Nikon Corporation 1252EA Manuale Utente

Pagina di 128
vii
Notic
es
Notices
• No part of the manuals included with this product may be reproduced, 
transmitted, transcribed, stored in a retrieval system, or translated into any 
language in any form, by any means, without Nikon’s prior written permission.
• Nikon reserves the right to change the appearance and specifications of the 
hardware and software described in these manuals at any time and without 
prior notice.
• Nikon will not be held liable for any damages resulting from the use of this 
product.
• While every effort has been made to ensure that the information in these 
manuals is accurate and complete, we would appreciate it were you to bring 
any errors or omissions to the attention of the Nikon representative in your 
area (address provided separately).
This product is controlled by the United States Export Administration 
Regulations (EAR). The permission of the United States government is not 
required for export to countries other than the following, which as of this 
writing are subject to embargo or special controls: Cuba, Iran, North Korea, 
Sudan, and Syria (list subject to change).
The use of wireless devices may be prohibited in some countries or regions. 
Contact a Nikon-authorized service representative before using the wireless 
features of this product outside the country of purchase.
Copyright
Comply with copyright notices. Under copyright law, photographs or recordings 
of copyrighted works made with the camera can not be used without the 
permission of the copyright holder. Exceptions apply to personal use, but note 
that even personal use may be restricted in the case of photographs or 
recordings of exhibits or live performances.
CAUTION
RISK OF EXPLOSION IF BATTERY IS REPLACED BY AN INCORRECT TYPE.
DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.
Security
Although one of the benefits of this product is that it allows others to freely 
connect for the wireless exchange of data anywhere within its range, the 
following may occur if security is not enabled:
• Data theft: Malicious third-parties may intercept wireless transmissions to 
steal user IDs, passwords, and other personal information.
• Unauthorized access: Unauthorized users may gain access to the network 
and alter data or perform other malicious actions. Note that due the design 
of wireless networks, specialized attacks may allow unauthorized access 
even when security is enabled.