Nokia 6600 fold - Security

background image

Security

When security features that restrict calls are in use (such as call barring, closed user group,
and fixed dialling), calls may be possible to the official emergency number programmed into
your device.

Select Menu > Settings > Security and from the following options:

background image

37

S e t t i n g s

PIN code request or UPIN code request — to set the phone to ask for your PIN or
UPIN code every time the phone is switched on. Some SIM cards do not allow the
code request to be turned off.

PIN2 code request — to select whether the PIN2 code is required when using a
specific phone feature which is protected by the PIN2 code. Some SIM cards do
not allow the code request to be turned off.

Call barring service — to restrict calls to and from your phone (network service). A
barring password is required.

Fixed dialling — to restrict your outgoing calls to selected phone numbers, if
supported by your SIM card. When fixed dialling is on, GPRS connections are not
possible, except while sending text messages over a GPRS connection. In this case,
the recipient’s phone number and the message centre number must be included in
the fixed dialling list.

Closed user group — to specify a group of people whom you can call and who can
call you (network service)

Security level — Select Phone to request the security code whenever a new SIM
card is inserted into the phone. Select Memory to request the security code when
the SIM card memory is selected, and you want to change the memory in use.

Access codes — to change the security code, PIN code, UPIN code, PIN2 code, or
barring password

Code in use — to select whether the PIN code or UPIN code should be active

Authority certificates or User certificates — to view the list of the authority or user
certificates downloaded into your phone. See “Certificates,” p. 47.

Security module sett. — to view the security module details, activate PIN request
for the security module, or change the module PIN and signing PIN. See also
“Access codes,” p. 10.