UTStarcom SideKick 3 Reference Manual page 81

Utstar sidekick 3: reference guide
Table of Contents

Advertisement

Personal Information may also be collected at other times by specifically requesting it from you, such as when you order
premium services, when you request other promotional material, when we ask you to complete customer surveys, and
in other circumstances when you interact with the Danger Service or our employees, agents and contractors working to
provide the Danger Service to you.
Anonymous Information
Danger collects and stores Anonymous Information relating to the use of the Danger Service. For example, Danger's
servers automatically gather information regarding which Web pages are visited by users of the Danger Service. In
addition, Danger collects data regarding subscribers' usage of various features of the Service, such as how many email
messages or IM messages are sent by a particular user or by users in the aggregate, the most popular Web sites visited
by users of the Service, the number of Web pages viewed at the Danger Service Web Site, and other similar informa-
tion. Similarly, for network monitoring purposes, the Danger Service records how many devices in the aggregate are
connected to the Service in particular geographic locations, but the Service does not identify the location of individual
devices or subscribers. All of this Anonymous Information gathered from your use of the Danger Service is stored by Dan-
ger under an automatically generated identification number that will not be linked to your name or your other Personal
Information without your consent, except as specifically provided in the "Use of Anonymous Information" section below.
Private Data and Online Communications
Danger stores certain information on its servers at your request. As described above, you may request that Danger re-
trieve email messages from email accounts maintained by third parties. The content of instant messaging conversations
may also be temporarily stored on Danger's servers pending delivery to your wireless device. In addition, you may store
addresses, calendar information, to do lists, notes, and photographs on the Danger Service, either through your wireless
device or by uploading such information at the Danger Service Web Site. If you input such information directly on your
wireless device, it is automatically synchronized with and stored on Danger's servers and is available to you through both
the device and the Danger Service Web Site.
HOW DOES DANGER USE THE INFORMATION IT COLLECTS?
Personal Information
Danger collects and uses Personal Information to (a) operate and deliver the Danger Service, (b) process or collect pay-
ments and for other billing purposes, (c) to assist with questions about use of the Danger Service, (d) to anticipate and
resolve problems with your use of the Danger Service, and (e) to alert you to new products, product upgrades, software
upgrades, changes to the service, technical and administrative issues, special offers and other information related to the
Danger Service.
Anonymous Information
Danger uses Anonymous Information to effectively operate the Danger Service and enhance your experience using
the Service. For example, Danger stores cached versions of the Web sites that are most frequently visited by users of
the Service, so that you can access them more quickly. Danger also uses Anonymous Information to understand how
certain features of our Service are being used and to measure the costs of providing certain features. We may also use
Anonymous Information to diagnose and correct problems with the Danger Service. In some cases, it may be necessary
to link Anonymous Information relating to your use of the Service with you individually in order to correct problems that
you may be experiencing with the Danger Service. In general, the collection and use of Anonymous Information allows
Danger to analyze the use of the Danger Service to continue to develop and provide improved features and services to
our subscribers.
Legal Information
81

Advertisement

Table of Contents
loading

Table of Contents