Motorola Mobility LLC T56MG1 Manual Do Utilizador

Página de 73
52
Privacy & Data Security
Privacy & Data Security
Motorola understands that privacy and data security are important to everyone. 
Because some features of your mobile device may affect your privacy or data 
security, please follow these recommendations to enhance protection of your 
information:
• Monitor access—Keep your mobile device with you and do not leave it where 
others may have unmonitored access. Lock your device’s keypad where this 
feature is available.
• Keep software up to date—If Motorola or a software/application vendor 
releases a patch or software fix for your mobile device that updates the device’s 
security, install it as soon as possible.
• Secure Personal Information—Your mobile device can store personal 
information in various locations including your SIM card, memory card, and 
phone memory. Be sure to remove or clear all personal information before you 
recycle, return, or give away your device. You can also backup your personal data 
to transfer to a new device.
Note: For information on how to backup or wipe data from your mobile device, 
go to www.motorola.com/support
• Online accounts—Some mobile devices provide a Motorola online account 
(such as MOTOBLUR). Go to your account for information on how to manage the 
account, and how to use security features such as remote wipe and device 
location (where available).
• Applications—Install third party applications from trusted sources only. 
Applications can have access to private information such as call data, location 
details and network resources.
• Location-based information—Location-based information includes 
information that can be used to determine the approximate location of a mobile 
device. Mobile phones which are connected to a wireless network transmit 
location-based information. Devices enabled with GPS or AGPS technology also 
transmit location-based information. Additionally, if you use applications that 
require location-based information (e.g. driving directions), such applications 
transmit location-based information. This location-based information may be