Avoid using access codes similar to the emergency
numbers to prevent accidental dialling of the
emergency number.
Keypad autolock period
●
keypad is locked when your device has been idle for
a certain period of time.
Tip: To lock or unlock the keypad manually,
press the left selection key, then *.
Phone autolock period
●
use, you can set a time-out after which the device
automatically locks. A locked device cannot be used
until the correct lock code is entered. To turn off the
autolock period, select None.
Tip: To lock the device manually, press the
power key. A list of commands opens. Select
Lock
phone.
In the offline or flight profiles, you may need to unlock
the device and change to the calling profile before
making a call.
Lock if SIM card changed
●
to ask for the lock code when an unknown SIM card
is inserted into your device. The device maintains a
list of SIM cards that are recognised as the owner's
cards.
Closed user group
●
people to whom you can call and who can call you
(network service).
156
— Select whether the
— To avoid unauthorised
— You can set the device
— You can specify a group of
When calls are limited to closed user groups, calls may
be possible to the official emergency number
programmed into your device.
Confirm SIM services
●
display confirmation messages when you are using
a SIM card service (network service).
Certificate management
Press
, and select
Tools
Security
Certificate
management.
>
Digital certificates do not guarantee safety; they are
used to verify the origin of software.
In the certificate management main view, you can see
a list of authority certificates that are stored in your
device. Scroll right to see a list of personal certificates,
if available.
Digital certificates should be used if you want to
connect to an online bank or another site or remote
server for actions that involve transferring confidential
information. They should also be used if you want to
reduce the risk of viruses or other malicious software
and be sure of the authenticity of software when
downloading and installing software.
Important: Even if the use of certificates makes
the risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security.
The existence of a certificate does not offer any
— You can set the device to
Settings
General
>
>
>