Cyber security
Failing to follow these precautions can compromise the information security of your hearing aid and potentially
cause hearing loss or tinnitus.
CAUTION:
•
Only connect your hearing aid to a trusted computer or mobile device, or one used by a hearing care
professional.
•
For 3 minutes after being turned on, your hearing aid is open to connections. Do not restart your
hearing aid if requested by someone you don’t trust as this may compromise the safety of your device.
•
If your device plays the pairing sound at an unexpected time, this could indicate someone has gained
access to your device.
•
Only connect your hearing aid to the official mobile device app.
•
Only apply remote fine tuning updates that you are expecting.
•
Always use the latest available software update for your hearing aid.
•
Only accept live assistance calls from the hearing care professional that you are expecting.
48
Cyber security
Содержание ENHANCE SELECT 300
Страница 6: ......
Страница 61: ...Notes Additional information 61...
Страница 62: ...Notes 62 Additional information...
Страница 63: ...Notes Additional information 63...