EasyManua.ls Logo

Panasonic PT-REQ12 Series

Panasonic PT-REQ12 Series
306 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 1Preparation — Precautions for use
ENGLISH - 27
f Do not block the intake/exhaust vents of the projector.
f Prevent hot and cool air from the air conditioning system to blow directly to the intake/exhaust vents of the
projector.
f Do not install the projector in a conned space.
When installing the projector in a conned space, provide air conditioning or ventilation separately. Exhaust heat
may accumulate when the ventilation is not enough, triggering the protection circuit of the projector.
f When installing and xing the projector on a ceiling or wall using a mount, make sure that the xing screw or
power cord does not come in contact with the metal section inside the ceiling or wall. Failure to observe this
may result in electric shocks.
f Panasonic Connect Co., Ltd. takes no responsibility for any damage to the product caused by an inappropriate
choice of location for installing the projector, even if the warranty period of the product has not expired.
f Immediately remove the product that is not in use anymore by asking a qualied technician.
Security
When using this product, take safety measures against the following incidents.
f Personal information being leaked via this product
f Unauthorized operation of this product by a malicious third party
f Interfering or stopping of this product by a malicious third party
Take su󰀩cient security measures.
f Make your password di󰀩cult to guess as much as possible.
f Change your password periodically.
f Panasonic Connect Co., Ltd. or its a󰀩liate companies will never ask for your password directly. Do not divulge
your password in case you receive such inquiries.
f The connecting network must be secured by a rewall, etc.
rSecurity when using the wireless LAN product
The advantage of a wireless LAN is that information can be exchanged between a computer or other such
equipment and a wireless access point using radio waves, instead of using a LAN cable, as long as you are within
range for radio transmissions.
On the other hand, because the radio wave can travel through an obstacle (such as a wall) and is accessible from
anywhere within a given range, following problems may occur if security setting is insu󰀩cient.
f Transmitted data may be intercepted
A malicious third party may intentionally intercept radio waves and monitor the following transmitted data.
g Personal information such as your ID, password, credit card number
g Content of an Email
100 mm (3-15/16") or shorter100 mm (3-15/16") or shorter
300 mm (11-13/16")
or longer
300 mm (11-13/16")
or longer
500 mm (19-11/16")
or longer
300 mm (11-13/16") or longer
300 mm (11-13/16") or longer
500 mm (19-11/16")
or longer
100 mm (3-15/16") or longer

Table of Contents

Related product manuals