5
Before use
Before use (continued)
IMPORTANT
Failure to provide the required personal computer
environment may slow down the delineation of
the images on the screen, make it impossible for
the web browser to work and cause other kinds of
problems.
When using Microsoft® Windows Vista® or Microsoft®
Windows® 7, refer to the “Notes on Windows Vista® /
Windows® 7” (page 90) for details on the personal computer
environment that is required and on the precautions and
other items.
Disclaimer of warranty
IN NO EVENT SHALL Panasonic Corporation BE LIABLE
TO ANY PARTY OR ANY PERSON, EXCEPT FOR
REPLACEMENT OR REASONABLE MAINTENANCE OF
THE PRODUCT, FOR THE CASES, INCLUDING BUT NOT
LIMITED TO BELOW:
ANY DAMAGE AND LOSS, INCLUDING WITHOUT
LIMITATION, DIRECT OR INDIRECT, SPECIAL,
CONSEQUENTIAL OR EXEMPLARY, ARISING OUT
OF OR RELATING TO THE PRODUCT;
PERSONAL INJURY OR ANY DAMAGE CAUSED BY
INAPPROPRIATE USE OR NEGLIGENT OPERATION
OF THE USER;
UNAUTHORIZED DISASSEMBLE, REPAIR OR
MODIFICATION OF THE PRODUCT BY THE USER;
INCONVENIENCE OR ANY LOSS ARISING WHEN
IMAGES ARE NOT DISPLAYED, DUE TO ANY
REASON OR CAUSE INCLUDING ANY FAILURE OR
PROBLEM OF THE PRODUCT;
ANY PROBLEM, CONSEQUENTIAL
INCONVENIENCE, OR LOSS OR DAMAGE, ARISING
OUT OF THE SYSTEM COMBINED BY THE DEVICES
OF THIRD PARTY;
LOSS OF REGISTERED DATA CAUSED BY ANY
FAILURE.
Network security
As you will use this unit connected to a network, your
attention is called to the following security risks.
Leakage or theft of information through this unit
Use of this unit for illegal operations by persons with
malicious intent
Interference with or stoppage of this unit by persons
with malicious intent
It is your responsibility to take precautions such as those
described below to protect yourself against the above
network security risks.
Use this unit in a network secured by a firewall, etc.
If this unit is connected to a network that includes PCs,
make sure that the system is not infected by computer
viruses or other malicious entities (using a regularly
updated antivirus program, anti-spyware program, etc.).
Protect your network against unauthorized access by
restricting users to those who log in with an authorized
user name and password.
Take measures by authenticating the users of the unit in
order to restrict access, for example, so that the setting
information contained inside the unit is not leaked over the
network.
Do not install the camera in locations where the camera or
the cables can be destroyed or damaged by persons with
malicious intent.
Refrain from connections that use public lines.
Usage restrictions
Use of the same segment is recommended for the network
in which the unit and the controller or personal computer are
connected.
If the equipment uses connections with different segments,
events based on the settings inherent to the network
equipment, for instance, may occur so check this thoroughly
prior to operation.