Motorola I530 manual SIM Card Security

Models: I530

1 136
Download 136 pages 15.9 Kb
Page 20
Image 20

Getting Started

GHI Call Forward — Your phone is set JKL to forward calls. See “Call

Forwarding” on page 55.

vM Ringer Off — Your phone is set not to ring. See “Setting Your Phone to Vibrate” on page 59.

uSpeaker Off — Sets Direct Connect and Group Connect sound to come through the earpiece rather than through the speaker.

wy Messages — You have one or more messages. See “Messages” on page 51.

ljikT9 Text Input — You are using T9 mn Text Input to enter text. See

“Entering Text” on page 31.

DEF Internet — You are ready to browse the internet or are browsing the internet using a secure connection.

YZ Packet Data — You are ready to transfer packet data or are transferring packet data. See “Using Your Phone as a Modem” on page 80.

NO TTY — You are ready to use your phone to make calls using a teletypewriter device. See “Making TTY Calls” on page 81.

SIM Card Security

Your SIM card stores all your Contacts and protects your personal information. Since this information is stored on your SIM card, not in your phone, you can remove the information by removing your SIM card.

Note: Except for making emergency calls, your phone will not function without the SIM card.

To prevent unauthorized use of your phone, your SIM card is protected by a PIN that you enter each time the phone is powered on. You can change the PIN or turn off the requirement that it be entered.

12

Page 20
Image 20
Motorola I530 manual SIM Card Security