UTStarcom SideKick II Reference Manual page 66

Utstar sidekick ii: reference guide
Table of Contents

Advertisement

Private Data and Online Communications
Danger stores certain information on its servers at your request. As described above, you may request that Danger
retrieve email messages from email accounts maintained by third parties. The content of instant messaging conversa-
tions may also be temporarily stored on Danger's servers pending delivery to your wireless device. In addition, you may
store addresses, calendar information, to do lists, notes, and photographs on the Danger Service, either through your
wireless device or by uploading such information at the Danger Service Web Site. If you input such information directly
on your wireless device, it is automatically synchronized with and stored on Danger's servers and is available to you
through both the device and the Danger Service Web Site.
HOW DOES DANGER USE THE INFORMATION IT COLLECTS?
Personal Information
Danger collects and uses Personal Information to (a) operate and deliver the Danger Service, (b) process or collect
payments and for other billing purposes, (c) to assist with questions about use of the Danger Service, (d) to anticipate
and resolve problems with your use of the Danger Service, and (e) to alert you to new products, product upgrades,
software upgrades, changes to the service, technical and administrative issues, special offers and other information
related to the Danger Service.
Anonymous Information
Danger uses Anonymous Information to effectively operate the Danger Service and enhance your experience using
the Service. For example, Danger stores cached versions of the Web sites that are most frequently visited by users of
the Service, so that you can access them more quickly. Danger also uses Anonymous Information to understand how
certain features of our Service are being used and to measure the costs of providing certain features. We may also use
Anonymous Information to diagnose and correct problems with the Danger Service. In some cases, it may be neces-
sary to link Anonymous Information relating to your use of the Service with you individually in order to correct problems
that you may be experiencing with the Danger Service. In general, the collection and use of Anonymous Information
allows Danger to analyze the use of the Danger Service to continue to develop and provide improved features and
services to our subscribers.
Private Data and Online Communications
Danger honors the confidentiality of your private communications and other private data, whether it is through instant
messaging conversations, email messages, or other data stored at your request, such as addresses and calendar
information. Danger will not read or disclose to third parties private communications that are transmitted using the Dan-
ger Service or private data stored at your request, except as required to operate the Danger Service or as otherwise
provided in the "Special Circumstances" section below.
WITH WHOM DOES DANGER SHARE THE INFORMATION THAT IS COLLECTED?
Personal Information
Danger may share Personal Information with your wireless carrier to further the purposes described in the "How Does
Danger Use the Information it Collects" section above. Except in the very limited circumstances outlined in the "Special
Circumstances" section below, Danger does not share with your wireless carrier the contents of data you transmit
and/or store on the Danger Service, such as the contents of your address book, notes, tasks, pictures and the contents
of messages and emails you send and receive. Danger will not share your Personal Information with other third parties
without your consent, except in the very limited circumstances outlined in the "Special Circumstances" section below.
Your Personal Information is not otherwise sold, marketed or shared with third parties without your permission.
66
Legal Information

Advertisement

Table of Contents
loading

Table of Contents