FCC/IC Notice

Model: CD1112 (including WLAN Module Model WM318, FCC ID: AZD318)

This equipment complies with FCC/IC radiation exposure limits set forth for an uncontrolled environment and meets the FCC radio frequency (RF) Exposure Guidelines in Supplement C to OET65 and RSS - 102 of the IC radio frequency (RF) Exposure rules. This equipment should be installed and operated keeping the radiator at least 20cm or more away from person’s body (excluding extremities: hands, wrists, feet and ankles).

This device complies with Part 15 of FCC Rules and Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device.

This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter.

Security Precautions

Because Wi-Fi uses radio waves to transmit signals, security precautions more stringent than when using a LAN cable are required.

Keep the following points in mind when using Wi-Fi.

Use only networks you are authorized to use.

This product searches for Wi-Fi networks in the vicinity and displays the results on the screen.

Networks you are not authorized to use (unknown networks) may also be displayed. However, attempting to connect to or using such networks could be regarded as unauthorized access. Be sure to use only networks you are authorized to use, and do not attempt to connect to other unknown networks.

If security settings have not been properly set, the following problems may occur.

Transmission monitoring

Third parties with malicious intent may monitor Wi-Fi transmissions and attempt to acquire the data you are sending.

Unauthorized network access

Third parties with malicious intent may gain unauthorized access to the network you are using to steal, modify, or destroy information. Additionally, you could fall victim to other types of unauthorized access such as impersonation (where someone assumes an identity to gain access to unauthorized information) or springboard attacks (where someone gains unauthorized access to your network as a springboard to cover their tracks when infiltrating other systems).

To prevent these types of problems from occurring, be sure to thoroughly secure your Wi-Fi network.

Only use this product’s Wi-Fi function with a proper understanding of Wi-Fi security, and balance risk and convenience when adjusting security settings.

While rinting

Do not disconnect the printer from other devices until printing is finished, which may cause incomplete or incorrect prints.

This product can print using PictBridge over wireless LANs. PictBridge technical standards facilitate direct connection of cameras, printers, and other devices for easy printing. Support for the PictBridge DPS over IP standard enables the product to print wirelessly in network environments.

Cover

Contents

Part Names

Basic Operations

Print Settings

Printing via Wi-Fi

Printing via USB Cable

Troubleshooting

Appendix

64