9There are 3 sets of operating instructions for the WJ-ND200 as follows.• Installation Guide (book, these operating instructions)• Operating Instructions (PDF)• Setup Instructions (PDF)The "Installation Guide" contains descriptions of how to install/connect this unit, and descriptions of how to operate this unitwith the buttons on the front panel.Refer to the "Setup Instructions (PDF)" for descriptions of how to perform the required settings to operate this unit using a PCand how to connect to other devices.Adobe® Reader® is required to read the "Operating Instruction" and "Setup Instruction" on the provided CD-ROM.When the Adobe® Reader® is not installed on the PC, download the latest Adobe® Reader® from the Adobe web site andinstall it."WJ-ND200" or "ND200" shown in the illustrations used in these operating instructions indicate this unit or the WJ-ND200.• Microsoft, Windows, Internet Explorer, and ActiveX are either registered trademarks or trademarks of Microsoft Corporationin the United States and/or other countries.• Adobe and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United Statesand/or other countries.• Other names of companies and products contained in these operating instructions may be trademarks or registered trade-marks of their respective owners.As you will use this product connected to a network, your attention is called to the following security risks.1. Leakage or theft of information through this product2. Use of this product for illegal operations by persons with malicious intent3. Interference with or stoppage of this product by persons with malicious intentIt is your responsibility to take precautions such as those described below to protect yourself against the above networksecurity risks.• Use this product in a network secured by a firewall, etc.• If this product is connected to a network that includes PCs, make sure that the system is not infected by computerviruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).• Protect your network against unauthorized access by restricting users to those who log in with an authorized username and password.• Apply measures such as user authentication to protect your network against leakage or theft of information, includingimage data, authentication information (user names and passwords), alarm mail information, FTP server informationand DDNS server information.About these Operating InstructionsTrademarks and Registered TrademarksNetwork Security