27
FCC/IC Notice
Models:CD1100 and CD1107 (including WLAN Module Model WM317, FCC ID:AZD317)
This equipment complies with FCC/IC radiation exposure limits set forth for an uncontrolled environment and
meets the FCC radio frequency (RF) Exposure Guidelines in Supplement C to OET65 and RSS - 102 of the IC
radio frequency (RF) Exposure rules. This equipment should be installed and operated keeping the radiator at
least 20cm or more away from person’s body (excluding extremities: hands, wrists, feet and ankles).
This device complies with Part 15 of FCC Rules and Industry Canada licence-exempt RSS standard(s). Operation
is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must
accept any interference, including interference that may cause undesired operation of this device.
This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter.
Security
Wireless LANs communicate using radio waves; therefore, the users must pay more attention to security than
they would for wired LANs.
Pay attention to the following when using wireless LANs.
O Use the network that you are authorized to use.
This product searches for wireless networks nearby and displays them on the screen.
Therefore, the list may include networks unknown to you and you have no authorization to use them. It
may be deemed illegal access if you attempt to connect to these networks or if you connect and use these
networks. Use the authorized networks only and do not connect to any other networks.
The following may occur if appropriate security measures are not applied.
O Eavesdropping
Malicious third parties may eavesdrop on wireless LAN radio transmissions and access data information.
O Illegal access to the network
Malicious third parties may illegally intrude into your network and cause damage such as eavesdropping,
falsication, or destruction.
Also, the third party may use your network for "spoong" in which they impersonate someone else and
transmit illegal information, or use it as a relay point or "stepping stone" to illegally access other subjects.
In order to reduce the possibility of such issues, apply measures and use functions to implement wireless
LAN security.
We recommend you to understand wireless LAN security and implement it with consideration to balanced
convenience and risk when using the wireless LAN function of this product.
While Printing
Do not shut down the communication until printing is complete. If you shut down the communication
prematurely, the printing result may be incomplete or incorrect.
COPY