This document outlines a scenario for verifying employees carrying laptops at entry/exit points using RFID tags and a mobile application. The scenario involves: 1) Configuring a SpotLight server to store employee and laptop details including photos; 2) Associating RFID tags on laptops with their owners; 3) Synchronizing this data to a handheld device used by security guards; 4) When a car approaches a gate, the guard's device displays photos of possible laptop owners to verify against the person and laptop in the car; 5) The guard indicates if the verification was successful or not using the mobile app.