Download  Print this page

Samsung Galaxy S III mini User Manual Page 3

4g lte smartphone.
Hide thumbs

Advertisement

Table of Contents
ITS FITNESS FOR ANY PARTICULAR PURPOSE OR USE; THE DESIGN, CONDITION OR QUALITY OF THE PRODUCT; THE
PERFORMANCE OF THE PRODUCT; THE WORKMANSHIP OF THE PRODUCT OR THE COMPONENTS CONTAINED THEREIN; OR
COMPLIANCE OF THE PRODUCT WITH THE REQUIREMENTS OF ANY LAW, RULE, SPECIFICATION OR CONTRACT PERTAINING
THERETO. NOTHING CONTAINED IN THE INSTRUCTION MANUAL SHALL BE CONSTRUED TO CREATE AN EXPRESS OR IMPLIED
WARRANTY OF ANY KIND WHATSOEVER WITH RESPECT TO THE PRODUCT. IN ADDITION, SAMSUNG SHALL NOT BE LIABLE FOR
ANY DAMAGES OF ANY KIND RESULTING FROM THE PURCHASE OR USE OF THE PRODUCT OR ARISING FROM THE BREACH OF
THE EXPRESS WARRANTY, INCLUDING INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, OR LOSS OF ANTICIPATED PROFITS
OR BENEFITS.
Modification of Software
SAMSUNG IS NOT LIABLE FOR PERFORMANCE ISSUES OR INCOMPATIBILITIES CAUSED BY YOUR EDITING OF REGISTRY SETTINGS,
OR YOUR MODIFICATION OF OPERATING SYSTEM SOFTWARE.
USING CUSTOM OPERATING SYSTEM SOFTWARE MAY CAUSE YOUR DEVICE AND APPLICATIONS TO WORK IMPROPERLY. YOUR
CARRIER MAY NOT PERMIT USERS TO DOWNLOAD CERTAIN SOFTWARE, SUCH AS CUSTOM OS.
IF YOUR CARRIER PROHIBITS THIS, IF YOU ATTEMPT TO DOWNLOAD SOFTWARE ONTO THE DEVICE WITHOUT AUTHORIZATION,
YOU WILL BE NOTIFIED ON THE SCREEN THAT UNAUTHORIZED SOFTWARE HAS BEEN DETECTED. YOU SHOULD THEN POWER
DOWN THE DEVICE AND CONTACT YOUR CARRIER TO RESTORE THE DEVICE TO THE CARRIER AUTHORIZED SETTINGS.
SAFE™ (Samsung Approved For Enterprise)
SAFE™: "SAFE™" (Samsung for Enterprise) is a mark for a Samsung device which has been tested against Samsung's own
internal criteria for interoperability with certain third party security-related solutions for MDM and VPN. The testing includes field
testing with local network connection and menu tree testing which tests functionality of the solutions in conjunction with the
Samsung device. During the testing, the device is tested with the security solutions to see if the solutions work with the device as
described by the third party security solution providers. The testing, for example, includes field testing with local network

Advertisement

Table of Contents

Comments to this Manuals

Symbols: 0
Latest comments: