The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.
school computer protection
one-to-one laptop programs in school districts and colleges across North America. 18 Daniel Roth with Stephanie Mehta, IDENTITY THEFT: The Great Data Heist, May 16, 2005, Fortune. RECOVERY Thieves know that very few stolen computers are ever located. Armed with this fact, they have become bolder in their methods and more active than ever. In 2000, a laptop computer sitting on a podium was stolen from the CEO of Qualcomm during a press conference.19 Thieves count on the fact that organizations and indivi