597063
100
Zoom out
Zoom in
Previous page
1/106
Next page
Information that is collected by or sent to Microsoft by the Danger Service may be stored and processed in
the United States or any other country in which Microsoft or its affiliates, subsidiaries, or service providers
maintain facilities. Microsoft abides by the safe harbor framework as set forth by the U.S. Department of
Commerce regarding the collection, use, and retention of data from the European Union.
Collection and Use of Information about Your Computer or Wireless Device
When you use Internet-enabled features of the Danger Service, information about your computer or
wirless device (“standard computer information”) is sent to the Web sites you visit and online services
you use. Microsoft uses standard computer information to provide you Internet-enabled services, to help
improve our products and services, and for statistical analysis. Standard computer information typically in-
cludes information such as your IP address, operating system version, browser version, and regional and
language settings. In some cases, standard computer information may also include hardware ID, which
indicates the device manufacturer, device name, and version. If a particular feature or service sends infor-
mation to Microsoft, standard computer information will be sent as well.
Collection and Use of Danger Service Usage Data
The Danger Service collects certain information about actions you take while using the Danger Service
and how you use the Danger Service (“Usage Data”). For example, the Danger Service automatically gath-
ers information regarding which Web pages are visited by users of the Danger Service. In addition, data
regarding usage of various features of the Danger Service is collected, such as how many email messages
or IM messages are sent by a particular user or by users in the aggregate, the most popular Web sites vis-
ited by users of the Danger Service, the number of Web pages viewed at the Danger Service Web Site and
other similar information. Similarly, for network monitoring purposes, the Danger Service records how
many devices in the aggregate are connected to the Danger Service in particular geographic locations,
but the Danger Service does not automatically identify the location of individual devices or users.
Usage Data gathered from your use of the Danger Service is stored under an automatically generated
identification number that will not be linked to information that identifies you or can be used to contact
you without your consent, except as specifically provided in this privacy statement.
Usage Data is used to effectively operate the Danger Service and enhance your experience using the
Danger Service. For example, cached versions of the Web sites that are most frequently visited by users
are stored on the Danger Service so that you can access them more quickly. Usage Data is also used to
understand how certain features of the Danger Service are being used and to measure the costs of provid-
ing certain features. Usage Data may also be used to diagnose and correct problems with the Danger
Service. In some cases, it may be necessary to link Usage Data relating to your use of the Danger Service
with you individually in order to correct problems that you may be experiencing with the Danger Service.
In general, the collection and use of Usage Data allows for continuing development of the Danger Service
and the ability to provide improved features and services to users. Usage Data may be shared with third
parties for research, analysis, or other similar purposes. Usage Data will only be shared with third par-
ties if the information is disclosed in a manner that does not identify individual users to the third parties
concerned.
Security of your information
Microsoft is committed to helping protect the security of your information. We use a variety of security
technologies and procedures to help protect your information from unauthorized access, use, or disclo-
sure. For example, we store the information you provide on computer systems with limited access, which
are located in controlled facilities.
100 Legal Information
100


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Sharp Sidekick LX 2009 - PV300 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Sharp Sidekick LX 2009 - PV300 in the language / languages: English as an attachment in your email.

The manual is 5,86 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info