Motorola VE66 manual Privacy and Data Security

Models: VE66

1 110
Download 110 pages 57.4 Kb
Page 100
Image 100
Privacy and Data Security

Privacy and Data Security

Motorola understands that privacy and data security are important to everyone. Given that some features of your mobile device may affect your privacy or data security, please follow these recommendations to enhance protection of your information:

Monitor access—Keep your mobile device with you and do not leave it where others may have unmonitored access. Lock your device's keypad where this feature is available.

Keep software up to date—If Motorola or a software/application vendor releases a patch or software fix for your mobile device which updates the device's security, install it as soon as possible.

Erase before recycling—Delete personal information or data from your mobile device prior to disposing of it or turning it in for recycling. For step-by-step instructions on how to delete all personal information from your device, see the section entitled "master clear" or "delete data" in this user's guide.

Note: For information on backing up your mobile device data before erasing it, go to www.motorola.com and then navigate to the "downloads" section of the consumer web page for "Motorola Backup" or "Motorola Phone Tools."

Understanding AGPS—In order to comply with the emergency caller location requirements of Ofcom, certain Motorola mobile devices incorporate Assisted Global Positioning System (AGPS) technology. AGPS technology also can be used in non-emergency applications to track and monitor a user's location, for example, to provide driving directions. Users who prefer not to permit such

tracking and monitoring should avoid using such applications.

If you have further questions regarding how use of your mobile device may impact your privacy or data security, please contact Motorola at privacy@motorola.com, or contact your service provider.

98Privacy and Data Security

Page 100
Image 100
Motorola VE66 manual Privacy and Data Security, tracking and monitoring should avoid using such applications