SlideShare a Scribd company logo
1 of 41
Download to read offline
Buying and Selling
Computers and Mobile
Devices
Presented by: Matthew Gale
and Treigh Pedroche
Agenda
INTRODUCTIONS
BRIEF HISTORY
COMPUTERS
MOBILE DEVICES
➢ Built for the Department of Defense in 1999
➢ Law Enforcement
❖ FBI, US Marshall Service
❖ CIA, Pentagon
❖ City Police & State Police
➢ White Canyon's customers:
❖ Small to Medium-sized businesses
❖ Fortune 500 companies
❖ Government institutions.
➢ Originally built for Cash America's exclusive use
➢ Used in all Cash America and EZ Pawn locations
➢ Currently used by 100s of Independent Pawn
shops across the US, Canada,
KNOW CLEAN GROW
…how to accurately
appraise a computer
before you lend against it
…personal data before
reselling a computer
…computer sales by
showing potential buyers
what they’re getting
Computers
KNOW
CLEAN
CLEAN
RISK
LAWS TO WATCH OUT FOR
UNALLOCATED MEMORY
SYSTEMSAVER
Computer Sales: Risks
Laws to Watch Out For
•Red Flags Rule
• Use a computer program which prevents recovery of customer
information
•Safeguards Rule
• Written Security plan in place
•Possession of Child Pornography
•Health Insurance Portability and Accountability Act
(HIPAA)
•Sarbanes-Oxley Act (SOX
•Gramm-Leach-Bliley Act (GLBA)
Visit FTC.gov and The Department of Health and review each law
Delete Empty Recycle
Bin
Refresh
(Windows 8 and newer)
Restore from
partition
(Windows 7 and older)
Reformat
or Reset
How do you wipe?
Wiping Computer
Technician Computer Shop Recovery Partition
Unallocated Storage
Remove the
Date, remove
the risk
System
Saver
Windows
Refresh
Window’s
Restore
A hefty
hammer and
a thick nail
Securely deleted
   
Able to save programs
   
Can not recover deleted
files    
Password Removal
   
Resale Value
$$ $ $ -
GROW
Making More Money with
Computer Sales
• Profitability
• Display
• Shelf Appeal
Selling Computers: Let's make more money
Let’s make more profit
• 40 percent growth in net profit
• 3X Computer Sales
Mobile Devices
Laws And Potential Liability
•3.1 million stolen in 2013
•Safeguards Rule
•Red flags rule
•Not as resale friendly
Best Practices Blackberry
•Just 0.5% of the total market
•Less and less Blackberry devices
•Ensure original charger comes
with device
•Wipe before resale by:
•Selecting “Options”, “Security”,
“Security Wipe”
Best Practices Windows Devices
•Windows Phone 2.8% of market.
•Windows Phone 8 and older might
no longer be supported. Take in only
8.1 and newer.
•Surface tablets gaining popularity
•Surface RT and Surface 2 use ARM
and Windows RT; reduced
compatibility and value.
•Surface Pro 2 and Surface Pro 3 use
Intel and full Windows 8; enhanced
compatibility and value.
What Model Of Surface?
Best Practices Android
•Android holds 76.6% of total market
•More and more Android devices
•Focus on brand names, Samsung,
Motorola, Google, HTC, Asus, Sony
LG, Dell.
•Ensure phone or tablet comes with
original charger.
•Take in only Android 4.1 and newer.
(See next slide)
Best Practices Apple Devices
•iOS holds 19.7% of the total market
•iOS devices command higher resale
values
•Check the device’s status with Apple
•Disable Find My iPhone
•Disable iCloud(See Next Slide)
Checking Activation Lock Status
Disabling Find My Iphone/iCloud
Removing Device From iCloud
Removing Device From iCloud
Removing Device From iCloud
Removing Device From iCloud
Securely Erase
WipeDrive
Mobile
A hefty
hammer and a
thick nail
Securely deleted
   
Log File Report
   
Can not recover deleted
files    
Securely Erase
Grow your pawn shop
Sell more computers and
devices

More Related Content

What's hot

Mobile: Trends and Best Practices
Mobile: Trends and Best PracticesMobile: Trends and Best Practices
Mobile: Trends and Best PracticesForum One
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print InfographicEricsson
 
Smartphones!
Smartphones!Smartphones!
Smartphones!TheDit
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
The Year Of Mobile
The Year Of MobileThe Year Of Mobile
The Year Of MobileadconionSM
 
Mobile mamas by mullen and frank about women
Mobile mamas by mullen and frank about womenMobile mamas by mullen and frank about women
Mobile mamas by mullen and frank about womenDiane Ridgway-Cross
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommBarbara Ludwig
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Mobile Strategy: Mobile Context
Mobile Strategy: Mobile ContextMobile Strategy: Mobile Context
Mobile Strategy: Mobile ContextiQcontent
 
Mobile Convention Brussels - Luc Van de Velde - Microsoft
Mobile Convention Brussels - Luc Van de Velde - MicrosoftMobile Convention Brussels - Luc Van de Velde - Microsoft
Mobile Convention Brussels - Luc Van de Velde - MicrosoftMobile Convention
 
The Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATThe Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATM-STAT
 
5. tainx presenting on momo hanoi
5. tainx presenting on momo hanoi5. tainx presenting on momo hanoi
5. tainx presenting on momo hanoiQuang Anh Le
 
Mobile Monday Brussels: SoLoMo - Mobile Vikings
Mobile Monday Brussels: SoLoMo - Mobile VikingsMobile Monday Brussels: SoLoMo - Mobile Vikings
Mobile Monday Brussels: SoLoMo - Mobile VikingsMobile Monday Brussels
 
The world has gone mobile why you need to join them
The world has gone mobile why you need to join themThe world has gone mobile why you need to join them
The world has gone mobile why you need to join themJ.R. Atkins, MBA, MDiv
 
Future Tech - Spring 2014
Future Tech - Spring 2014Future Tech - Spring 2014
Future Tech - Spring 2014Deven Spear
 
Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)a16z
 

What's hot (19)

Mobile: Trends and Best Practices
Mobile: Trends and Best PracticesMobile: Trends and Best Practices
Mobile: Trends and Best Practices
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print Infographic
 
Smartphones!
Smartphones!Smartphones!
Smartphones!
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
The Year Of Mobile
The Year Of MobileThe Year Of Mobile
The Year Of Mobile
 
Mobile mamas by mullen and frank about women
Mobile mamas by mullen and frank about womenMobile mamas by mullen and frank about women
Mobile mamas by mullen and frank about women
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Sempo mobile yahoo
Sempo mobile yahoo Sempo mobile yahoo
Sempo mobile yahoo
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Why you need a mobile site
Why you need a mobile siteWhy you need a mobile site
Why you need a mobile site
 
Mobile Strategy: Mobile Context
Mobile Strategy: Mobile ContextMobile Strategy: Mobile Context
Mobile Strategy: Mobile Context
 
Mobile Convention Brussels - Luc Van de Velde - Microsoft
Mobile Convention Brussels - Luc Van de Velde - MicrosoftMobile Convention Brussels - Luc Van de Velde - Microsoft
Mobile Convention Brussels - Luc Van de Velde - Microsoft
 
Smart phones2010
Smart phones2010Smart phones2010
Smart phones2010
 
The Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATThe Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STAT
 
5. tainx presenting on momo hanoi
5. tainx presenting on momo hanoi5. tainx presenting on momo hanoi
5. tainx presenting on momo hanoi
 
Mobile Monday Brussels: SoLoMo - Mobile Vikings
Mobile Monday Brussels: SoLoMo - Mobile VikingsMobile Monday Brussels: SoLoMo - Mobile Vikings
Mobile Monday Brussels: SoLoMo - Mobile Vikings
 
The world has gone mobile why you need to join them
The world has gone mobile why you need to join themThe world has gone mobile why you need to join them
The world has gone mobile why you need to join them
 
Future Tech - Spring 2014
Future Tech - Spring 2014Future Tech - Spring 2014
Future Tech - Spring 2014
 
Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)
 

Viewers also liked

iphone5 icloud hack atempt
iphone5 icloud hack atemptiphone5 icloud hack atempt
iphone5 icloud hack atemptKenneth Kempf
 
2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloudO'Reilly Media
 
Icloud seminar report
Icloud seminar reportIcloud seminar report
Icloud seminar reportRicha Dewani
 
Icloud keynote2
Icloud keynote2Icloud keynote2
Icloud keynote2avsorrent
 
見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング
見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング
見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニングKazutoshi Tomita
 
空英-iCloud & Evernote 快速筆記
空英-iCloud & Evernote 快速筆記空英-iCloud & Evernote 快速筆記
空英-iCloud & Evernote 快速筆記芋頭 烤
 
iCloud WebPACS for Radiology
iCloud WebPACS for RadiologyiCloud WebPACS for Radiology
iCloud WebPACS for RadiologyiCloud Inc.
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple TechnologyAsmita Kalena
 
CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...
CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...
CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...smn-automate
 

Viewers also liked (16)

iphone5 icloud hack atempt
iphone5 icloud hack atemptiphone5 icloud hack atempt
iphone5 icloud hack atempt
 
iCloud
iCloud iCloud
iCloud
 
Bonjour, iCloud
Bonjour, iCloudBonjour, iCloud
Bonjour, iCloud
 
2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud
 
Apple iCloud
Apple iCloudApple iCloud
Apple iCloud
 
Data perisistence in iOS
Data perisistence in iOSData perisistence in iOS
Data perisistence in iOS
 
Icloud seminar report
Icloud seminar reportIcloud seminar report
Icloud seminar report
 
Icloud keynote2
Icloud keynote2Icloud keynote2
Icloud keynote2
 
見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング
見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング
見たい数字にたどりつくメニュー操作 Googleアナリティクス初級トレーニング
 
空英-iCloud & Evernote 快速筆記
空英-iCloud & Evernote 快速筆記空英-iCloud & Evernote 快速筆記
空英-iCloud & Evernote 快速筆記
 
Whats new in iOS5
Whats new in iOS5Whats new in iOS5
Whats new in iOS5
 
iCloud WebPACS for Radiology
iCloud WebPACS for RadiologyiCloud WebPACS for Radiology
iCloud WebPACS for Radiology
 
icloud
icloudicloud
icloud
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple Technology
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...
CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...
CocoaHeads PDX 2014 01 23 : CoreData and iCloud Improvements iOS7 / OSX Maver...
 

Similar to Dixie Pawn 2015 Abbreviated

IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysisRishi Banshiwal
 
Big Data
Big DataBig Data
Big Datacadmef
 
The Promise of Blockchain in the Supply Chain
The Promise of Blockchain in the Supply ChainThe Promise of Blockchain in the Supply Chain
The Promise of Blockchain in the Supply ChainProcurant
 
The boring side of drones
The boring side of dronesThe boring side of drones
The boring side of dronesPhilip Wheat
 
Apple vs Samsung - What do you know?
Apple vs Samsung - What do you know?Apple vs Samsung - What do you know?
Apple vs Samsung - What do you know?Rahul J
 
What is your Mobile App Strategy?
What is your Mobile App Strategy?What is your Mobile App Strategy?
What is your Mobile App Strategy?ROAMData
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
How to effectively deal with counterfeits
How to effectively deal with counterfeitsHow to effectively deal with counterfeits
How to effectively deal with counterfeitsYellow Brand Protection
 

Similar to Dixie Pawn 2015 Abbreviated (20)

IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysis
 
Big Data
Big DataBig Data
Big Data
 
The Promise of Blockchain in the Supply Chain
The Promise of Blockchain in the Supply ChainThe Promise of Blockchain in the Supply Chain
The Promise of Blockchain in the Supply Chain
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
Retail
RetailRetail
Retail
 
The boring side of drones
The boring side of dronesThe boring side of drones
The boring side of drones
 
Apple vs Samsung - What do you know?
Apple vs Samsung - What do you know?Apple vs Samsung - What do you know?
Apple vs Samsung - What do you know?
 
What is your Mobile App Strategy?
What is your Mobile App Strategy?What is your Mobile App Strategy?
What is your Mobile App Strategy?
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
How to effectively deal with counterfeits
How to effectively deal with counterfeitsHow to effectively deal with counterfeits
How to effectively deal with counterfeits
 

Dixie Pawn 2015 Abbreviated