Kyocera ECOSYS P8060cdn ECOSYS P8060cdn Operation Guide - Page 36

EN ISO 7779, EK1-ITB 2000, Wireless Connection (Mexico only)

Page 36 highlights

Legal and Safety Information > Notice EN ISO 7779 Maschinenlärminformations-Verordnung 3. GPSGV, 06.01.2004: Der höchste Schalldruckpegel beträgt 70 dB (A) oder weniger gemäß EN ISO 7779. EK1-ITB 2000 Das Gerät ist nicht für die Benutzung im unmittelbaren Gesichtsfeld am Bildschirmarbeitsplatz vorgesehen. Um störende Reflexionen am Bildschirmarbeitsplatz zu vermeiden, darf dieses Produkt nicht im unmittelbaren Gesichtsfeld platziert werden. Wireless Connection (Mexico only) The operation of this equipment is subject to the following two conditions: (1) it is possible that this equipment or device may not cause harmful interference, and (2) this equipment or device must accept any interference, including interference that may cause undesired operation. La operación de este equipo está sujeta a las siguientes dos condiciones: (1) es posible que este equipo o dispositivo no cause interferencia perjudicial y (2) este equipo o dispositivo debe aceptar cualquier interferencia, incluyendo la que pueda causar su operación no deseada. Security Precautions when Using Wireless LAN (If equipped) Wireless LAN allows information to be exchanged between wireless access points instead of using a network cable, which offers the advantage that a WLAN connection can be established freely within an area in which radio waves can be transmitted. On the other hand, the following problems may occur if security settings are not configured, because radio waves can pass through obstacles (including walls) and reach everywhere within a certain area. Secretly Viewing Communication Contents A third person with malicious objectives may intentionally monitor radio waves and gain unauthorized access to the following communication contents. • Personal information including ID, passwords, and credit card numbers • Contents of email messages Illegal Intrusion A third party with malicious intent may gain unauthorized access to personal or company networks and conduct the following illegal actions. • Extracting personal and confidential information (information leak) • Entering into communication while impersonating a specific person and distributing unauthorized information (spoofing) • Modifying and retransmitting intercepted communications (falsification) • Transmitting computer viruses and destroying data and systems (destruction) Wireless LAN cards and wireless access points contain built-in security mechanisms to address these problems and to reduce the possibility of these problems occurring by configuring the security settings of wireless LAN products when the product is used. We recommend that customers take responsibility and use their judgment when configuring the security settings and that they ensure that they fully understand the problems that can occur when the product is used without configuring the security settings. 1-8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448

1-8
Legal and Safety Information > Notice
EN ISO 7779
Maschinenlärminformations-Verordnung 3. GPSGV, 06.01.2004: Der höchste Schalldruckpegel beträgt 70 dB (A) oder
weniger gemäß EN ISO 7779.
EK1-ITB 2000
Das Gerät ist nicht für die Benutzung im unmittelbaren Gesichtsfeld am Bildschirmarbeitsplatz vorgesehen. Um
störende Reflexionen am Bildschirmarbeitsplatz zu vermeiden, darf dieses Produkt nicht im unmittelbaren Gesichtsfeld
platziert werden.
Wireless Connection (Mexico only)
The operation of this equipment is subject to the following two conditions:
(1) it is possible that this equipment or device may not cause harmful interference, and (2) this equipment or device must
accept any interference, including interference that may cause undesired operation.
La operación de este equipo está sujeta a las siguientes dos condiciones:
(1) es posible que este equipo o dispositivo no cause interferencia perjudicial y (2) este equipo o dispositivo debe
aceptar cualquier interferencia, incluyendo la que pueda causar su operación no deseada.
Security Precautions when Using Wireless LAN
(If equipped)
Wireless LAN allows information to be exchanged between wireless access points instead of using a network cable,
which offers the advantage that a WLAN connection can be established freely within an area in which radio waves can
be transmitted.
On the other hand, the following problems may occur if security settings are not configured, because radio waves can
pass through obstacles (including walls) and reach everywhere within a certain area.
Secretly Viewing Communication Contents
A third person with malicious objectives may intentionally monitor radio waves and gain unauthorized access to the
following communication contents.
Personal information including ID, passwords, and credit card numbers
Contents of email messages
Illegal Intrusion
A third party with malicious intent may gain unauthorized access to personal or company networks and conduct the
following illegal actions.
Extracting personal and confidential information (information leak)
Entering into communication while impersonating a specific person and distributing unauthorized information
(spoofing)
Modifying and retransmitting intercepted communications (falsification)
Transmitting computer viruses and destroying data and systems (destruction)
Wireless LAN cards and wireless access points contain built-in security mechanisms to address these problems and to
reduce the possibility of these problems occurring by configuring the security settings of wireless LAN products when
the product is used.
We recommend that customers take responsibility and use their judgment when configuring the security settings and
that they ensure that they fully understand the problems that can occur when the product is used without configuring the
security settings.