6Limitation of liabilityTHIS PUBLICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, ORNON-INFRINGEMENT OF THE THIRD PARTY’S RIGHT.THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS.CHANGES ARE ADDED TO THE INFORMATION HEREIN, AT ANY TIME, FOR THE IMPROVEMENTS OF THIS PUBLICATIONAND/OR THE CORRESPONDING PRODUCT(S).Introduction (continued)Network securityAs you will use this unit connected to a network, your attention is called to the following security risks.① Leakage or theft of information through this unit② Use of this unit for illegal operations by persons with malicious intent③ Interference with or stoppage of this unit by persons with malicious intentIt is your responsibility to take precautions such as those described below to protect yourself against the above network security risks.• Use this unit in a network secured by a firewall, etc.• If this unit is connected to a network that includes PCs, make sure that the system is not infected by computer viruses orother malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).• Protect your network against unauthorized access by restricting users to those who log in with an authorized user name andpassword set by using user authentication.• Change the administrator password periodically. Keep the authentication information (your user name and password) in asafe place free from public view.