Chapter 1
Preparation — Precautions for use
ENGLISH - 27
f
Do not block the intake/exhaust vents of the projector.
f
Prevent hot and cool air from the air conditioning system to blow directly to the intake/exhaust vents of the
projector.
f
Do not install the projector in a confined space.
When installing the projector in a confined space, provide air conditioning or ventilation separately. Exhaust heat
may accumulate when the ventilation is not enough, triggering the protection circuit of the projector.
f
When installing and fixing the projector on a ceiling or wall using a mount, make sure that the fixing screw or
power cord does not come in contact with the metal section inside the ceiling or wall. Failure to observe this
may result in electric shocks.
f
Panasonic Connect Co., Ltd. takes no responsibility for any damage to the product caused by an inappropriate
choice of location for installing the projector, even if the warranty period of the product has not expired.
f
Immediately remove the product that is not in use anymore by asking a qualified technician.
Security
When using this product, take safety measures against the following incidents.
f
Personal information being leaked via this product
f
Unauthorized operation of this product by a malicious third party
f
Interfering or stopping of this product by a malicious third party
Take sufficient security measures.
f
Make your password difficult to guess as much as possible.
f
Change your password periodically.
f
Panasonic Connect Co., Ltd. or its affiliate companies will never ask for your password directly. Do not divulge
your password in case you receive such inquiries.
f
The connecting network must be secured by a firewall, etc.
r
Security when using the wireless LAN product
The advantage of a wireless LAN is that information can be exchanged between a computer or other such
equipment and a wireless access point using radio waves, instead of using a LAN cable, as long as you are within
range for radio transmissions.
On the other hand, because the radio wave can travel through an obstacle (such as a wall) and is accessible from
anywhere within a given range, following problems may occur if security setting is insufficient.
f
Transmitted data may be intercepted
A malicious third party may intentionally intercept radio waves and monitor the following transmitted data.
g
Personal information such as your ID, password, credit card number
g
Content of an Email
100 mm (3-15/16") or shorter
100 mm (3-15/16") or shorter
300 mm (11-13/16")
or longer
300 mm (11-13/16")
or longer
500 mm (19-11/16")
or longer
300 mm (11-13/16") or longer
300 mm (11-13/16") or longer
500 mm (19-11/16")
or longer
100 mm (3-15/16") or longer