SlideShare a Scribd company logo
1 of 13
LOGO




Implant chips that carries sensitive information
Find out why everybody is talking about chips implant as a modern
            choice of protecting sensitive information
                                                                                                         LOGO



              This method is an easier and more secure approach to perform credit card and transactions.




  Chip implant is a long-lasting, cost effective, comfort and safety method to keep protected your private information.




         Alleviate risk of misplacing or theft of conventional apparatus that record medical and credit card info.




  Provides a secure way to carry sensitive information and to perform credit card transaction at anytime and anywhere.



                   Easy to use, less time consuming, provides more security and it’s also a modern
                         way to protect your private information when it comes identity theft
How it works
                                                   LOGO




    Benefits
                    Contents
It’s so different
                       We offer a discount of 20% for the
 from anything
                       intervention if you contact us before 1
else on market!        may 2012!
                       We provide to the possibility to get yourself
                       a tattoo after implanting de chip, for free!
                       Education    programs      to     educate
                       customers about the importance of
                       protection sensitive information!

                       We provide you medical cost subsidies
                       to reduce cost of implant procedure.
Immediate Benefits
                                           LOGO




 We provide     You can get    You can keep in
                yourself a        safe data
you an extra
                nice tattoo    regarding credit
 chip if you    after    the     cards, bank
bring 5 more    implanting      accounts etc.
   friends      of the chip
                – free!
Benefit Packages
                                                                                LOGO

       Buy the chip.
       Medical intervention
                                     4600$            9100$            - Buy the chip.
                                                                       - Buy the technology of
                                                                        product to store
 Buy the chip.                                                         information on chip.
 Buy the                                                              - Maintainence fee for
  technology of                                                         servicing product to store
  product to store                                                      information on chip.
  information on            5700 $                                     Medical Intervention
  chip
 Medical
  intervention
                                                      8700$
                                                                      - Buy the chip.
                                                                      - Buy the technology
 - Buy the chip.                                                      of product to store
 - Buy the technology of                                              information on chip.
  product to store                                                    Medical intervention
  information on chip.                                                - Chip upgrade.
 - Maintainence fee for
  servicing product to
  store information on               10200$
  chip.                                       If you contact us before 1 May, we will
 Medical intervention                         provide you a 20% discount for each
 - Chip upgrade.
                                                             package.
We provide
                                                                                                                        LOGO
- Forget about concering about the theft of sensitive info.
- It’s an easier and more secure approach to perform credit card transactions.
- Information sheets sent to those who have experienced identity theft or thefit of their credit card info.
 When your chip goes in, you'll be able to walk up to any terminal in any office and log on instantly on your credit
  card if you want so.
- Your credit cards, telephone bills, Internet purchases and public records like home purchases and car licenses
  already do a pretty good job. They'll hype the convenience of leaving your keys, credit cards and money at home.
  Then they'll automate everything from cash registers to toll booths so if you're chipped you can zoom through in
  a digital carpool lane.




                                 Safety                                                  Simplicity
                                                               Trust




                                               Our goal = Your Security
Further services provided
                                                                      LOGO




      Medical              Credit card               Medical
    Intervention           companies               institutions
                            services




                                               Medical institutions
 A special clinic to         Credit card
                                                to install devices
  perform implant      companies to give a
                                                 that are able to
    procedure.         financial incentives
                                               extract information
                        to individuals who
                                                from implants M
                       opt for this safe way
                                                and medical cost
                       of carrying sensitive
                                               subsidies to reduce
                            information.
                                                 cost of implant
                                                    procedure.
Steps you should take!
                                                                     LOGO

              Select your
Register on               Pay for the
               benefits                 Educational     Medical
our website    package     pakage
                                          training    intervention




                                                                          Your
                                                                     information is
                                                                       now safe!
Services
                                                                    LOGO

Products                                                                   Market
When embedded chips
in human bodies with
                           50%                16%      We especially address to
an unique security                                     the individuals who are
protection for sensitive                               concerned about theft of
information.                                           sensitive info and to those
                                       16%             who seeks an easier and
                                                       more secure approach to
                                                       perform       credit   card
                                                       transactions.

                             50%             24%

                                                                         Service
Technology                             10%          - Education programs to educate
                                                      customers          about      the
                                                      importance about protection
- Technology product to
  store information on      10%               24%     sensitive information, while
                                                      making        this    information
  chip.                                               available for access or use.
- -Maintainence fee for                             - Information sheets sent to
  servicing product to                                those who have experienced
  store information on                                identity theft or thefit of their
  chip.                                               credit card info.
Objectives                                        LOGO

                          Our Goal

     - to provide a secure way for consumers to carry sensitive
          information and to perform credit card transaction.




Your security           Your satisfaction       Your delightfulness
Why you should get a chip implant
                                                                                                                   LOGO


                                               You must know that:                                                4


                           1                                                                   Chips use Radio Frequency ID to send
                                                                                               out a specific signal.
                                                                                               This signal can be read by a specific
                                                                                               reader or anyone that knows
In addition to helping consumers                                                  3             the ID number of the wearer of the
protect themselves        from identity                                                        implant.
theft as it pertains to credit fraud, we
are also focused on combating the
growing problem of medical identity                                   A recent survey found that only 5.8 percent of
theft, which affects 7 percent of                                     ID theft cases involve medical identity theft.
identity theft victims.
                                                 2


                               Through our secure personal health record, we
                               put consumers in charge of their own health
                               information through a robust, patient-controlled
                               interface.
Feedback received from those who have tested our service
                                                                                     LOGO



    It’s ok. I’m fine                 18.5%
         with it.
        I like it.                   17.5%


    Not that good            8.7%


     Pretty good                          23.6%
       service
    Good Service                                              63.6%


       Excellent                                                            84.3%
        Service
                        0%          20%           40%   60%           80%           100%
LOGO




 Contact us!
        www.protectyourinformation.com

More Related Content

Similar to Technology entrepreneurship venture lab 2012

IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief Mestizo Enterprises
 
A case study on BFSI and healthcare
A case study on BFSI and healthcare A case study on BFSI and healthcare
A case study on BFSI and healthcare Anubhuti Pandey
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationJay McBain
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
Mobile marketing meltdown
Mobile marketing meltdownMobile marketing meltdown
Mobile marketing meltdownMobile March
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety SolutionEddie Cohen
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
AllBright - Outsmarting Insurance
AllBright - Outsmarting InsuranceAllBright - Outsmarting Insurance
AllBright - Outsmarting InsuranceGil Yaniv
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantJohn Bedrick
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
SimplySecure Reseller SA Amit
SimplySecure Reseller SA AmitSimplySecure Reseller SA Amit
SimplySecure Reseller SA AmitAmit Parbhucharan
 

Similar to Technology entrepreneurship venture lab 2012 (20)

IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
 
A case study on BFSI and healthcare
A case study on BFSI and healthcare A case study on BFSI and healthcare
A case study on BFSI and healthcare
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
Mobile marketing meltdown
Mobile marketing meltdownMobile marketing meltdown
Mobile marketing meltdown
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety Solution
 
alltech profile
alltech profilealltech profile
alltech profile
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
AllBright - Outsmarting Insurance
AllBright - Outsmarting InsuranceAllBright - Outsmarting Insurance
AllBright - Outsmarting Insurance
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Securing the Human OS
Securing the Human OSSecuring the Human OS
Securing the Human OS
 
SimplySecure Reseller SA Amit
SimplySecure Reseller SA AmitSimplySecure Reseller SA Amit
SimplySecure Reseller SA Amit
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Technology entrepreneurship venture lab 2012

  • 1. LOGO Implant chips that carries sensitive information
  • 2. Find out why everybody is talking about chips implant as a modern choice of protecting sensitive information LOGO This method is an easier and more secure approach to perform credit card and transactions. Chip implant is a long-lasting, cost effective, comfort and safety method to keep protected your private information. Alleviate risk of misplacing or theft of conventional apparatus that record medical and credit card info. Provides a secure way to carry sensitive information and to perform credit card transaction at anytime and anywhere. Easy to use, less time consuming, provides more security and it’s also a modern way to protect your private information when it comes identity theft
  • 3. How it works LOGO Benefits Contents It’s so different We offer a discount of 20% for the from anything intervention if you contact us before 1 else on market! may 2012! We provide to the possibility to get yourself a tattoo after implanting de chip, for free! Education programs to educate customers about the importance of protection sensitive information! We provide you medical cost subsidies to reduce cost of implant procedure.
  • 4. Immediate Benefits LOGO We provide You can get You can keep in yourself a safe data you an extra nice tattoo regarding credit chip if you after the cards, bank bring 5 more implanting accounts etc. friends of the chip – free!
  • 5. Benefit Packages LOGO  Buy the chip.  Medical intervention 4600$ 9100$  - Buy the chip.  - Buy the technology of product to store  Buy the chip. information on chip.  Buy the  - Maintainence fee for technology of servicing product to store product to store information on chip. information on 5700 $  Medical Intervention chip  Medical intervention 8700$  - Buy the chip.  - Buy the technology  - Buy the chip. of product to store  - Buy the technology of information on chip. product to store  Medical intervention information on chip.  - Chip upgrade.  - Maintainence fee for servicing product to store information on 10200$ chip. If you contact us before 1 May, we will  Medical intervention provide you a 20% discount for each  - Chip upgrade. package.
  • 6. We provide LOGO - Forget about concering about the theft of sensitive info. - It’s an easier and more secure approach to perform credit card transactions. - Information sheets sent to those who have experienced identity theft or thefit of their credit card info.  When your chip goes in, you'll be able to walk up to any terminal in any office and log on instantly on your credit card if you want so. - Your credit cards, telephone bills, Internet purchases and public records like home purchases and car licenses already do a pretty good job. They'll hype the convenience of leaving your keys, credit cards and money at home. Then they'll automate everything from cash registers to toll booths so if you're chipped you can zoom through in a digital carpool lane. Safety Simplicity Trust Our goal = Your Security
  • 7. Further services provided LOGO Medical Credit card Medical Intervention companies institutions services Medical institutions A special clinic to Credit card to install devices perform implant companies to give a that are able to procedure. financial incentives extract information to individuals who from implants M opt for this safe way and medical cost of carrying sensitive subsidies to reduce information. cost of implant procedure.
  • 8. Steps you should take! LOGO Select your Register on Pay for the benefits Educational Medical our website package pakage training intervention Your information is now safe!
  • 9. Services LOGO Products Market When embedded chips in human bodies with 50% 16% We especially address to an unique security the individuals who are protection for sensitive concerned about theft of information. sensitive info and to those 16% who seeks an easier and more secure approach to perform credit card transactions. 50% 24% Service Technology 10% - Education programs to educate customers about the importance about protection - Technology product to store information on 10% 24% sensitive information, while making this information chip. available for access or use. - -Maintainence fee for - Information sheets sent to servicing product to those who have experienced store information on identity theft or thefit of their chip. credit card info.
  • 10. Objectives LOGO Our Goal - to provide a secure way for consumers to carry sensitive information and to perform credit card transaction. Your security Your satisfaction Your delightfulness
  • 11. Why you should get a chip implant LOGO You must know that: 4 1 Chips use Radio Frequency ID to send out a specific signal. This signal can be read by a specific reader or anyone that knows In addition to helping consumers 3 the ID number of the wearer of the protect themselves from identity implant. theft as it pertains to credit fraud, we are also focused on combating the growing problem of medical identity A recent survey found that only 5.8 percent of theft, which affects 7 percent of ID theft cases involve medical identity theft. identity theft victims. 2 Through our secure personal health record, we put consumers in charge of their own health information through a robust, patient-controlled interface.
  • 12. Feedback received from those who have tested our service LOGO It’s ok. I’m fine 18.5% with it. I like it. 17.5% Not that good 8.7% Pretty good 23.6% service Good Service 63.6% Excellent 84.3% Service 0% 20% 40% 60% 80% 100%
  • 13. LOGO Contact us! www.protectyourinformation.com