User manual
Table Of Contents
56
Body-worn SAR testing has been carried out at a separation distance
of 15 mm. To meet RF exposure guidelines during body-worn
operation, the device should be positioned at least this distance away
from the body.
If you are not using an approved accessory ensure that whatever
product is used is free of any metal and that it positions the device the
indicated distance away from the body.
Organizations such as the World Health Organization and the US
Food and Drug Administration have suggested that if people are
concerned and want to reduce their exposure they could use a hands-
free accessory to keep the wireless device away from the head or body
during use, or reduce the amount of time spent on the device.
Please note by using the device some of your personal data may be
shared with the main device. It is under your own responsibility to protect
your own personal data, not to share with it with any unauthorized
devices or third party devices connected to yours. For devices with
Wi-Fi features, only connect to trusted Wi-Fi networks. Also when using
your device as a hotspot (where available), use network security. These
precautions will help prevent unauthorized access to your device. Your
device can store personal information in various locations including
a SIM card, memory card, and built-in memory. Be sure to remove or
clear all personal information before you recycle, return, or give away
your device. Choose your apps and updates carefully, and install from
trusted sources only. Some apps can impact your device’s performance
and/or have access to private information including account details, call
data, location details and network resources.
Note that any data shared with TCL Communication Ltd. is stored
in accordance with applicable data protection legislation. For these
purposes TCL Communication Ltd. implements and maintains
appropriate technical and organizational measures to protect all
personal data, for example against unauthorized or unlawful processing
and accidental loss or destruction of or damage to such personal
data whereby the measures shall provide a level of security that is
appropriate having regard to:
(i) the technical possibilities available,
(ii) the costs for implementing the measures,
(iii) the risks involved with the processing of the personal data, and
(iv) the sensitivity of the personal data processed.