10
• This device may not cause harmful interference;
• This device must accept any interference received, including interference that may
cause undesired operation.
Your phone is equipped with a built-in antenna. For optimal operation, you
should avoid touching it or degrading it.
As mobile devices offer a range of functions, they can be used in positions other
than against your ear. In such circumstances the device will be compliant with
the guidelines when used with a headset or usb data cable.
If you are using another accessory ensure that whatever product is used is free
of any metal and that it positions the phone at least 15 mm away from the body.
Please note by using the device some of your personal data may be shared
with the main device. It is under your own responsibility to protect your
own personal data, not to share with it with any unauthorized devices or
third party devices connected to yours. For products with Wi-Fi features,
only connect to trusted Wi-Fi networks. Also when using your product as a
hotspot (where available), use network security. These precautions will help
prevent unauthorized access to your device. Your product can store personal
information in various locations including a SIM card, memory card, and
built-in memory. Be sure to remove or clear all personal information before
you recycle, return, or give away your product. Choose your apps and updates
carefully, and install from trusted sources only. Some apps can impact your
product’s performance and/or have access to private information including
account details, call data, location details and network resources.
Note that any data shared with TCL Communication Ltd. is stored in
accordance with applicable data protection legislation. For these purposes
TCL Communication Ltd. implements and maintains appropriate technical
and organizational measures to protect all personal data, for example against
unauthorized or unlawful processing and accidental loss or destruction of or
damage to such personal data whereby the measures shall provide a level of
security that is appropriate having regard to
• The technical possibilities available;
• The costs for implementing the measures;
• The risks involved with the processing of the personal data, and;
• The sensitivity of the personal data processed.