
lock code, contact a Nokia Care point or your service
provider.
● Phone autolock period — To avoid unauthorised
use, you can set a time-out after which the device
automatically locks. A locked device cannot be used
until the correct lock code is entered. To turn off the
autolock period, select None.
● Lock if SIM card changed — You can set the device
to ask for the lock code when an unknown SIM card
is inserted into your device. The device maintains a
list of SIM cards that are recognised as the owner’s
cards.
● Remote phone locking — Enable or disable
remote lock.
● Closed user group — You can specify a group of
people to whom you can call and who can call you
(network service).
● Confirm SIM services — You can set the device to
display confirmation messages when you are using
a SIM card service (network service).
In the offline or flight profiles, you may need to unlock
the device and change to the calling profile before
making a call.
When calls are limited to closed user groups, calls may
be possible to the official emergency number
programmed into your device.
Certificate management
Select Menu > Settings and Phone > Phone
mgmt. > Security > Certificate management.
Digital certificates should be used if you want to
connect to an online bank or another site or remote
server for actions that involve transferring confidential
information. They should also be used if you want to
reduce the risk of viruses or other malicious software
and be sure of the authenticity of software when
downloading and installing software.
Select from the following:
● Authority certificates — View and edit authority
certificates.
● Trusted site certificates — View and edit trusted
site certificates.
● Personal certificates — View and edit personal
certificates.
● Phone certificates — View and edit device
certificates.
Digital certificates do not guarantee safety; they are
used to verify the origin of software.
Important: Even if the use of certificates makes
the risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security.
The existence of a certificate does not offer any
protection by itself; the certificate manager must
131
Settings