17
Before Use
(continued)
n
About the Internal Clock
Confirming the Time
The internal clock is set at the time
of factory default. Check the time
before using, and reset the clock if
necessary. (Refer to the Operating
Instructions for Front-End Application)
Note:
To use GPS, connect the GPS
antenna SH-IN2568 (locally procured)
to the [GPS ANT.] connector on the
rear panel.
Consult your supplier and request
connection.
During GPS reception, the
signals received will regularly and
automatically set the recorder clock
to GPS time.
n
Product Disposal/Transfer.
Video, Audio and images saved
on the SSD may lead to personal
information leakage.
When it is necessary to dispose or
give this product to someone, even
when for repair, make sure that all
evidence has been removed from the
recorder and the PC installed with the
Front-End or Back-End Application
(refer to the Operating Instructions for
Front-End Application to clear user
information in the recorder).
n
Network Security
In order to reduce the occurrence of
the security problem, make sure to
set up the security-relating functions
before using Internet Connection.
For details, refer to the Operating
Instructions for Front-End Application
or Back-End Application.
As you will use this unit connected to
a network, your attention is called to
the following security risks.
①
Leakage or theft of information
through this unit
②
Use of this unit for illegal
operations by persons with
malicious intent
③
Interference with or stoppage of
this unit by persons with malicious
intent
It is your responsibility to take
precautions such as those described
below to protect yourself against the
above network security risks.
•
Use this unit in a network secured
by a firewall, etc.
•
If this unit is connected to a network
that includes PCs, make sure
that the system is not infected by
computer viruses or other malicious
entities (using a regularly updated
anti-virus program, antispyware
program, etc.)
•
Protect your network against
unauthorized access by restricting
users to those who log in with an
authorized user name and password
(refer to the Operating Instructions
for Front-End Application).
•
Apply measures such as user
authentication to protect your
network against leakage or theft of
information, including image data
and authentication information (user
names and passwords).