10
FCC/
ISED RF Exposure Statement
The available scienti c evidence does not show that any health problems are associated
with using low power wireless devices. There is no proof, however, that these low power
wireless devices are absolutely safe. Low power Wireless devices emit low levels of radio
frequency energy (RF) in the microwave range while being used. Whereas high levels of
RF can produce health e ects (by heating tissue), exposure of low-level RF that does not
produce heating e ects causes no known adverse health e ects. Many studies of low-
level RF exposures have not found any biological e ects. Some studies have suggested
that some biological e ects might occur, but such ndings have not been con rmed by
additional research. This product has been tested and found to comply with FCC/ISED
radiation exposure limits set forth for an uncontrolled environment and meets the FCC radio
frequency (RF) Exposure Guidelines and RSS-102 of the ISED radio frequency (RF) Exposure
rules. Please refer to the SAR test report that was uploaded to FCC website.
Notices for Customers in Europe
Hereby, Nikon Corporation declares that the radio equipment type
D3500 is in
compliance with Directive 2014/53/EU.
The full text of the EU declaration of conformity is available at the following
internet address: http://imaging.nikon.com/support/pdf/DoC_N1718.pdf.
Notice for Customers in Singapore
Trade Name:
Model: D3500
This device complies with radio-frequency regulations. The content of certi cation labels not
a xed to the device is given below.
Complies with
IMDA Standards
DA103423
Security
Although one of the bene ts of this product is that it allows others to freely connect for the
wireless exchange of data anywhere within its range, the following may occur if security is
not enabled:
• Data theft: Malicious third-parties may intercept wireless transmissions to steal user IDs,
passwords, and other personal information.
• Unauthorized access: Unauthorized users may gain access to the network and alter data
or perform other malicious actions. Note that due to the design of wireless networks,
specialized attacks may allow unauthorized access even when security is enabled.
• Unsecured networks: Connecting to open networks may result in unauthorized access. Use
secure networks only.