Samsung SCH-I915SAAVZW Tablet User Manual


 
MANUAL SHALL BE CONSTRUED TO CREATE AN EXPRESS OR IMPLIED WARRANTY OF ANY KIND WHATSOEVER WITH RESPECT TO THE
PRODUCT. IN ADDITION, SAMSUNG SHALL NOT BE LIABLE FOR ANY DAMAGES OF ANY KIND RESULTING FROM THE PURCHASE OR USE OF
THE PRODUCT OR ARISING FROM THE BREACH OF THE EXPRESS WARRANTY, INCLUDING INCIDENTAL, SPECIAL OR CONSEQUENTIAL
DAMAGES, OR LOSS OF ANTICIPATED PROFITS OR BENEFITS.
SAMSUNG IS NOT LIABLE FOR PERFORMANCE ISSUES OR INCOMPATIBILITIES CAUSED BY YOUR EDITING OF REGISTRY SETTINGS, OR
YOUR MODIFICATION OF OPERATING SYSTEM SOFTWARE.
USING CUSTOM OPERATING SYSTEM SOFTWARE MAY CAUSE YOUR DEVICE AND APPLICATIONS TO WORK IMPROPERLY. YOUR CARRIER
MAY NOT PERMIT USERS TO DOWNLOAD CERTAIN SOFTWARE, SUCH AS CUSTOM OS. IF YOUR CARRIER PROHIBITS THIS, IF YOU ATTEMPT
TO DOWNLOAD SOFTWARE ONTO THE DEVICE WITHOUT AUTHORIZATION, YOU WILL BE NOTIFIED ON THE SCREEN THAT THE PHONE WILL
NO LONGER OPERATE AND BE INSTRUCTED TO POWER DOWN THE DEVICE. YOU MUST THEN CONTACT YOUR CARRIER TO RESTORE THE
DEVICE TO THE CARRIER-AUTHORIZED SETTINGS.
SAFE™ ("Samsung Approved For Enterprise"): TO THE FULL EXTENT PERMITTED BY LAW SAMSUNG ELECTRONICS CO., LTD.,
SAMSUNG TELECOMMUNICATIONS AMERICA, LLC, AND THEIR AFFILIATES (COLLECTIVELY REFERRED TO HEREIN AS THE
"SAMSUNG ENTITIES") EXPRESSLY DISCLAIM ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, INTEROPERABILITY OR NON-INFRINGEMENT, WITH RESPECT TO
INFORMATION TECHNOLOGY SECURITY PROTECTION, SAFE™ APPROVED DEVICES AND SAFE™ APPROVED APPLICATIONS. IN NO
EVENT SHALL THE SAMSUNG ENTITIES BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL
DAMAGES OF ANY KIND WHATSOEVER WITH RESPECT TO INFORMATION TECHNOLOGY SECURITY PROTECTION, SAFE™
APPROVED DEVICES OR SAFE™ APPROVED APPLICATIONS. In addition, information technology security protection will be affected
by features or functionality associated with, among other things the e-mail platform, master data management, and virtual private
network solutions selected by the software provider, solution provider or user. Choice of an e-mail, master data management, and
virtual private network solution is at the sole discretion of the software provider, solution provider or user and any associated
effect on information technology security protection is solely the responsibility of the software provider, solution provider or user.