Quick start guide

26
Network Indicators
Your 4G capable wireless device will indicate which of the T-Mobile wireless networks you are connected to. A
network indicator does not necessarily mean that you will experience any particular upload or download data
speeds.
4G
: Connected to the T-Mobile HSPA+.
3G
: Connected to 3G.
2G
: Connected to T-Mobile EDGE.
G
: Connected to T-Mobile GPRS.
Approved Firmware Versions
This device will only operate with firmware versions that have been approved for use by T-Mobile and the device
manufacturer. If unauthorized firmware is placed on the device it will not function.
Safety Tips
Consider device compatibility
If you have a pacemaker or hearing aid, check with your doctor to make sure it is safe for you to use a cell phone.
In some cases, cellular radio frequencies can disrupt the performance of other electronic equipment. If you
have questions about the interaction between your phone and any other piece of electronic equipment, ask the
equipment manufacturer.
Drive safely
When you are driving, we encourage you to use your phone in a safe and sensible manner. Here are a few tips:
•Assess road conditions before answering your phone. Your safety is more important than any call.
•Prepare your hands-free headset, if you have one, or turn on your speakerphone, before you
start moving.
•Keep your phone close. If it rings and you discover it’s in the back seat, do NOT crawl over the seat to answer it
while driving.
•Pre-program frequently used numbers into your phone for easy, one-touch dialing.
•Remember that laws prohibiting or restricting the use of a cell phone while driving may apply in your area.
Information About Safeguarding Handsets
We encourage customers to take appropriate measures to secure their handsets and invites them to take
advantage of the features available on this handset to help secure it from theft and/or other unauthorized
access and use. This handset has a locking function (e.g., user-defined codes or patterns) that can serve as a
first line of defense against unauthorized use or access to stored information. Preloaded security applications