Sony Ericsson Xperia X1a Warranty Information - Page 6
Flight mode, Malware - software
View all Sony Ericsson Xperia X1a manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 6 highlights
permitted levels of radio wave exposure. The guidelines include a safety margin designed to assure the safety of all persons and to account for any variations in measurements. Specific Absorption Rate (SAR) is used to measure radio frequency energy absorbed by the body when using a phone. The SAR value is determined at the highest certified power level in laboratory conditions, but because the phone is designed to use the minimum power necessary to access the chosen network, the actual SAR level can be well below this value. There is no proof of difference in safety based on difference in SAR value. Products with radio transmitters sold in the US must be certified by the Federal Communications Commission (FCC). When required, tests are performed when the phone is placed at the ear and when worn on the body. For body-worn operation, the phone has been tested when positioned a minimum of 15 mm from the body without any metal parts in the vicinity of the phone or when properly used with an appropriate Sony Ericsson accessory and worn on the body. For more information about SAR and radio frequency exposure, go to: www.sonyericsson.com/health. Flight mode Bluetooth and WLAN functionality, if available in the device, can be enabled in Flight mode but may be prohibited onboard aircraft or in other areas where radio transmissions are prohibited. In such environments, please seek proper authorization before enabling Bluetooth or WLAN functionality even in Flight mode. Malware Malware (short for malicious software) is software that can harm the phone or other computers. Malware or harmful applications can include viruses, worms, spyware, and other unwanted programs. While the device does employ security measures to resist such efforts, Sony Ericsson does not warrant or represent that the device will be impervious to the introduction of malware. You can however reduce the risk of malware attacks by using 6 This is an Internet version of this publication. © Print only for private use.