6
Limitation of liability
THIS PUBLICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, OR
NON-INFRINGEMENT OF THE THIRD PARTY’S RIGHT.
THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS.
CHANGES ARE ADDED TO THE INFORMATION HEREIN, AT ANY TIME, FOR THE IMPROVEMENTS OF THIS PUBLICATION
AND/OR THE CORRESPONDING PRODUCT(S).
Introduction
(continued)
Network security
As you will use this unit connected to a network, your attention is called to the following security risks.
①
Leakage or theft of information through this unit
②
Use of this unit for illegal operations by persons with malicious intent
③
Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above network security risks.
• Use this unit in a network secured by a firewall, etc.
• If this unit is connected to a network that includes PCs, make sure that the system is not infected by computer viruses or
other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log in with an authorized user name and
password set by using user authentication.
• Change the administrator password periodically. Keep the authentication information (your user name and password) in a
safe place free from public view.