Security management software, Using the security management software, Computer tracking software – Dell Latitude D430 (Mid 2007) User Manual
Page 66: If your computer is lost or stolen
66
Securing Your Computer
c
Under TPM Activation, select Activate and press
NOTE:
You only need to activate the program once.
d
Once the process is complete, the computer either restarts automatically or prompts you to restart
your computer.
Security Management Software
The security management software is designed to utilize four different features to help you secure your
computer:
• Log-in management
• Pre-boot authentication (using a fingerprint reader, smart card, or password)
• Encryption
• Private information management
Using the Security Management Software
For information about how to use the software and the different security features, see the Getting Started
Guide for the software:
Click Start→
All Programs→ Wave EMBASSY Trust Suite→ Getting Started Guide.
Computer Tracking Software
Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is
optional and may be purchased when you order your Dell™ computer, or you can contact your Dell sales
representative for information about this security feature.
NOTE:
Computer tracking software may not be available in certain countries.
NOTE:
If you have computer tracking software and your computer is lost or stolen, you must contact the company
that provides the tracking service to report the missing computer.
If Your Computer Is Lost or Stolen
• Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in your
description of the computer. Ask that a case number be assigned and write down the number, along
with the name, address, and phone number of the law enforcement agency. If possible, obtain the
name of the investigating officer.
NOTE:
If you know where the computer was lost or stolen, call a law enforcement agency in that area. If you do not
know, call a law enforcement agency where you live.
• If the computer belongs to a company, notify the security office of the company.