![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/5/e7/5e7080a1-9a7e-48c5-836c-63a6a58716f8/5e7080a1-9a7e-48c5-836c-63a6a58716f8-bg2f.png)
w-7
• Besuretousetheproductasdirectedinthisguide.
BesuretousethewirelessLANfunctionofthisproductwithinthe
guidelinesnotedinthisguide.Canonacceptsnoresponsibilityfor
damagesorlossevenifthefunctionandproductareusedinwaysother
thanasdescribedinthisguide.
• DonotusethewirelessLANfunctionofthisproductnearmedical
equipmentorotherelectronicequipment.
UseofthewirelessLANfunctionnearmedicalequipmentorother
electronicequipmentmayaffectoperationofthosedevices.
Security Precautions
SincewirelessLANusesradiowavestotransmitsignals,tightersecurity
precautionsarenecessarythanwhenusingaLANcable.
WhenusingwirelessLAN,keepthefollowingpointsinmind.
• Onlyusenetworksyouareauthorizedtouse.
ThisproductsearchesforwirelessLANnetworksinthevicinityand
displaystheresultsonthescreen.Networksyouarenotauthorizedto
use(unknownnetworks)mayalsobedisplayed.However,connectingto
orattemptingtousethosenetworkscouldberegardedasunauthorized
access.Besuretouseonlynetworksyouareauthorizedtouse,anddo
notattempttoconnecttootherunknownnetworks.
Ifsecuritysettingshavenotbeenproperlyset,thefollowingproblemsmay
occur.
• Transmissionmonitoring
ThirdpartieswithmaliciousintentmaymonitorwirelessLAN
transmissionsandattempttoacquirethedatayouaresending.
• Unauthorizednetworkaccess
Thirdpartieswithmaliciousintentmaygainunauthorizedaccessto
thenetworkyouareusingandsteal,modify,ordestroyinformation.
Additionally,youcouldfallvictimtoothertypesofunauthorizedaccess
suchasimpersonation(wheresomeoneassumesanidentitytogain
accesstounauthorizedinformation)andspringboardattacks(where
someonegainsunauthorizedaccesstoyournetworkasaspringboardto
covertheirtrackswheninltratingothersystems).