Wireless communication is liable to communication based misuse, including but not limited to jamming, spoofing, and repeating. An unsecured connection can expose users to RF-based attacks if signal not protected/encrypted. These types of attacks are very difficult to prevent, but are extremely common and must be accounted for. The device should be a contained system, with as few entry points as possible for tampering with communication. Preventing unauthorized entry to the users computer through RF attacks is also a necessity to protect the users computer.
Some issues may arise during the useful life of the product. In this section we identify potential hazards and look at ways to avoid these.
Electronic devices and battery - based devices may need special disposal to avoid causing fires.