Blackberry 8700C User Guide - Page 101
Control connections with the device, Control access to personal, information
UPC - 842740016398
View all Blackberry 8700C manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 101 highlights
29: Third-party program control through your corporation's network, set the Company Network field. • To control whether third-party programs can access the Internet through your service provider, set the Carrier Internet field. Related topics Set permissions for third-party programs (See page 100.) Control connections with the device (See page 101.) Control access to personal information (See page 101.) Control connections with the device 1. In the device options, click Advanced Options. 2. Click Applications. 3. Click the trackwheel. 4. Click Permissions. 5. In the Interactions group, set the following fields: • To control whether third-party programs can communicate with other programs on your BlackBerry® device, such as the device runtime store, persistent store, and global e vents, set the Interprocess Communications field. • To control whether third-party programs can simulate actions, such as the pressing of a key or button on your device, and send those simulated actions to the program that you are currently using, set the Event Injection field. • To control whether third-party programs can register a filter with the browser to handle content from a domain such as a customencoded document, set the Browser Filters field. • To control whether third-party programs can be used by your device as a source for customized themes, set the Theme Data field. Related topics Set permissions for third-party programs (See page 100.) Control external connections (See page 100.) Control access to personal information (See page 101.) Control access to personal information 1. In the device options, click Advanced Options. 2. Click Applications. 3. Click the trackwheel. 4. Click Permissions. 5. In the User Data group, set the following fields: • To control whether third-party programs can access email messages, SMS messages, or PIN messages, set the Email field. • To control whether third-party programs can access personal information management (PIM) items, such as tasks, memos, contacts, and calendar entries, set the PIM field. • To control whether third-party programs can access the key store, set the Keystore field. If you allow third-party programs to access the key store, you must type the key store password when a third-party program attempts to access private contents of the key store. • To control whether third-party programs can access the key store with password caching turned on, set the Keystore Medium Security field. Related topics Set permissions for third-party programs (See page 100.) Control external connections (See page 100.) Control connections with the device (See page 101.) 101