Data Security; Trusted Platform Module (Tpm); Computrace - Gateway MX6452 User Manual

Platinum edition
Hide thumbs Also See for MX6452:
Table of Contents

Advertisement

Data security

Trusted Platform Module (TPM)

Tips & Tricks
Use the TPM user guide
or the program's
online help to get TPM
up and running.

Computrace

Your notebook may be enabled to take
advantage of Computrace® Complete, a service
you can purchase to help find your notebook if
it is stolen. This program automatically reports
the location of your notebook once a day while
it is connected to the Internet. If your notebook
is stolen, the frequency increases to every fifteen
minutes. A recovery team can give local law
enforcement agencies tracking information and
documentation to get subpoenas and search
warrants to recover your notebook.
The second step in notebook security is keeping
your data safe and secure.
Your notebook may be Trusted Platform Module
(TPM) 1.2 hardware-ready. TPM is a component
of your notebook that is better than
commercially available software security. TPM
uses a combination of hardware data encryption
and password access. If your notebook includes
TPM compliant hardware, your notebook may
also include the software necessary to take full
advantage of its TPM capabilities. If your
notebook has TPM hardware but does not
include the TPM software, you can upgrade your
notebook when the software is available.
Your notebook may include Computrace®
Complete. If your notebook is stolen, you can
use Computrace Complete to remotely delete
personal information from your hard drive.
Data security
59

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mx6450Platinum edition

Table of Contents