Gateway MT3422 Security Guide - Page 5

Data security, Trusted Platform Module (TPM), CompuTrace

Page 5 highlights

Data security can give local law enforcement agencies tracking information and documentation to get subpoenas and search warrants to recover your notebook. Tips & Tricks Use Computrace Complete's online help to get the program up and running. If your notebook does not already have Computrace Complete installed, contact Gateway at www.gateway.com/business to purchase the service. Data security The second step in notebook security is keeping your data safe and secure. Trusted Platform Module (TPM) Your notebook may be Trusted Platform Module (TPM) 1.2 hardware-ready. TPM is a component of your notebook that is better than commercially available software security. TPM uses a combination of hardware data encryption and password access. If your notebook includes TPM compliant hardware, your notebook may also include the software necessary to take full advantage of it's TPM capabilities. If your notebook has TPM hardware but does not include the TPM software, you can upgrade your notebook when the software is available. Tips & Tricks Use the TPM user guide or the program's online help to to get TPM up and running. CompuTrace Your notebook may include Computrace®Complete. If your notebook is stolen, you can use Computrace Complete to remotely delete personal information from your hard drive. www.gateway.com 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16

3
www.gateway.com
Data security
can give local law enforcement agencies tracking information and
documentation to get subpoenas and search warrants to recover your
notebook.
Data security
The second step in notebook security is keeping your data safe and secure.
Trusted Platform Module (TPM)
Your notebook may be Trusted Platform Module (TPM) 1.2
hardware-ready. TPM is a component of your notebook that is better than
commercially available software security. TPM uses a combination of
hardware data encryption and password access. If your notebook includes
TPM compliant hardware, your notebook may also include the software
necessary to take full advantage of it’s TPM capabilities. If your notebook
has TPM hardware but does not include the TPM software, you can
upgrade your notebook when the software is available.
CompuTrace
Your notebook may include Computrace
®
Complete. If your notebook is
stolen, you can use Computrace Complete to remotely delete personal
information from your hard drive.
Tips & Tricks
Use Computrace Complete’s online help to get the
program up and running.
If your notebook does not already have Computrace
Complete installed, contact Gateway at
www.gateway.com/business
to purchase the service.
Tips & Tricks
Use the TPM user guide or the program’s online help to
to get TPM up and running.