Avoid using access codes similar to the
emergency numbers to prevent accidental
dialling of the emergency number.
● Keypad autolock period — Select whether the
keypad is locked when your device has been idle
for a certain period of time.
● Phone autolock period — To avoid
unauthorised use, you can set a time-out after
which the device automatically locks. A locked
device cannot be used until the correct lock code
is entered. To turn off the autolock period, select
None.
Tip: To lock the device manually, press the
power key. A list of commands opens.
Select Lock phone.
● Lock if SIM card changed — You can set the
device to ask for the lock code when an unknown
SIM card is inserted into your device. The device
maintains a list of SIM cards that are recognised
as the owner’s cards.
● Closed user group — You can specify a group
of people to whom you can call and who can call
you (network service).
● Confirm SIM services — You can set the device
to display confirmation messages when you are
using a SIM card service (network service).
Certificate management
Select Menu > Tools > Settings and General >
Security > Certificate management.
Digital certificates do not guarantee safety; they are
used to verify the origin of software.
In the certificate management main view, you can
see a list of authority certificates that are stored in
your device. Scroll right to see a list of personal
certificates, if available.
Digital certificates should be used if you want to
connect to an online bank or another site or remote
server for actions that involve transferring
confidential information. They should also be used
if you want to reduce the risk of viruses or other
malicious software and be sure of the authenticity
of software when downloading and installing
software.
Important: Even if the use of certificates
makes the risks involved in remote connections and
software installation considerably smaller, they
must be used correctly in order to benefit from
increased security. The existence of a certificate
does not offer any protection by itself; the
certificate manager must contain correct,
authentic, or trusted certificates for increased
security to be available. Certificates have a
restricted lifetime. If "Expired certificate" or
"Certificate not valid yet" is shown, even if the
158
Settings