Motorola EX Getting Started Guide - Page 51
Privacy & data security, Call roadside assistance or a special non-emergency wireless
View all Motorola EX manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 51 highlights
• Call roadside assistance or a special non-emergency wireless assistance number when necessary. If you see a broken-down vehicle posing no serious hazard, a broken traffic signal, a minor traffic accident where no one appears injured or a vehicle you know to be stolen, call roadside assistance or another special non-emergency wireless number (wherever wireless phone service is available). Privacy & data security Motorola Privacy&datasecurity understands that privacy and data security are important to everyone. Given that some features of your mobile device may affect your privacy or data security, please follow these recommendations to enhance protection of your information: • Monitor access-Keep your mobile device with you and do not leave it where others may have unmonitored access. Lock your device's keypad where this feature is available. • Keep software up to date-If Motorola or a software/application vendor releases a patch or software fix for your mobile device that updates the device's security, install it as soon as possible. • Secure personal information-Your mobile device can store personal information in various locations including your SIM card, memory card and phone memory. Be sure to remove or clear all personal information before you recycle, return or give away your device. You can also back up your personal data to transfer to a new device. Note: For information on how to back up or wipe data from your mobile device, go to www.motorola.com/support • Online accounts-Some mobile devices provide a Motorola online account (such as MOTOBLUR). Go to your account for information on how to manage the account and how to use security features such as remote wipe and device location (where available). • Applications-Install third party applications from trusted sources only. Applications can have access to private information such as call data, location details and network resources. 49