x
Control your accounts frequently to avoid any suspicious or non-
authorized use. If you find any indication of your personal information
not being used appropriately, contact your services supplier to delete or
change the information in your account.
x
If you lose the device or it is stolen, change the passwords of your
accounts to protect your personal information.
x
Avoid using applications from unknown sources and block the device
with a pattern, a password or a PIN.
%P OPU EJTUSJCVUF NBUFSJBM QSPUFDUFE XJUI DPQZSJHIU
Do not distribute material protected with copyright without the authorization of
the content owners. If you do so, you may violate copyright laws. The manufacturer
will not be held responsible for any legal problem caused by illegal use of material
protected by the user.
.BMXBSF BOE WJSVT
'PMMPX UIFTF TVHHFTUJPOT UP QSPUFDU UIF EFWJDF BHBJOTU NBMXBSF BOE WJSVT *G
ZPV EP OPU EP TP ZPV NBZ DBVTF EBNBHFT PS MPTT PG EBUB UIBU NBZ OPU CF
DPWFSFE VOEFS UIF XBSSBOUZ
x
Do not download unknown applications.
x
Do not use unreliable websites.
x
Delete any suspicious text messages or emails from unknown senders.
x
Create a password and change it regularly.
x
Deactivate the wireless functions, such as Bluetooth, when you are not
using them.
x
If the device behaves strangely, execute an antivirus program to detect a
possible infection.
x
Execute an antivirus program on the device before starting applications
and files that you just downloaded.
x
Install anti-virus programs on your computer and execute them
regularly to detect any possible infections.
x
Do not edit the registration adjustments or change the device’s
operating system.
*OGPSNBUJPO BCPVU UIF DFSUJGJDBUJPO PG UIF 4QFDJGJD "CTPSQUJPO 3BUF 4"3