Samsung GH68-38783A 用户手册

下载
页码 141
MANUAL SHALL BE CONSTRUED TO CREATE AN EXPRESS OR IMPLIED WARRANTY OF ANY KIND WHATSOEVER WITH RESPECT TO THE 
PRODUCT. IN ADDITION, SAMSUNG SHALL NOT BE LIABLE FOR ANY DAMAGES OF ANY KIND RESULTING FROM THE PURCHASE OR USE OF 
THE PRODUCT OR ARISING FROM THE BREACH OF THE EXPRESS WARRANTY, INCLUDING INCIDENTAL, SPECIAL OR CONSEQUENTIAL 
DAMAGES, OR LOSS OF ANTICIPATED PROFITS OR BENEFITS.
SAMSUNG IS NOT LIABLE FOR PERFORMANCE ISSUES OR INCOMPATIBILITIES CAUSED BY YOUR EDITING OF REGISTRY SETTINGS, OR 
YOUR MODIFICATION OF OPERATING SYSTEM SOFTWARE. 
USING CUSTOM OPERATING SYSTEM SOFTWARE MAY CAUSE YOUR DEVICE AND APPLICATIONS TO WORK IMPROPERLY. YOUR CARRIER 
MAY NOT PERMIT USERS TO DOWNLOAD CERTAIN SOFTWARE, SUCH AS CUSTOM OS. IF YOUR CARRIER PROHIBITS THIS, IF YOU ATTEMPT 
TO DOWNLOAD SOFTWARE ONTO THE DEVICE WITHOUT AUTHORIZATION, YOU WILL BE NOTIFIED ON THE SCREEN THAT THE DEVICE WILL 
NO LONGER OPERATE AND BE INSTRUCTED TO POWER DOWN THE DEVICE. YOU MUST THEN CONTACT YOUR CARRIER TO RESTORE THE 
DEVICE TO THE CARRIER-AUTHORIZED SETTINGS.
SAFE™ ("Samsung Approved For Enterprise"): TO THE FULL EXTENT PERMITTED BY LAW SAMSUNG ELECTRONICS CO., LTD., 
SAMSUNG TELECOMMUNICATIONS AMERICA, LLC, AND THEIR AFFILIATES (COLLECTIVELY REFERRED TO HEREIN AS THE 
"SAMSUNG ENTITIES") EXPRESSLY DISCLAIM ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTY OF 
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, INTEROPERABILITY OR NON-INFRINGEMENT, WITH RESPECT TO 
INFORMATION TECHNOLOGY SECURITY PROTECTION, SAFE™ APPROVED DEVICES AND SAFE™ APPROVED APPLICATIONS. IN NO 
EVENT SHALL THE SAMSUNG ENTITIES BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL 
DAMAGES OF ANY KIND WHATSOEVER WITH RESPECT TO INFORMATION TECHNOLOGY SECURITY PROTECTION, SAFE™ 
APPROVED DEVICES OR SAFE™ APPROVED APPLICATIONS. In addition, information technology security protection will be affected 
by features or functionality associated with, among other things the e-mail platform, master data management, and virtual private 
network solutions selected by the software provider, solution provider or user. Choice of an e-mail, master data management, and 
virtual private network solution is at the sole discretion of the software provider, solution provider or user and any associated 
effect on information technology security protection is solely the responsibility of the software provider, solution provider or user. 
i705_UM_.book  Page 3  Wednesday, March 20, 2013  6:54 PM