Blackberry 7250 User Guide - Page 95

Control connections with the device, Control access to personal, information

Page 95 highlights

28: Third-party program control through your corporation's network, set the Company Network field. • To control whether third-party programs can access the Internet through your service provider, set the Carrier Internet field. Related topics Set permissions for third-party programs (See page 94.) Control connections with the device (See page 95.) Control access to personal information (See page 95.) Control connections with the device 1. In the device options, click Advanced Options. 2. Click Applications. 3. Click the trackwheel. 4. Click Edit Default Permissions. 5. In the Interactions group, set the following fields: • To control whether third-party programs can communicate with other programs on your BlackBerry® device, such as the device runtime store, persistent store, and global e vents, set the Interprocess Communications field. • To control whether third-party programs can simulate actions, such as the pressing of a key or button on your device, and send those simulated actions to the program that you are currently using, set the Keystroke Injection field. • To control whether third-party programs can register a filter with the browser to handle content from a domain such as a customencoded document, set the Browser Filters field. • To control whether third-party programs can be used by your device as a source for customized themes, set the Theme Data field. Related topics Set permissions for third-party programs (See page 94.) Control external connections (See page 94.) Control access to personal information (See page 95.) Control access to personal information 1. In the device options, click Advanced Options. 2. Click Applications. 3. Click the trackwheel. 4. Click Edit Default Permissions. 5. In the User Data group, set the following fields: • To control whether third-party programs can access email messages, SMS messages, or PIN messages, set the Email field. • To control whether third-party programs can access personal information management (PIM) items, such as tasks, memos, contacts, and calendar entries, set the PIM field. • To control whether third-party programs can access the key store, set the Key Store field. If you allow third-party programs to access the key store, you must type the key store password when a third-party program attempts to access private contents of the key store. • To control whether third-party programs can access the key store with password caching turned on, set the Key Store Medium Security field. Related topics Set permissions for third-party programs (See page 94.) Control external connections (See page 94.) Control connections with the device (See page 95.) 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156

95
28: Third-party program control
through your corporation’s network, set the
Company Network
field.
To control whether third-party programs can
access the Internet through your service
provider, set the
Carrier Internet
field.
Related topics
Set permissions for third-party programs (See page
94.)
Control connections with the device (See page 95.)
Control access to personal information (See page 95.)
Control connections with the device
1.
In the device options, click
Advanced Options.
2.
Click
Applications.
3.
Click the trackwheel.
4.
Click
Edit Default Permissions.
5.
In the
Interactions
group, set the following fields:
To control whether third-party programs can
communicate with other programs on your
BlackBerry® device, such as the device
runtime store, persistent store, and global e
vents, set the
Interprocess Communications
field.
To control whether third-party programs can
simulate actions, such as the pressing of a key
or button on your device, and send those
simulated actions to the program that you are
currently using, set the
Keystroke Injection
field.
To control whether third-party programs can
register a filter with the browser to handle
content from a domain such as a custom-
encoded document, set the
Browser Filters
field.
To control whether third-party programs can
be used by your device as a source for
customized themes, set the
Theme Data
field.
Related topics
Set permissions for third-party programs (See page
94.)
Control external connections (See page 94.)
Control access to personal information (See page 95.)
Control access to personal
information
1.
In the device options, click
Advanced Options.
2.
Click
Applications.
3.
Click the trackwheel.
4.
Click
Edit Default Permissions.
5.
In the
User Data
group, set the following fields:
To control whether third-party programs can
access email messages, SMS messages, or PIN
messages, set the
Email
field.
To control whether third-party programs can
access personal information management
(PIM) items, such as tasks, memos, contacts,
and calendar entries, set the
PIM
field.
To control whether third-party programs can
access the key store, set the
Key Store
field. If
you allow third-party programs to access the
key store, you must type the key store
password when a third-party program
attempts to access private contents of the key
store.
To control whether third-party programs can
access the key store with password caching
turned on, set the
Key Store Medium
Security
field.
Related topics
Set permissions for third-party programs (See page
94.)
Control external connections (See page 94.)
Control connections with the device (See page 95.)