Nokia 002L102 User Manual - Page 146
Security settings, Phone and SIM, Certificate management
View all Nokia 002L102 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 146 highlights
Settings Make sure that the device battery has enough is entered. To turn off the autolock period, select power, or connect the charger before starting the None. update. ● Lock if SIM card changed - You can set the device to ask for the lock code when an unknown Security settings SIM card is inserted into your device. The device Phone and SIM Select Menu > Settings and Phone > Phone mgmt. > Security settings > Phone and SIM maintains a list of SIM cards that are recognised as the owner's cards. ● Remote phone locking - Enable or disable remote lock. card. ● Closed user group - You can specify a group Select from the following: ● PIN code request - When active, the code is requested each time the device is switched on. Deactivating the PIN code request may not be allowed by some SIM cards. of people to whom you can call and who can call you (network service). ● Confirm SIM services - You can set the device to display confirmation messages when you are using a SIM card service (network service). ● PIN code, PIN2 code, and Lock code - You can change the PIN code, PIN2 code, and lock code. These codes can only include numbers from 0 to 9. Avoid using access codes similar to the emergency numbers to prevent accidental dialling of the emergency number. If you forget the PIN or PIN2 code, contact your service provider. If you forget the lock code, contact a Nokia Care point or your service provider. ● Phone autolock period - To avoid unauthorised use, you can set a time-out after which the device automatically locks. A locked device cannot be used until the correct lock code Certificate management Select Menu > Settings and Phone > Phone mgmt. > Security settings > Certificate management. Digital certificates should be used if you want to connect to an online bank or another site or remote server for actions that involve transferring confidential information. They should also be used if you want to reduce the risk of viruses or other malicious software and be sure of the authenticity of software when downloading and installing software. 146 Select from the following: