SlideShare a Scribd company logo
1 of 20
Protecting Laptops & Other Electronic Devices On- and Off Campus © 2008  STOP—Security Tracking of Office Property. All Rights Reserved. August 9, 2010
Lost and Stolen Laptops A Continuing Problem On- and Off-Campus ,[object Object],[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Who Uses STOP at Colleges & Universities? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
The STOP System Protects: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
How STOP Works: ,[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
What’s a Laptop Worth? ,[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
If Security Plate is Removed: © 2008  STOP—Security Tracking of Office Property. All Rights Reserved. Stolen Property 1-800-488-STOP
New From STOP: STOPLock Two Layers of Protection: Cable Lock + STOP Security Plate © 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Individual Web Registration © 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Enterprise Web Registration © 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Protecting Laptops & Other Devices ,[object Object],[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
University of Toronto Case Study ,[object Object],[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
University of Toronto and STOP in the Media © 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Real-time Recoveries Posted on STOP’s Website © 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Summary ,[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
Partial List of College/University Clients ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.
[object Object],© 2008  STOP—Security Tracking of Office Property. All Rights Reserved.

More Related Content

Similar to Protecting Electronic Devices On-Off Campus

Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Bonagiri Rajitha
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloJohn Intindolo
 
The impact of mobile technology on education markets
The impact of mobile technology on education marketsThe impact of mobile technology on education markets
The impact of mobile technology on education marketsOutsell
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
Texas Public Sector CIO Academy
Texas Public Sector CIO AcademyTexas Public Sector CIO Academy
Texas Public Sector CIO AcademySplunk
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Khs Ndia Conference Ppt Version 15 Jan 09 Redacted 8 Sept 2009
Khs Ndia Conference   Ppt Version 15 Jan 09 Redacted 8 Sept 2009Khs Ndia Conference   Ppt Version 15 Jan 09 Redacted 8 Sept 2009
Khs Ndia Conference Ppt Version 15 Jan 09 Redacted 8 Sept 2009kharmanstokes
 
Mobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeMobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeArfatAhmadKhan1
 
Group Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docxGroup Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docxwhittemorelucilla
 
STOP's Corporate Presentation
STOP's Corporate PresentationSTOP's Corporate Presentation
STOP's Corporate Presentationstoptheft
 
Rain Concert Mobile Applications
Rain Concert Mobile ApplicationsRain Concert Mobile Applications
Rain Concert Mobile ApplicationsSeema Abhilash
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 

Similar to Protecting Electronic Devices On-Off Campus (20)

Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
 
The impact of mobile technology on education markets
The impact of mobile technology on education marketsThe impact of mobile technology on education markets
The impact of mobile technology on education markets
 
ke-1.pptx
ke-1.pptxke-1.pptx
ke-1.pptx
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Texas Public Sector CIO Academy
Texas Public Sector CIO AcademyTexas Public Sector CIO Academy
Texas Public Sector CIO Academy
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
Khs Ndia Conference Ppt Version 15 Jan 09 Redacted 8 Sept 2009
Khs Ndia Conference   Ppt Version 15 Jan 09 Redacted 8 Sept 2009Khs Ndia Conference   Ppt Version 15 Jan 09 Redacted 8 Sept 2009
Khs Ndia Conference Ppt Version 15 Jan 09 Redacted 8 Sept 2009
 
Mobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeMobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposae
 
Group Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docxGroup Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docx
 
STOP's Corporate Presentation
STOP's Corporate PresentationSTOP's Corporate Presentation
STOP's Corporate Presentation
 
Rain Concert Mobile Applications
Rain Concert Mobile ApplicationsRain Concert Mobile Applications
Rain Concert Mobile Applications
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 

Protecting Electronic Devices On-Off Campus

  • 1. Protecting Laptops & Other Electronic Devices On- and Off Campus © 2008 STOP—Security Tracking of Office Property. All Rights Reserved. August 9, 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 8. If Security Plate is Removed: © 2008 STOP—Security Tracking of Office Property. All Rights Reserved. Stolen Property 1-800-488-STOP
  • 9. New From STOP: STOPLock Two Layers of Protection: Cable Lock + STOP Security Plate © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 10. © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 11. Individual Web Registration © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 12. Enterprise Web Registration © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 13.
  • 14.
  • 15. University of Toronto and STOP in the Media © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 16. Real-time Recoveries Posted on STOP’s Website © 2008 STOP—Security Tracking of Office Property. All Rights Reserved.
  • 17.
  • 18.
  • 19.
  • 20.