Alcatel OneTouch Pop 8 LTE User Manual page 73

Table of Contents

Advertisement

in your jurisdiction or other jurisdiction(s) where you will use
your device regarding taking photographs and recording sounds
with your device. Pursuant to such laws and regulations, it may be
strictly forbidden to take photographs and/or to record the voices
of other people or any of their personal attributes, and duplicate
or distribute them, as this may be considered to be an invasion
of privacy. It is the user's sole responsibility to ensure that prior
authorization be obtained, if necessary, in order to record private or
confidential conversations or take a photograph of another person;
the manufacturer, the seller or vendor of your device (including the
operator) disclaim any liability which may result from the improper
use of the device.
Please note by using this device some of your personal data may
be shared with the main device (smartphone). It is under your own
responsibility to protect your own personal data, not to share with
it with any unauthorized devices or third party devices connected
to yours. For products with Wi-Fi features, only connect to trusted
Wi-Fi networks. Also when using your product as a hotspot
(where available), use network security. These precautions will
help prevent unauthorized access to your device. Your product can
store personal information in various locations including a SIM card,
memory card, and built-in memory. Be sure to remove or clear
all personal information before you recycle, return, or give away
your product. Choose your apps and updates carefully, and install
from trusted sources only. Some apps can impact your product's
performance and/or have access to private information including
account details, call data, location details and network resources.
Note that any data shared with TCL Communication Ltd. is stored
in accordance with applicable data protection legislation. For these
purposes TCL Communication Ltd. implements and maintains
appropriate technical and organizational measures to protect
all personal data, for example against unauthorized or unlawful
processing and accidental loss or destruction of or damage to such
personal data whereby the measures shall provide a level of security
that is appropriate having regard to (i) the technical possibilities
70

Advertisement

Table of Contents
loading

Table of Contents