65 and RSS - 102 of the IC radio frequency (RF) Exposure rules. This equipment should be installed and operated keeping the radiator at least 20cm or more away from person's body (excluding extremities: hands, wrists, feet and ankles). This device complies with Part 15 of FCC Rules and Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. Security Precautions Because Wi-Fi uses radio waves to transmit signals, security precautions more stringent than when using a LAN cable are required. Keep the following points in mind when using Wi-Fi. • Use only networks you are authorized to use. This product searches for Wi-Fi networks in the vicinity and displays the results on the screen. Networks you are not authorized to use (unknown networks) may also be displayed. However, attempting to connect to or using such networks could be regarded as unauthorized access. Be sure to use only networks you are authorized to use, and do not attempt to connect to other unknown networks. If security settings have not been properly set, the following problems may occur. • Transmission monitoring Third parties with malicious intent may monitor Wi-Fi transmissions and attempt to acquire the data you are sending. • Unauthorized network access Third parties with malicious intent may gain unauthorized access to the network you are using to steal, modify, or destroy information. Additionally, you could fall victim to other types of unauthorized access such as impersonation (where someone assumes an identity to gain access to unauthorized information) or springboard attacks (where someone gains unauthorized access to your network as a springboard to cover their tracks when infiltrating other systems). To prevent these types of problems from occurring, be sure to thoroughly secure your Wi-Fi network. Only use this product's Wi-Fi function with a proper understanding of Wi-Fi security, and balance risk and convenience when adjusting security settings. While Printing Do not disconnect the printer from other devices until printing is finished, which may cause incomplete or incorrect prints. This product can print using PictBridge over wireless LANs. PictBridge technical standards facilitate direct connection of cameras, printers, and other devices for easy printing. Support for the PictBridge DPS over IP standard enables the product to print wirelessly in network environments. Cover Contents Part Names Basic Operations Print Settings Printing via Wi-Fi Printing via USB Cable Troubleshooting Appendix 64

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65

64
Cover
Contents
Part Names
Basic Operations
Print Settings
Printing via USB
Cable
Troubleshooting
Printing via Wi-Fi
Appendix
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions and
attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to the
network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard to
cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this product’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
While Printing
Do not disconnect the printer from other devices until printing is finished,
which may cause incomplete or incorrect prints.
This product can print using PictBridge over wireless LANs.
PictBridge technical standards facilitate direct connection of cameras,
printers, and other devices for easy printing. Support for the PictBridge
DPS over IP standard enables the product to print wirelessly in network
environments.
FCC/IC Notice
Model: CD1112 (including WLAN Module Model WM318, FCC ID: AZD318)
This equipment complies with FCC/IC radiation exposure limits set forth for an
uncontrolled environment and meets the FCC radio frequency (RF) Exposure
Guidelines in Supplement C to OET65 and RSS - 102 of the IC radio frequency
(RF) Exposure rules. This equipment should be installed and operated keeping the
radiator at least 20cm or more away from person’s body (excluding extremities:
hands, wrists, feet and ankles).
This device complies with Part 15 of FCC Rules and Industry Canada licence-exempt
RSS standard(s). Operation is subject to the following two conditions: (1) this device
may not cause interference, and (2) this device must accept any interference,
including interference that may cause undesired operation of this device.
This transmitter must not be co-located or operated in conjunction with any other
antenna or transmitter.
Security Precautions
Because Wi-Fi uses radio waves to transmit signals, security precautions
more stringent than when using a LAN cable are required.
Keep the following points in mind when using Wi-Fi.
Use only networks you are authorized to use.
This product searches for Wi-Fi networks in the vicinity and displays the
results on the screen.
Networks you are not authorized to use (unknown networks) may also
be displayed. However, attempting to connect to or using such networks
could be regarded as unauthorized access. Be sure to use only networks
you are authorized to use, and do not attempt to connect to other
unknown networks.
If security settings have not been properly set, the following problems may
occur.