EasyManua.ls Logo

Panasonic TH-80OLFB70U - Request Regarding Security

Panasonic TH-80OLFB70U
37 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5
Request Re
g
ardin
g
Securit
y
W
hen usin
g
this product, securit
y
breaches of the t
y
pe described below are conceivable
.
Leaka
g
e of
y
our private information via this produc
t
I
lle
g
al operation o
f
this product b
y
a malicious third-part
y
H
arm to or cessation o
f
operation o
f
this product b
y
a malicious third-part
y
B
e sure to implement suf cient securit
y
measures
.
S
et passwords, and limit the users that are permitted lo
g
in access
.
M
ake sure the password is as hard to
g
uess as possible.
C
han
g
e the password periodicall
y.
Panasonic Corporation and its af liated companies never directl
y
ask customers for their password. Do not
g
ive
out
y
our password even i
f
directl
y
asked b
y
a third-part
y
representin
g
themselves as Panasonic
C
orporation
.
A
lwa
y
s use on a network that has sa
f
et
y
protection such as a
rewall implemented
.
Ab
out
Wi
re
l
ess L
AN
s
The advanta
g
e of a wireless LAN is that information can be exchan
g
ed between a PC or other such equipment and an
access point usin
g
radio waves as lon
g
as
y
ou are within ran
g
e for radio transmissions.
O
n the other hand, because the radio waves can travel throu
g
h obstacles
(
such as walls
)
and are available ever
y
where
within a
g
iven ran
g
e, problems o
f
the t
y
pe listed below ma
y
occur i
f
securit
y
-related settin
g
s are not made
.
A malicious third-part ma
y
intentionall
y
intercept and monitor transmitted data includin
g
the content of e-mail and
p
ersonal in
f
ormation such as
y
our ID, password, and
/
or credit card numbers.
A malicious third-part
y
ma
y
access
y
our personal or corporate network without authorization and en
g
a
g
e in the
f
ollowin
g
t
y
pes o
f
behavior.
R
etrieve personal and
/
or secret in
f
ormation
(
in
f
ormation leak
)
S
pread false information b
y
impersonatin
g
a particular person
(
spoofin
g)
O
verwrite intercepted communications and issue false data
(
tamperin
g)
S
pread harm
f
ul so
f
tware such as a computer virus and crash
y
our data and
/
or s
y
stem
(
s
y
stem crash
)
S
ince most wireless LAN adapters or access points are equipped with securit
y
f
eatures to take care o
f
these problems,
y
ou can reduce the possibilit
y
of these problems occurrin
g
when usin
g
this product b
y
makin
g
the appropriate securit
y
s
ettin
g
s for the wireless LAN device.
S
ome wireless LAN devices ma
y
not be set
f
or securit
y
immediatel
y
a
f
ter purchase. To decrease the possibilit
y
o
f
occurrence of securit
y
problems, before usin
g
an
y
wireless LAN devices, be absolutel
y
sure to make all securit
y
-related
s
ettin
g
s accordin
g
to the instructions
g
iven in the operation manuals supplied with them.
Dependin
g
on the speci
f
ications o
f
the wireless LAN, a malicious third-part
y
ma
y
be able to break securit
y
settin
g
s b
y
s
pec
i
a
l
means
.
Please contact Panasonic i
f
y
ou need help takin
g
care o
f
securit
y
settin
g
s or other such
.
If
y
ou cannot perform securit
y
settin
g
s for
y
our wireless LAN b
y
y
ourself, please contact the Panasonic Support Center
.
Panasonic asks customers to thorou
g
hl
y
understand the risk o
f
usin
g
this product without makin
g
securit
y
settin
g
s, and
r
ecommends that the customer make securit
y
settin
g
s at their own discretion and responsibilit
y
.

Related product manuals