xxNotice for Customers in AlgeriaThis device complies with Part 15 of FCC Rules and Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions:(1) this device may not cause interference, and (2) this device must accept anyinterference, including interference that may cause undesired operation ofthe device.Co-locationThis transmitter must not be co-located or operated in conjunction with anyother antenna or transmitter.FCC/IC RF Exposure StatementThe available scientific evidence does not show that any health problems areassociated with using low power wireless devices. There is no proof, however,that these low power wireless devices are absolutely safe. Low power Wire-less devices emit low levels of radio frequency energy (RF) in the microwaverange while being used. Whereas high levels of RF can produce health effects(by heating tissue), exposure of low-level RF that does not produce heatingeffects causes no known adverse health effects. Many studies of low-level RFexposures have not found any biological effects. Some studies have sug-gested that some biological effects might occur, but such findings have notbeen confirmed by additional research. The 1 J5, which is equipped with aDW092 (FCC ID:EW4DW092 / IC ID:4634A-3149EC) wireless LAN module, hasbeen tested and found to comply with FCC/IC radiation exposure limits setforth for an uncontrolled environment and meets the FCC radio frequency(RF) Exposure Guidelines in Supplement C to OET65 and RSS-102 of the ICradio frequency (RF) Exposure rules. Please refer to the SAR test report thatwas uploaded to FCC website.SecurityAlthough one of the benefits of this product is that it allows others to freelyconnect for the wireless exchange of data anywhere within its range, the fol-lowing may occur if security is not enabled:• Data theft: Malicious third-parties may intercept wireless transmissions tosteal user IDs, passwords, and other personal information.• Unauthorized access: Unauthorized users may gain access to the networkand alter data or perform other malicious actions. Note that due the designof wireless networks, specialized attacks may allow unauthorized accesseven when security is enabled.