UTStarcom SideKick 3 Reference Manual page 83

Utstar sidekick 3: reference guide
Table of Contents

Advertisement

HOW CAN YOU UPDATE OR CORRECT YOUR INFORMATION?
Danger believes in and supports your right to access and edit the Personal Information you have provided us. You may
make such changes at the Danger Service Web Site.
DOES DANGER COLLECT INFORMATION FROM CHILDREN UNDER 13?
Danger currently does not knowingly collect or use Personal Information from children under 13, and Danger will not do
so in the future without first obtaining verifiable consent from their parents. Should a child whom Danger knows to be
under 13 send Personal Information to Danger, Danger will only use that information to respond directly to that child or
seek parental consent.
WHAT TYPES OF SECURITY MEASURES ARE IN PLACE TO PROTECT YOUR INFORMATION?
Danger maintains a variety of physical, electronic, and procedural safeguards to guard your information. For example,
information transmitted from your wireless device to the Danger Service is automatically encrypted for your protection.
Once your information reaches us, it resides on a server that is heavily guarded both physically and electronically. In
order to prevent unauthorized access into our systems, our servers sit behind an electronic firewall and are not directly
connected to the Internet. These technologies and methods increase the security and privacy of information traveling to,
from and within the Danger Service. While we cannot guarantee that loss, misuse or alteration of your data will not occur,
we work hard to prevent such occurrences.
Danger also safeguards Personal Information from unauthorized access. Only authorized Danger employees or agents
carrying out permitted business functions are permitted to access Personal Information. Employees who violate
Danger's privacy access policies are subject to disciplinary actions, including termination when appropriate. In addition,
Danger encourages all users of the Danger Service to review the privacy policies posted by the Web sites visited over
the Internet, including those linked to from the Danger Service, to ensure that these Web sites also protect Personal
Information. Danger is not responsible for Personal Information you provide to such sites or the privacy practices and
other polices of such sites.
DOES DANGER USE COOKIES?
Cookies are small text files that are placed on the hard drive of your computer by a Web site you visit. These files identify
your computer and record your preferences and other data about your visit so that when you return to the site, the site
knows who you are and can personalize your visit. In operating the Danger Service Web Site, Danger uses cookies to
personalize the site, improve your experience at the site, and to determine which areas and features of the site are most
popular. You may set your browser to reject cookies, but this may affect your ability to use some parts of the Danger
Service Web Site.
When you access the Internet using your wireless device, the Web sites you visit may use cookies. These cookies may be
physically placed on your wireless device, they may be transferred to Danger's servers or may be placed on servers oper-
ated by third-party Web site operators. This cookie-like functionality is in place for the same reasons and designed for the
same purposes as cookies installed on your computer, but information collected from cookies by third parties is subject
to their privacy practices rather than Danger's.
As technology advances and cookies provide more functionality, we may utilize them in different ways in the future. As
we do so, this Notice will be updated to provide you with more information.
Legal Information
83

Advertisement

Table of Contents
loading

Table of Contents