Protection Of Your Wireless Transactions - Palm i705 Handbook

Hide thumbs Also See for i705:
Table of Contents

Advertisement

Using Wireless Features
To restore the initial proxy server setting, tap Default.

Protection of your wireless transactions

Your handheld uses next generation encryption technology. This encryption
technology secures the transmission of sensitive information such as passwords
that are sent over the network. Data is protected both when sent from your
handheld over the network and when coming in from the Internet to your
handheld.
When a wireless transaction is secured, the command button that initiates the
transaction is marked not only by the over-the-air icon, but also by the security
icon.
Encryption makes your data unreadable by anyone but the intended recipient.
Encryption is done using a technology used in a wide variety of consumer
handheld devices and enterprise applications.
It's not unusual to experience a delay of several seconds when a wireless
transaction is being encrypted.
In addition to the protection provided by the encryption technology, individual
web clipping applications may add another layer of protection to their
transactions. For example, a web clipping application may require you to create
and use a password to access sensitive information (for example, your checking
account).
46
Tap here
The security icon indicates that your
transmission is encrypted

Advertisement

Table of Contents
loading

Table of Contents