Canon PIXMA SELPHY CP900 Betriebsanweisung

Seite von 56
27
FCC/IC Notice
Models:CD1100 and CD1107 (including WLAN Module Model WM317, FCC ID:AZD317)
This equipment complies with FCC/IC radiation exposure limits set forth for an uncontrolled environment and 
meets the FCC radio frequency (RF) Exposure Guidelines in Supplement C to OET65 and RSS - 102 of the IC 
radio frequency (RF) Exposure rules. This equipment should be installed and operated keeping the radiator at 
least 20cm or more away from person’s body (excluding extremities: hands, wrists, feet and ankles).
This device complies with Part 15 of FCC Rules and Industry Canada licence-exempt RSS standard(s). Operation 
is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must 
accept any interference, including interference that may cause undesired operation of this device.
This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter.
Security 
Wireless LANs communicate using radio waves; therefore, the users must pay more attention to security than 
they would for wired LANs.
Pay attention to the following when using wireless LANs.
 
O
Use the network that you are authorized to use.
This product searches for wireless networks nearby and displays them on the screen.
Therefore, the list may include networks unknown to you and you have no authorization to use them. It 
may be deemed illegal access if you attempt to connect to these networks or if you connect and use these 
networks. Use the authorized networks only and do not connect to any other networks.
The following may occur if appropriate security measures are not applied.
 
O
Eavesdropping
Malicious third parties may eavesdrop on wireless LAN radio transmissions and access data information.
 
O
Illegal access to the network
Malicious third parties may illegally intrude into your network and cause damage such as eavesdropping, 
falsification, or destruction.
Also, the third party may use your network for "spoofing" in which they impersonate someone else and 
transmit illegal information, or use it as a relay point or "stepping stone" to illegally access other subjects.
In order to reduce the possibility of such issues, apply measures and use functions to implement wireless 
LAN security.
We recommend you to understand wireless LAN security and implement it with consideration to balanced 
convenience and risk when using the wireless LAN function of this product.
While Printing 
Do not shut down the communication until printing is complete. If you shut down the communication 
prematurely, the printing result may be incomplete or incorrect.
COP
Y