Gateway MX6452 8511385 - User Guide Gateway Notebook - Page 69

Data security, Trusted Platform Module (TPM), Computrace

Page 69 highlights

Data security Your notebook may be enabled to take advantage of Computrace® Complete, a service you can purchase to help find your notebook if it is stolen. This program automatically reports the location of your notebook once a day while it is connected to the Internet. If your notebook is stolen, the frequency increases to every fifteen minutes. A recovery team can give local law enforcement agencies tracking information and documentation to get subpoenas and search warrants to recover your notebook. Data security The second step in notebook security is keeping your data safe and secure. Trusted Platform Module (TPM) Tips & Tricks Use the TPM user guide or the program's online help to get TPM up and running. Your notebook may be Trusted Platform Module (TPM) 1.2 hardware-ready. TPM is a component of your notebook that is better than commercially available software security. TPM uses a combination of hardware data encryption and password access. If your notebook includes TPM compliant hardware, your notebook may also include the software necessary to take full advantage of its TPM capabilities. If your notebook has TPM hardware but does not include the TPM software, you can upgrade your notebook when the software is available. Computrace Your notebook may include Computrace® Complete. If your notebook is stolen, you can use Computrace Complete to remotely delete personal information from your hard drive. 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262

Data security
59
Your notebook may be enabled to take
advantage of Computrace® Complete, a service
you can purchase to help find your notebook if
it is stolen. This program automatically reports
the location of your notebook once a day while
it is connected to the Internet. If your notebook
is stolen, the frequency increases to every fifteen
minutes. A recovery team can give local law
enforcement agencies tracking information and
documentation to get subpoenas and search
warrants to recover your notebook.
Data security
The second step in notebook security is keeping
your data safe and secure.
Trusted Platform Module (TPM)
Tips & Tricks
Use the TPM user guide
or the program’s
online help to get TPM
up and running.
Your notebook may be Trusted Platform Module
(TPM) 1.2 hardware-ready. TPM is a component
of your notebook that is better than
commercially available software security. TPM
uses a combination of hardware data encryption
and password access. If your notebook includes
TPM compliant hardware, your notebook may
also include the software necessary to take full
advantage of its TPM capabilities. If your
notebook has TPM hardware but does not
include the TPM software, you can upgrade your
notebook when the software is available.
Computrace
Your notebook may include Computrace®
Complete. If your notebook is stolen, you can
use Computrace Complete to remotely delete
personal information from your hard drive.