Use of Wireless LAN
According to foreign exchange and foreign
trade law regulations, export permission
(or service transaction permission) from
the Japanese government is necessary to
export strategic resources or services
(including this product) outside Japan.
Because this product includes American
encryption software, it falls under U.S.
Export Administration Regulations, and
cannot be exported to or brought into a
country under U.S. trade embargo.
Be sure to make notes of the wireless LAN
settings you use.
The wireless LAN settings saved to this
product may change or be erased due to
incorrect operation of the product, the effects
of radio waves or static electricity, or accident
or malfunction. Be sure to make notes of
wireless LAN settings as a precaution. Note
that Canon accepts no responsibility for
direct or indirect damages or loss of earnings
resulting from a degradation or
disappearance of content.
Canon will not make compensation for
damages resulting from loss or theft of the
product.
Canon accepts no responsibility for damages
or loss resulting from unauthorized access or
use of target devices registered on this
product due to loss or theft of the product.
Be sure to use the product as directed in
this manual.
Be sure to use the wireless LAN function of
this product according to the guidelines noted
in this manual. Canon accepts no
responsibility for damages or loss if the
function and product are used in ways other
than as described in this manual.
To turn off the wireless LAN, turn off
Connect Station.
80
Security Precautions
Because a wireless LAN uses radio waves to
transmit signals, security precautions more
stringent than when using a LAN cable are
required.
Keep the following points in mind when using
a wireless LAN.
Only use networks you are authorized to
use.
This product searches for wireless LAN
networks in the vicinity and displays the
results on the screen. Networks you are not
authorized to use (unknown networks) may
also be displayed. However, attempting to
connect to or using such networks could be
regarded as unauthorized access. Be sure to
use only networks you are authorized to use,
and do not attempt to connect to other
unknown networks.
If security settings have not been properly
set, the following problems may occur.
Transmission monitoring
Third parties with malicious intent may
monitor the wireless LAN transmissions and
attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain
unauthorized access to the network you are
using to steal, modify, or destroy information.
Additionally, you could fall victim to other
types of unauthorized access such as
impersonation (where someone assumes an
identity to gain access to unauthorized
information) or springboard attacks (where
someone gains unauthorized access to your
network as a springboard to cover their
tracks when infiltrating other systems).
To prevent these types of problems from
occurring, be sure to thoroughly secure your
wireless LAN network.
Only use this product's wireless LAN function
with a proper understanding of the wireless
LAN security, and balance risk and
convenience when adjusting security
settings.