Extra Information

3
Request Regarding Security
Whenusingthisproduct,securitybreachesofthetypedescribedbelowareconceivable.
Leakageofyourprivateinformationviathisproduct•
Illegal operation of this product by a malicious third-party•
Harm to or cessation of operation of this product by a malicious third-party•
Besuretoimplementsufcientsecuritymeasures.
Setpasswords,andlimittheusersthatarepermittedloginaccess.•
Make sure the password is as hard to guess as possible.•
Change the password periodically.•
PanasonicCorporationanditsafliatedcompaniesneverdirectlyaskcustomersfortheirpassword.Donotgive•
outyourpasswordevenifdirectlyaskedbyathird-partyrepresentingthemselvesasPanasonicCorporation.
Alwaysuseonanetworkthathassafetyprotectionsuchasarewallimplemented.
•
About Wireless LANs
TheadvantageofawirelessLANisthatinformationcanbeexchangedbetweenaPCorothersuchequipmentandan
accesspointusingradiowavesaslongasyouarewithinrangeforradiotransmissions.
Ontheotherhand,becausetheradiowavescantravelthroughobstacles(suchaswalls)andareavailableeverywhere
withinagivenrange,problemsofthetypelistedbelowmayoccurifsecurity-relatedsettingsarenotmade.
A malicious third-part may intentionally intercept and monitor transmitted data including the content of e-mail and •
personalinformationsuchasyourID,password,and/orcreditcardnumbers.
A malicious third-party may access your personal or corporate network without authorization and engage in the •
followingtypesofbehavior.
Retrievepersonaland/orsecretinformation(informationleak)
Spreadfalseinformationbyimpersonatingaparticularperson(spoofing)
Overwriteinterceptedcommunicationsandissuefalsedata(tampering)
Spreadharmfulsoftwaresuchasacomputervirusandcrashyourdataand/orsystem(systemcrash)
SincemostwirelessLANadaptersoraccesspointsareequippedwithsecurityfeaturestotakecareoftheseproblems,
you can reduce the possibility of these problems occurring when using this product by making the appropriate security
settingsforthewirelessLANdevice.
Some wireless LAN devices may not be set for security immediately after purchase. To decrease the possibility of
occurrenceofsecurityproblems,beforeusinganywirelessLANdevices,beabsolutelysuretomakeallsecurity-related
settingsaccordingtotheinstructionsgivenintheoperationmanualssuppliedwiththem.
DependingonthespecificationsofthewirelessLAN,amaliciousthird-partymaybeabletobreaksecuritysettingsby
special means.
Please contact Panasonic if you need help taking care of security settings or other such.
IfyoucannotperformsecuritysettingsforyourwirelessLANbyyourself,pleasecontactthePanasonicSupportCenter.
Panasonicaskscustomerstothoroughlyunderstandtheriskofusingthisproductwithoutmakingsecuritysettings,and
recommends that the customer make security settings at their own discretion and responsibility.