UTStarcom Sidekick ID Reference Manual page 71

Utstar sidekick id: reference guide
Table of Contents

Advertisement

Anonymous Information
Danger collects and stores Anonymous Information relating to the use of the Danger Service. For example,
Danger's servers automatically gather information regarding which Web pages are visited by users of the
Danger Service. In addition, Danger collects data regarding subscribers' usage of various features of the
Service, such as how many email messages or IM messages are sent by a particular user or by users in the
aggregate, the most popular Web sites visited by users of the Service, the number of Web pages viewed
at the Danger Service Web Site, and other similar information. Similarly, for network monitoring purposes,
the Danger Service records how many devices in the aggregate are connected to the Service in particular
geographic locations, but the Service does not identify the location of individual devices or subscribers. All
of this Anonymous Information gathered from your use of the Danger Service is stored by Danger under an
automatically generated identification number that will not be linked to your name or your other Personal
Information without your consent, except as specifically provided in the "Use of Anonymous Information"
section below.
Private Data and Online Communications
Danger stores certain information on its servers at your request. As described above, you may request that
Danger retrieve email messages from email accounts maintained by third parties. The content of instant
messaging conversations may also be temporarily stored on Danger's servers pending delivery to your wire-
less device. In addition, you may store addresses, calendar information, to do lists, notes, and photographs
on the Danger Service, either through your wireless device or by uploading such information at the Danger
Service Web Site. If you input such information directly on your wireless device, it is automatically synchro-
nized with and stored on Danger's servers and is available to you through both the device and the Danger
Service Web Site.
HOW DOES DANGER USE THE INFORMATION IT COLLECTS?
Personal Information
Danger collects and uses Personal Information to (a) operate and deliver the Danger Service, (b) process or
collect payments and for other billing purposes, (c) to assist with questions about use of the Danger Service,
(d) to anticipate and resolve problems with your use of the Danger Service, and (e) to alert you to new
products, product upgrades, software upgrades, changes to the service, technical and administrative issues,
special offers and other information related to the Danger Service.
Anonymous Information
Danger uses Anonymous Information to effectively operate the Danger Service and enhance your experi-
ence using the Service. For example, Danger stores cached versions of the Web sites that are most frequent-
ly visited by users of the Service, so that you can access them more quickly. Danger also uses Anonymous
Information to understand how certain features of our Service are being used and to measure the costs of
providing certain features. We may also use Anonymous Information to diagnose and correct problems with
the Danger Service. In some cases, it may be necessary to link Anonymous Information relating to your use
of the Service with you individually in order to correct problems that you may be experiencing with the Dan-
ger Service. In general, the collection and use of Anonymous Information allows Danger to analyze the use
of the Danger Service to continue to develop and provide improved features and services to our subscribers.
Private Data and Online Communications
Danger honors the confidentiality of your private communications and other private data, whether it is
through instant messaging conversations, email messages, or other data stored at your request, such as ad-
dresses and calendar information. Danger will not read or disclose to third parties private communications
that are transmitted using the Danger Service or private data stored at your request, except as required to
operate the service or as otherwise provided in the "Special Circumstances" section below.
Legal Information
71

Advertisement

Table of Contents
loading

Table of Contents