597062
94
Zoom out
Zoom in
Vorherige Seite
1/101
Nächste Seite
send and receive. You may also retrieve email from your existing email accounts with third party services
by using protocols such as “POP”. When you set up mail accounts through the Danger Service, Danger
collects the email addresses and other information associated with these accounts and stores the content
of the email messages sent to these accounts on its servers.
Personal Information may also be collected at other times by specifically requesting it from you, such
as when you order premium services, when you request other promotional material, when we ask you to
complete customer surveys, and in other circumstances when you interact with the Danger Service or our
employees, agents and contractors working to provide the Danger Service to you.
Anonymous Information
Danger collects and stores Anonymous Information relating to the use of the Danger Service. For example,
Danger’s servers automatically gather information regarding which Web pages are visited by users of the
Danger Service. In addition, Danger collects data regarding subscribers’ usage of various features of the
Service, such as how many email messages or IM messages are sent by a particular user or by users in the
aggregate, the most popular Web sites visited by users of the Service, the number of Web pages viewed
at the Danger Service Web Site, and other similar information. Similarly, for network monitoring purposes,
the Danger Service records how many devices in the aggregate are connected to the Service in particular
geographic locations, but the Service does not identify the location of individual devices or subscrib-
ers. All of this Anonymous Information gathered from your use of the Danger Service is stored by Danger
under an automatically generated identification number that will not be linked to your name or your other
Personal Information without your consent, except as specifically provided in the “Use of Anonymous
Information” section below.
Private Data and Online Communications
Danger stores certain information on its servers at your request. As described above, you may request that
Danger retrieve email messages from email accounts maintained by third parties. The content of instant
messaging conversations may also be temporarily stored on Danger’s servers pending delivery to your
wireless device. In addition, you may store addresses, calendar information, to do lists, notes, and photo-
graphs on the Danger Service, either through your wireless device or by uploading such information at the
Danger Service Web Site. If you input such information directly on your wireless device, it is automatically
synchronized with and stored on Danger’s servers and is available to you through both the device and the
Danger Service Web Site.
HOW DOES DANGER USE THE INFORMATION IT COLLECTS?
Use of Personal Information
Danger collects and uses Personal Information to (a) operate and deliver the Danger Service, (b) process
or collect payments and for other billing purposes, (c) to assist with questions about use of the Danger
Service, (d) to anticipate and resolve problems with your use of the Danger Service, and (e) to alert you to
new products, product upgrades, software upgrades, changes to the service, technical and administrative
issues, special offers and other information related to the Danger Service.
Use of Anonymous Information
Danger uses Anonymous Information to effectively operate the Danger Service and enhance your
experience using the Service. For example, Danger stores cached versions of the Web sites that are most
frequently visited by users of the Service, so that you can access them more quickly. Danger also uses
Anonymous Information to understand how certain features of our Service are being used and to measure
the costs of providing certain features. We may also use Anonymous Information to diagnose and correct
94 Legal Information
94

Brauchen Sie Hilfe? Stellen Sie Ihre Frage.

Forenregeln

Missbrauch melden von Frage und/oder Antwort

Libble nimmt den Missbrauch seiner Dienste sehr ernst. Wir setzen uns dafür ein, derartige Missbrauchsfälle gemäß den Gesetzen Ihres Heimatlandes zu behandeln. Wenn Sie eine Meldung übermitteln, überprüfen wir Ihre Informationen und ergreifen entsprechende Maßnahmen. Wir melden uns nur dann wieder bei Ihnen, wenn wir weitere Einzelheiten wissen müssen oder weitere Informationen für Sie haben.

Art des Missbrauchs:

Zum Beispiel antisemitische Inhalte, rassistische Inhalte oder Material, das zu einer Gewalttat führen könnte.

Beispielsweise eine Kreditkartennummer, persönliche Identifikationsnummer oder unveröffentlichte Privatadresse. Beachten Sie, dass E-Mail-Adressen und der vollständige Name nicht als private Informationen angesehen werden.

Forenregeln

Um zu sinnvolle Fragen zu kommen halten Sie sich bitte an folgende Spielregeln:

Neu registrieren

Registrieren auf E - Mails für Sharp Sidekick Gekko wenn:


Sie erhalten eine E-Mail, um sich für eine oder beide Optionen anzumelden.


Das Handbuch wird per E-Mail gesendet. Überprüfen Sie ihre E-Mail.

Wenn Sie innerhalb von 15 Minuten keine E-Mail mit dem Handbuch erhalten haben, kann es sein, dass Sie eine falsche E-Mail-Adresse eingegeben haben oder dass Ihr ISP eine maximale Größe eingestellt hat, um E-Mails zu erhalten, die kleiner als die Größe des Handbuchs sind.

Ihre Frage wurde zu diesem Forum hinzugefügt

Möchten Sie eine E-Mail erhalten, wenn neue Antworten und Fragen veröffentlicht werden? Geben Sie bitte Ihre Email-Adresse ein.



Info