Users Manual

6
This phone complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including
interference that may cause undesired operation.
Your phone is equipped with a built-in antenna. For optimal
operation, you should avoid touching it or degrading it.
As mobile devices offer a range of functions, they can be used
in positions other than against your ear. In such circumstances
the device will be compliant with the guidelines when used with a
headset or usb data cable.
If you are using another accessory ensure that whatever product
is used is free of any metal and that it positions the phone at least
15 mm away from the body.
Please note that when using an accessory some of your
personal data may be shared with the main device. It is your
own responsibility to protect your own personal data, not
to share with it with any unauthorized devices or third party
devices connected to yours. For products with Wi-Fi features,
only connect to trusted Wi-Fi networks. Also when using your
product as a hotspot (where available), use network security.
These precautions will help prevent unauthorized access to your
device. Your product can store personal information in various
locations including a SIM card, memory card, and built-in memory.
Be sure to remove or clear all personal information before
you recycle, return, or give away your product. Choose your
apps and updates carefully, and only install them from trusted
locations. Some apps can impact your product’s performance
and/or have access to private information including account
details, call data, location details and network resources.
Note that any data shared with TCL Communication Ltd. is
stored in accordance with applicable data protection legislation.
For these purposes TCL Communication Ltd. implements and
maintains appropriate technical and organizational measures to
protect all personal data, for example against unauthorized or
unlawful processing and accidental loss, destruction or damage,
whereby the measures shall provide a level of security that is
appropriate with regard to:
• the technical possibilities available;
• the costs for implementing the measures;
• the risks involved with the processing of the personal data; and
• the sensitivity of the personal data processed.
You can access, review, and edit your personal information at any
time by logging into your user account, visiting your user profile or
by contacting us directly. Should you require us to edit or delete
your personal data, we may ask you to provide us with evidence
of your identity before we can act on your request.