SlideShare a Scribd company logo
Suspect is identified and laptop is returned due to LoJack for Laptops theft recovery software.
CASE NUMBER: 8G156
Theft Date
December 7, 2012
Location
Tucson, Arizona, USA
Details
Theft from person
Model
HP ProBook 4430s

Recovery Date
Location
Absolute Investigator
Criminal Charges

March 19, 2013
Tucson, Arizona, USA
J. Farrell
Theft plus additional
charges pending

REPORT: A laptop was forcefully taken from a student outside of his apartment building. Luckily the
computer was protected with LoJack for Laptops and once reported stolen, an Absolute investigator
quickly discovered the laptop was being used in a local school district. Contact was made with the
school police and the suspect’s information was provided. The school police were able to confront the
accused who ended up admitting to stealing the laptop. The suspect was arrested for theft.
The suspect in this case was arrested on outstanding warrants for other crimes and now has an
additional charge of theft to add to his record. The laptop was recovered and returned to the victim.
About the Company:
Absolute Software helps businesses and consumers track, manage, secure and recover mobile
computers and devices using our patented persistence technology. We license the name "LoJack" from
the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops,
and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000
devices in over 100 countries around the world.
©2013 Absolute Software Corporation. All rights reserved.

More Related Content

Viewers also liked

Elementos del estado
Elementos del estadoElementos del estado
Elementos del estado
Kevin Campos
 
Apresentação singullare iguatemi signed
Apresentação singullare iguatemi signedApresentação singullare iguatemi signed
Apresentação singullare iguatemi signed
MARIO CUNHA
 
3º basico a 06 de noviembre
3º basico a  06 de noviembre3º basico a  06 de noviembre
3º basico a 06 de noviembre
Colegio Camilo Henríquez
 
Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)
Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)
Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)
ipz
 
Amherst_ECE_MS_comm_net_sys
Amherst_ECE_MS_comm_net_sysAmherst_ECE_MS_comm_net_sys
Amherst_ECE_MS_comm_net_sysRohit Malgaonkar
 
2º basico a 06 de noviembre
2º basico a  06 de noviembre2º basico a  06 de noviembre
2º basico a 06 de noviembre
Colegio Camilo Henríquez
 
Noticia Diario La Tercera 12.11.2015
Noticia Diario La Tercera 12.11.2015Noticia Diario La Tercera 12.11.2015
Noticia Diario La Tercera 12.11.2015
Nelson Leiva®
 
ПроОбраз
ПроОбразПроОбраз
ПроОбраз
GraphiTe2005
 
Photoshop cs5.1 read me
Photoshop cs5.1 read mePhotoshop cs5.1 read me
Photoshop cs5.1 read meranamansour_
 
HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...
HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...
HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...Keyur Patel
 
Інститут психічного здоров'я УКУ: сьогодення та перспективи
Інститут психічного здоров'я УКУ: сьогодення та перспективиІнститут психічного здоров'я УКУ: сьогодення та перспективи
Інститут психічного здоров'я УКУ: сьогодення та перспективи
ipz
 
Ресурс терапевтичного стосунку в КПТ
Ресурс терапевтичного стосунку в КПТРесурс терапевтичного стосунку в КПТ
Ресурс терапевтичного стосунку в КПТ
ipz
 
Trabalho em Equipe
Trabalho em Equipe Trabalho em Equipe
Trabalho em Equipe
Maria Lemos
 
Trabalho em Equipe
Trabalho em EquipeTrabalho em Equipe
Trabalho em Equipe
Camilo Almendra
 

Viewers also liked (16)

Elementos del estado
Elementos del estadoElementos del estado
Elementos del estado
 
Apresentação singullare iguatemi signed
Apresentação singullare iguatemi signedApresentação singullare iguatemi signed
Apresentação singullare iguatemi signed
 
3º basico a 06 de noviembre
3º basico a  06 de noviembre3º basico a  06 de noviembre
3º basico a 06 de noviembre
 
Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)
Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)
Psychological Diagnoscs and Quality Management (MSc Alexandra Faessler)
 
Activity Highlights
Activity HighlightsActivity Highlights
Activity Highlights
 
Amherst_ECE_MS_comm_net_sys
Amherst_ECE_MS_comm_net_sysAmherst_ECE_MS_comm_net_sys
Amherst_ECE_MS_comm_net_sys
 
2º basico a 06 de noviembre
2º basico a  06 de noviembre2º basico a  06 de noviembre
2º basico a 06 de noviembre
 
Noticia Diario La Tercera 12.11.2015
Noticia Diario La Tercera 12.11.2015Noticia Diario La Tercera 12.11.2015
Noticia Diario La Tercera 12.11.2015
 
ПроОбраз
ПроОбразПроОбраз
ПроОбраз
 
Photoshop cs5.1 read me
Photoshop cs5.1 read mePhotoshop cs5.1 read me
Photoshop cs5.1 read me
 
KTC_Harvard_Case_Study
KTC_Harvard_Case_StudyKTC_Harvard_Case_Study
KTC_Harvard_Case_Study
 
HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...
HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...
HAEnabled Oracle Enterprise Manager 12c on Virtualized Oracle Database Applia...
 
Інститут психічного здоров'я УКУ: сьогодення та перспективи
Інститут психічного здоров'я УКУ: сьогодення та перспективиІнститут психічного здоров'я УКУ: сьогодення та перспективи
Інститут психічного здоров'я УКУ: сьогодення та перспективи
 
Ресурс терапевтичного стосунку в КПТ
Ресурс терапевтичного стосунку в КПТРесурс терапевтичного стосунку в КПТ
Ресурс терапевтичного стосунку в КПТ
 
Trabalho em Equipe
Trabalho em Equipe Trabalho em Equipe
Trabalho em Equipe
 
Trabalho em Equipe
Trabalho em EquipeTrabalho em Equipe
Trabalho em Equipe
 

Similar to Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6

Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Absolute LoJack
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Absolute LoJack
 
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Absolute LoJack
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Absolute LoJack
 

Similar to Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6 (6)

Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
 
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6

  • 1. Suspect is identified and laptop is returned due to LoJack for Laptops theft recovery software. CASE NUMBER: 8G156 Theft Date December 7, 2012 Location Tucson, Arizona, USA Details Theft from person Model HP ProBook 4430s Recovery Date Location Absolute Investigator Criminal Charges March 19, 2013 Tucson, Arizona, USA J. Farrell Theft plus additional charges pending REPORT: A laptop was forcefully taken from a student outside of his apartment building. Luckily the computer was protected with LoJack for Laptops and once reported stolen, an Absolute investigator quickly discovered the laptop was being used in a local school district. Contact was made with the school police and the suspect’s information was provided. The school police were able to confront the accused who ended up admitting to stealing the laptop. The suspect was arrested for theft. The suspect in this case was arrested on outstanding warrants for other crimes and now has an additional charge of theft to add to his record. The laptop was recovered and returned to the victim. About the Company: Absolute Software helps businesses and consumers track, manage, secure and recover mobile computers and devices using our patented persistence technology. We license the name "LoJack" from the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops, and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000 devices in over 100 countries around the world. ©2013 Absolute Software Corporation. All rights reserved.