Motorola EX EX124G - Getting Started Guide - Page 60
Secure Personal Information, Call roadside assistance or a special non-emergency wireless
View all Motorola EX manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 60 highlights
• Call roadside assistance or a special non-emergency wireless assistance number when necessary. If you see a broken-down vehicle posing no serious hazard, a broken traffic signal, a minor traffic accident where no one appears injured, or a vehicle you know to be stolen, call roadside assistance or other special non-emergency wireless number (wherever wireless phone service is available). Privacy & Data Security Motorola Privacy&DataSecurity understands that privacy and data security are important to everyone. Because some features of your mobile device may affect your privacy or data security, please follow these recommendations to enhance protection of your information: • Monitor access-Keep your mobile device with you and do not leave it where others may have unmonitored access. Lock your device's keypad where this feature is available. • Keep software up to date-If Motorola or a software/application vendor releases a patch or software fix for your mobile device that updates the device's security, install it as soon as possible. • Secure Personal Information-Your mobile device can store personal information in various locations including your SIM card, memory card, and phone memory. Be sure to remove or clear all personal information before you recycle, return, or give away your device. You can also backup your personal data to transfer to a new device. Note: For information on how to backup or wipe data from your mobile device, go to www.motorola.com/support • Online accounts-Some mobile devices provide a Motorola online account (such as MOTOBLUR). Go to your account for information on how to manage the account, and how to use security features such as remote wipe and device location (where available). • Applications-Install third party applications from trusted sources only. Applications can have access to private information such as call data, location details and network resources. 58