<<<>>> Trend Micro, Inc. January 2005 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(tm) Mobile Security for Symbian(tm), UIQ Edition Version 1.0 - GM ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contents =================================================================== 1. About Mobile Security 2. What's New 3. Documentation Set 4. System Requirements 4.1 Device 4.2 Host PC 5. Installation 6. Post-Installation Configuration 7. Known Issues 7.1 Manual Scan 7.2 Anti-spam 8. Release History 9. Contact Information 10. About Trend Micro 11. License Agreement =================================================================== 1. About Mobile Security ------------------------------------------------------------------------ Trend Micro Mobile Security for Symbian is a Trend Micro solution for wireless mobile devices that use the Symbian operating system. Through a simple interface, users can configure antivirus and Anti-spam options. Mobile Security antivirus options include the ability to perform a Manual Scan and Real-time Scan on all files and folders, and an Instant Scan on memory cards inserted into the device. Anti-spam options include the ability to allow or filter SMS messages from a configured list of phone numbers. Users can also view virus, Anti-spam, and task logs. 2. What's New ======================================================================== Not applicable. 3. Documentation Set ------------------------------------------------------------------------ The documentation set for this product includes the following: Readme file: The Readme file contains late-breaking product information not found in the printed documentation. Topics include version enhancements, basic installation, known issues and release history. User's Guide: Mobile Security overview, installation planning, installation, configuration, and maintenance instructions, and information intended to get you "up and running" Knowledge Base: The Knowledge Base is an on-line database of problem-solving and troubleshooting information. It provides the latest information about known product issues. To access the Knowledge Base, see the following: http://kb.trendmicro.com/solutions/search/default.asp 4. System Requirements ------------------------------------------------------------------------ Mobile Security has the following minimum system requirements for your device and a host PC: 4.1 Device ------------------------------------------------------------------------ Interface - UIQ 2.0 or 2.1 Operating system - Symbian OS 7.0 Storage space - 3MB minimum free in internal memory Memory - 1MB minimum free memory, 2MB recommended 4.2 Host PC ------------------------------------------------------------------------ Operating system - Microsoft(tm) Windows(tm) XP or Windows 2000 Adobe(TM) Acrobat(TM) 5.0 or higher is required to view documentation that is provided in PDF format. You can download the free Acrobat Reader(TM) software at http://www.adobe.com. 5. Installation ------------------------------------------------------------------------ Perform the following steps to install Mobile Security: Using PC Suite software on the host PC -------------------------------------- 1. Copy the setup file, MobileSecurity_UIQ.sis, to the host PC. 2. Connect your device to a host computer with PC Suite. 3. On the host computer, run the PC Suite software installation application. A prompt appears on the host PC. 4. Select the setup file and click "Open". Installation begins. 5. Click "Install anyway" on the prompt that appears. A new prompt appears. 6. Click "Next". A new prompt appears with language choices. 7. Select the correct language and click "Next". The license agreement is displayed. 8. Carefully read the license agreement, and then click "Yes" if you want to continue installation. A prompt appears, informing you that Mobile Security can only be installed in internal memory. 9. Click "Yes". 10.Click "Finish". Installation is complete. Mobile Security now appears in your Applications menu. Using Bluetooth --------------- 1. Copy the setup file, MobileSecurity_UIQ.sis, to a Bluetooth- enabled PC. 2. Transfer the setup file to your phone using Bluetooth. A prompt appears on your phone. 3. Select "View". A Security information prompt appears asking if you want to proceed. 4. Select "Yes". The Install software prompt appears. 5. Select "Install". The license agreement displays. 6. Carefully read the license agreement, and then click "Yes" if you want to continue installation. A prompt appears, informing you that Mobile Security can only be installed in internal memory. 7. Select "Yes". The installer extracts the SIS file. When installation is complete, Mobile Security appears in your Applications menu. 6. Post-Installation Configuration ======================================================================== Anti-spam is disabled by default. Enable Anti-spam if you want to filter unwanted SMS messages into a Spam folder. For detailed instructions on enabling and configuring spam prevention, see your User's Guide. Note: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product. 7. Known Issues ------------------------------------------------------------------------ 7.1 Manual Scan --------------- The user cannot switch to another application when Mobile Security is scanning a large compressed (SIS/ZIP) file. 7.2 Anti-spam ------------- A spam message that arrives immediately after the phone is turned on may not be filtered. 8. Release History ======================================================================== Not applicable. 9. Contact Information ------------------------------------------------------------------------ This version of Mobile Security will automatically expire on 2005-06-30. Until that time you will be able to receive updates to antivirus components from Trend Micro. View the Trend Micro Web site for details on how to renew your version of Mobile Security. You can contact Trend Micro via fax, phone, and email, or visit us at: http://www.trendmicro.com Evaluation copies of Trend Micro products can be downloaded from our Web site. Global Mailing Address/Telephone Numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to: http://www.trendmicro.com/en/about/overview.htm The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 10. About Trend Micro ------------------------------------------------------------------------ Trend Micro, Inc. provides centrally controlled server-based virus protection and content-filtering products and services. By protecting information that flows through Internet gateways, email servers, and file servers, Trend Micro allows companies worldwide to stop viruses and other malicious code from a central point before they can reach the desktop. Copyright 2004, Trend Micro Incorporated. All rights reserved. Trend Micro and the t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 11. License Agreement ------------------------------------------------------------------------ Trend Micro Mobile Security Evaluation License Agreement (Release Build for version 1.0 January 2005) READ THESE TERMS CAREFULLY BEFORE CLICKING THE "I ACCEPT" OR "YES" BUTTON BELOW OR DOWNLOADING THE SOFTWARE. THESE ACTIONS CONSTITUTE AN ACKNOWLEDGEMENT THAT YOU HAVE READ, UNDERSTOOD AND ACCEPTED THE TERMS OF THIS AGREEMENT TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LOCAL LAW. This Agreement entitles You to download, install and use the Software for evaluation purposes through June 30, 2005. In the event you wish to purchase a license to the Software at the end of this time, visit http://www.trendmicro.com/products/mobilesecurity. A full use Software License will be based on separate License terms. In this Agreement, "You" means you as an individual if you will download and install this Software for personal or individual purposes. If You are downloading or installing the Software on behalf of your company or organization (collectively "Company") by clicking the "I Accept" or "Yes" button below or downloading the Software, You represent that (a) You are duly authorized to represent your company and (b) You accept the terms and conditions of this Agreement on behalf of your company. An agreement is then formed. IF YOU OR YOUR COMPANY DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT CLICK THE "I ACCEPT" OR "YES" BUTTON BELOW OR DOWNLOAD THE SOFTWARE. TREND MICRO DOES NOT AUTHORIZE USE OF THIS SOFTWARE UNDER TERMS OTHER THAN THOSE SET FORTH IN THIS AGREEMENT. 1. LICENSE GRANT. Upon Your acceptance of this Agreement, Trend Micro authorizes you to download, install and use the Software and Updates (new virus detection routines) from the date of download through June 30, 2005 ("Evaluation Period"), at which time this Agreement terminates automatically. You may copy the Software for backup purposes, provided that You reproduce all copyright and other proprietary notices that are on the original copy. You must routinely download Updates by following the procedures described in the Software's User's Guide. These license rights terminate automatically if You fail to comply with any term of this Agreement. Upon termination, You agree to destroy all copies of the Software and documentation. Sections 2-5 survive termination of the Agreement. 2. COPYRIGHT. The Software is protected by trade secret and copyright laws and international treaty provisions. You acknowledge that no title to the intellectual property in the Software is transferred to You. You further acknowledge that title and full ownership rights to the Software will remain the exclusive property of Trend Micro or its suppliers, and You will not acquire any ownership rights to the Software. To the extent legally permissible, You agree that You will not attempt to rent, lease, sub-license, loan, auction, deal in, modify, create derivative works of, adapt, merge, translate, reverse compile, de-compile, or disassemble the Software, in whole or in part, use the Software to provide services to third parties, or authorize others to do any of the foregoing. All rights reserved. 3. NO WARRANTY. Although Trend Micro has used commercially reasonable efforts to ensure that the Software will operate as intended, You agree that, to the fullest extent permitted by applicable law, the Software is provided "AS IS" without warranties of any kind. Trend Micro has no obligation to provide any technical support or error corrections for the Software. TREND MICRO DOES NOT WARRANT THAT THE SOFTWARE IS ERROR FREE. TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, TREND MICRO DISCLAIMS AND EXCLUDES ALL REPRESENTATIONS AND WARRANTIES WITH RESPECT TO THE SOFTWARE, EITHER EXPRESS, OR IMPLIED BY STATUTE, COMMON LAW OR TRADE USAGE, INCLUDING BUT NOT LIMITED TO WARRANTIES OR CONDITIONS OF TITLE, NONINFRINGEMENT OF THIRD PARTY RIGHTS, SATISFACTORY QUALITY, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 4. NO LIABILITY. IN NO EVENT SHALL TREND MICRO OR ITS SUPPLIERS BE LIABLE TO YOU FOR ANY DAMAGES RELATED TO THE USE OR PERFORMANCE OF THE SOFTWARE WHETHER OR NOT TREND MICRO HAS BEEN ADVISED OR KNEW OF THE POSSIBILITY OF SUCH DAMAGES, AND REGARDLESS OF THE NATURE OF THE CAUSE OF ACTION OR THEORY ASSERTED. 5. NON-ASSIGNABILITY. You may not assign or transfer any right under this Agreement to any party, including any affiliate, without the prior written consent of Trend Micro. Any purported assignment or transfer by You shall be null and void. To the extent that this prohibition on assignment or transfer may be unenforceable, any such assignment or transfer must be subject to the terms and conditions of this Agreement. 6. BACK-UP. Installation of Trend Micro Mobile Security may require resetting or restarting the mobile device. Prior to the installation of the Software and for as long as You use the Software, You must regularly back-up data stored on Your mobile device on a separate media. You acknowledge that any failure to do so may significantly decrease Your ability to mitigate any damage, harm or loss arising from the installation or use of this Software. 7. COMPLIANCE WITH ALL LAWS, EXPORT CONTROL. Both parties shall comply with all applicable laws including but not limited to the export control laws of the United States. You shall not export nor re-export the Software or any confidential information related thereto without the appropriate United States and foreign government licenses, and You are responsible for any violation of such export control laws. By accepting this Agreement, You confirm that You are not a resident or citizen of any country currently embargoed by the U.S. A list of embargoed countries is available at the official Web site of the Office of Foreign Assets Control of the U.S. Department of the Treasury at http://www.treas.gov/ofac/. 8. GENERAL. This Agreement and any related disputes will be governed by and construed in accordance with the laws of the State of California, and the federal laws of the United States, excluding the United Nations Convention on Contracts for the International Sale of Goods. The courts in California shall have exclusive jurisdiction over any dispute arising out of or related to this Agreement, except for injunctive or other interim relief. If any provision of this Agreement is found invalid, the remaining provisions will remain in full force and effect. This Agreement represents the entire agreement between You and Trend Micro and supercedes any prior agreement or representation regarding this subject matter. BY CLICKING THE "I ACCEPT" OR "YES" BUTTON BELOW OR DOWNLOADING THE SOFTWARE, YOU ACCEPT TREND MICRO'S OFFER TO LICENSE THE SOFTWARE UNDER THESE TERMS AND CONDITIONS. Trend Micro Incorporated, 10101 N. De Anza Blvd., Cupertino, CA 95014. Telephone: (408) 257-1500. Fax: (408) 257-2003. Address all questions about this Agreement to: legalnotice@trendmicro.com. To view a copy of Trend Micro's standard US License Agreement, visit http://www.trendmicro.com/license/US. THE SOFTWARE IS PROTECTED BY TRADE SECRET COPYRIGHT AND UNITED STATES PATENT LAWS, AND INTERNATIONAL TREATY PROVISIONS. UNAUTHORIZED REPRODUCTION OR DISTRIBUTION IS SUBJECT TO CIVIL AND CRIMINAL PENALTIES.