Nikon Z 6 Users Manual for customers in the Americas - Page 261
Conformity Marking, Certificates
View all Nikon Z 6 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 261 highlights
Security Although one of the benefits of this product is that it allows others to freely connect for the wireless exchange of data anywhere within its range, the following may occur if security is not enabled: • Data theft: Malicious third-parties may intercept wireless transmissions to steal user IDs, passwords, and other personal information. • Unauthorized access: Unauthorized users may gain access to the network and alter data or perform other malicious actions. Note that due to the design of wireless networks, specialized attacks may allow unauthorized access even when security is enabled. • Unsecured networks: Connecting to open networks may result in unauthorized access. Use secure networks only. A Conformity Marking The standards with which the camera complies can be viewed using the Conformity marking option in the setup menu. A Certificates Technical Notes 243