For the receiver devices associated with the operation of a licensed radio service
(e.g. FM broadcast), they bear the following statement:
This device complies with Part 15 of the FCC Rules and ISEDC license-exempt
RSS standard(s). The operation is subject to the condition that this device does
not cause harmful interference.
For other devices, they bear the following statement:
This device complies with Part 15 of the FCC Rules and ISEDC license-exempt
RSS standard(s). Operation is subject to the following two conditions:
(1) this device may not cause harmful interference
(2) this device must accept any interference received, including interference that
may cause undesired operation.
Your mobile phone is equipped with a built-in antenna. For optimal operation,
you should avoid touching it or degrading it.
Please note by using the device some of your personal data may be shared with
the main device. It is under your own responsibility to protect your own personal
data, not to share it with any unauthorized devices or third party devices
connected to yours. For products with Wi-Fi features, only connect to trusted
Wi-Fi networks. Also, when using your product as a hotspot (where available),
use network security. These precautions will help prevent unauthorized access
to your device. Your product can store personal information in various locations
including a SIM card, memory card, and built-in memory. Be sure to remove
or clear all personal information before you recycle, return, or give away your
product. Choose your apps and updates carefully, and install from trusted
sources only. Some apps can impact your product's performance and/or have
access to private information including account details, call data, location details
and network resources.
Note that any data shared with TCL Communication Ltd. is stored in
accordance with applicable data protection legislation. For these purposes,
TCL Communication Ltd. implements and maintains appropriate technical
and organizational measures to protect all personal data, for example against
unauthorized or unlawful processing and accidental loss or destruction of or
damage to such personal data whereby the measures shall provide a level of
security that is appropriate having regard to
(i) the technical possibilities available,
(ii) the costs for implementing the measures,
(iii) the risks involved with the processing of the personal data, and
(iv) the sensitivity of the personal data processed.
10