User Manual - Boost Mobile

18
This device complies with Part 15 of the FCC Rules. Operaon
is subject to the following two condions:
(1) this device may not cause harmful interference
(2) this device must accept any interference received, including
interference that may cause undesired operaon.
Your router is equipped with a built-in antenna. For opmal
operaon, you should avoid touching it or damaging it.
As routers oer a range of funcons, they can be used in
posions other than against your ear. In such circumstances the
device will be compliant with the guidelines when used with
headset or usb data cable. If you are using another accessory,
ensure that whatever product is used is free of any metal and
that it posions the router at least 10 mm away from the body.
Please note by using the device some of your personal data may
be shared with the main device. It is under your own responsibility
to protect your own personal data, not to share with it with
any unauthorized devices or third-party devices connected to
yours. For products with Wi-Fi features, only connect to trusted
Wi-Fi networks. Also, when using your product as a hotspot
(where available), use network security. These precauons will
help prevent unauthorized access to your device. Your product
can store personal informaon in various locaons including a
SIM card, memory card, and built-in memory. Be sure to remove
or clear all personal informaon before you recycle, return, or
give away your product. Choose your apps and updates carefully
and install from trusted sources only. Some apps can impact your
product’s performance and/or have access to private informaon
including account details, call data, locaon details and network
resources.
Note: any data shared with TCL Communicaon Ltd. is stored
in accordance with applicable data protecon legislaon. For
this reason, TCL Communicaon Ltd. implements and maintains
appropriate technical and organizaonal measures to protect all
personal data. Examples include protecon against unauthorized
or unlawful processing, accidental loss, destrucon of or damage
to such personal data. Measures shall provide a level of security
that is appropriate with regards to:
(1) the technical possibilies available,