597063
100
Zoom out
Zoom in
Vorherige Seite
1/106
Nächste Seite
Information that is collected by or sent to Microsoft by the Danger Service may be stored and processed in
the United States or any other country in which Microsoft or its affiliates, subsidiaries, or service providers
maintain facilities. Microsoft abides by the safe harbor framework as set forth by the U.S. Department of
Commerce regarding the collection, use, and retention of data from the European Union.
Collection and Use of Information about Your Computer or Wireless Device
When you use Internet-enabled features of the Danger Service, information about your computer or
wirless device (“standard computer information”) is sent to the Web sites you visit and online services
you use. Microsoft uses standard computer information to provide you Internet-enabled services, to help
improve our products and services, and for statistical analysis. Standard computer information typically in-
cludes information such as your IP address, operating system version, browser version, and regional and
language settings. In some cases, standard computer information may also include hardware ID, which
indicates the device manufacturer, device name, and version. If a particular feature or service sends infor-
mation to Microsoft, standard computer information will be sent as well.
Collection and Use of Danger Service Usage Data
The Danger Service collects certain information about actions you take while using the Danger Service
and how you use the Danger Service (“Usage Data”). For example, the Danger Service automatically gath-
ers information regarding which Web pages are visited by users of the Danger Service. In addition, data
regarding usage of various features of the Danger Service is collected, such as how many email messages
or IM messages are sent by a particular user or by users in the aggregate, the most popular Web sites vis-
ited by users of the Danger Service, the number of Web pages viewed at the Danger Service Web Site and
other similar information. Similarly, for network monitoring purposes, the Danger Service records how
many devices in the aggregate are connected to the Danger Service in particular geographic locations,
but the Danger Service does not automatically identify the location of individual devices or users.
Usage Data gathered from your use of the Danger Service is stored under an automatically generated
identification number that will not be linked to information that identifies you or can be used to contact
you without your consent, except as specifically provided in this privacy statement.
Usage Data is used to effectively operate the Danger Service and enhance your experience using the
Danger Service. For example, cached versions of the Web sites that are most frequently visited by users
are stored on the Danger Service so that you can access them more quickly. Usage Data is also used to
understand how certain features of the Danger Service are being used and to measure the costs of provid-
ing certain features. Usage Data may also be used to diagnose and correct problems with the Danger
Service. In some cases, it may be necessary to link Usage Data relating to your use of the Danger Service
with you individually in order to correct problems that you may be experiencing with the Danger Service.
In general, the collection and use of Usage Data allows for continuing development of the Danger Service
and the ability to provide improved features and services to users. Usage Data may be shared with third
parties for research, analysis, or other similar purposes. Usage Data will only be shared with third par-
ties if the information is disclosed in a manner that does not identify individual users to the third parties
concerned.
Security of your information
Microsoft is committed to helping protect the security of your information. We use a variety of security
technologies and procedures to help protect your information from unauthorized access, use, or disclo-
sure. For example, we store the information you provide on computer systems with limited access, which
are located in controlled facilities.
100 Legal Information
100

Brauchen Sie Hilfe? Stellen Sie Ihre Frage.

Forenregeln

Missbrauch melden von Frage und/oder Antwort

Libble nimmt den Missbrauch seiner Dienste sehr ernst. Wir setzen uns dafür ein, derartige Missbrauchsfälle gemäß den Gesetzen Ihres Heimatlandes zu behandeln. Wenn Sie eine Meldung übermitteln, überprüfen wir Ihre Informationen und ergreifen entsprechende Maßnahmen. Wir melden uns nur dann wieder bei Ihnen, wenn wir weitere Einzelheiten wissen müssen oder weitere Informationen für Sie haben.

Art des Missbrauchs:

Zum Beispiel antisemitische Inhalte, rassistische Inhalte oder Material, das zu einer Gewalttat führen könnte.

Beispielsweise eine Kreditkartennummer, persönliche Identifikationsnummer oder unveröffentlichte Privatadresse. Beachten Sie, dass E-Mail-Adressen und der vollständige Name nicht als private Informationen angesehen werden.

Forenregeln

Um zu sinnvolle Fragen zu kommen halten Sie sich bitte an folgende Spielregeln:

Neu registrieren

Registrieren auf E - Mails für Sharp Sidekick LX 2009 - PV300 wenn:


Sie erhalten eine E-Mail, um sich für eine oder beide Optionen anzumelden.


Das Handbuch wird per E-Mail gesendet. Überprüfen Sie ihre E-Mail.

Wenn Sie innerhalb von 15 Minuten keine E-Mail mit dem Handbuch erhalten haben, kann es sein, dass Sie eine falsche E-Mail-Adresse eingegeben haben oder dass Ihr ISP eine maximale Größe eingestellt hat, um E-Mails zu erhalten, die kleiner als die Größe des Handbuchs sind.

Ihre Frage wurde zu diesem Forum hinzugefügt

Möchten Sie eine E-Mail erhalten, wenn neue Antworten und Fragen veröffentlicht werden? Geben Sie bitte Ihre Email-Adresse ein.



Info