beautypg.com

Cop y – Canon SELPHY CP900 User Manual

Page 27

background image

27

FCC/IC Notice

Models:CD1100 and CD1107 (including WLAN Module Model WM317, FCC ID:AZD317)

This equipment complies with FCC/IC radiation exposure limits set forth for an uncontrolled environment and

meets the FCC radio frequency (RF) Exposure Guidelines in Supplement C to OET65 and RSS - 102 of the IC

radio frequency (RF) Exposure rules. This equipment should be installed and operated keeping the radiator at

least 20cm or more away from person’s body (excluding extremities: hands, wrists, feet and ankles).

This device complies with Part 15 of FCC Rules and Industry Canada licence-exempt RSS standard(s). Operation

is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must

accept any interference, including interference that may cause undesired operation of this device.

This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter.

Security

Wireless LANs communicate using radio waves; therefore, the users must pay more attention to security than

they would for wired LANs.

Pay attention to the following when using wireless LANs.

O

Use the network that you are authorized to use.

This product searches for wireless networks nearby and displays them on the screen.

Therefore, the list may include networks unknown to you and you have no authorization to use them. It

may be deemed illegal access if you attempt to connect to these networks or if you connect and use these

networks. Use the authorized networks only and do not connect to any other networks.

The following may occur if appropriate security measures are not applied.

O

Eavesdropping

Malicious third parties may eavesdrop on wireless LAN radio transmissions and access data information.

O

Illegal access to the network

Malicious third parties may illegally intrude into your network and cause damage such as eavesdropping,

falsification, or destruction.

Also, the third party may use your network for "spoofing" in which they impersonate someone else and

transmit illegal information, or use it as a relay point or "stepping stone" to illegally access other subjects.

In order to reduce the possibility of such issues, apply measures and use functions to implement wireless

LAN security.

We recommend you to understand wireless LAN security and implement it with consideration to balanced

convenience and risk when using the wireless LAN function of this product.

While Printing

Do not shut down the communication until printing is complete. If you shut down the communication

prematurely, the printing result may be incomplete or incorrect.

COP

Y