Nokia 3610 fold - Security

background image

Security

When security features that restrict calls are in use (such as call barring, closed user group,
or fixed dialling), calls still may be possible to the official emergency number programmed
into your phone.

Select Menu > Settings > Security and from the following:

PIN code request — to set the phone to ask for your PIN code every time the phone is
switched on. Some SIM cards do not allow the code request to be turned off.

PIN2 code request — to select whether the PIN2 code is required when using a specific phone
feature which is protected by the PIN2 code. Some SIM cards do not allow the code request
to be turned off.

Call barring service — to restrict incoming calls to and outgoing calls from your phone
(network service). A barring password is required.

Fixed dialling — to restrict your outgoing calls to selected phone numbers if this function is
supported by your SIM card. When the fixed dialling is on, GPRS connections are not
possible except while sending text messages over a GPRS connection. In this case, the
recipient’s phone number and the message centre number must be included in the fixed
dialling list.

RM429_EN_820.fm Page 37 Thursday, August 21, 2008 5:12 PM

background image

38

O p e r a t o r m e n u

Closed user group — to specify a group of people whom you can call and who can call you
(network service)

Security level — to set the phone to ask for the security code whenever a new SIM card is
inserted into the phone, select Phone. If you select Memory, the phone asks for the security
code when the SIM card memory is selected, and you want to change the memory in use.

Access codes — to change the security code, PIN code, PIN2 code, or restriction password

Authority certificates or User certificates — to view the list of the authority or user
certificates downloaded into your phone. See “Certificates”, p. 48.

Security module sett. — to view security module details, select Module PIN request, or
change the module PIN and signing PIN. See also “Access codes”, p. 10.