Started using security software on new Dell computers in mid-2004 Currently purchase 3 year licenses for desktop, laptop, and netbook computers Points.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 2, 2008.
Laptop Responsibilities Memorial Middle School Laredo ISD.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Baltic High School Classroom Connections Presentation.
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Property Theft FY 2014 July - May Reported Thefts Unfounded Actual UGA as Victim Total Loss $321,058.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
COMPUTER REPAIR AND REPLACEMENT
Purpose of Inventory Control To tag all university assets over $5000 ◦ Useful life of 2 or more years ◦ Non-capital assets To conduct annual departmental.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
CS 337 Project Presentation Asset Management and Tracking Developers: –Jimmy Hoo –Edwin Panameno –Manuel Segura –Sheng-Tian Lin Customers –Alexandre Lomovtsev.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Property Control Asset Forms
How does it work? Why does it matter to you and AFA?
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Managed Host Security – Patch Management   BigFix Deployment April-September 2004 Jay Stamps, ITSS Turing Auditorium, May 21, 2004.
When are You Insured? Georgia Department of Administrative Services (DOAS) Risk Management provides insurance for all state agencies through a self-insured.
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Bag – O – Bytes Brought to you by The FPB Help Desk X6322 VPN and Case Software Center Sept 8 th, 2004.

Using Technology in Ministry Edward Braithwaite Seminary Student, NOBTS.
Networked Asset Protection System Contact: Anthony Rietkerk, GM Security Solutions Plus Templeton, CA
1.1 System Performance Security Module 1 Version 5.
Identity theft: Real or Virtual? By: Alex Metzler.
Protecting Your Information Assets
For the next 4 years every Year 9 student is a NSW government school will be given access to a new laptop for use as a learning tool while they are working.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Property Control Asset Forms Property Control Website URL:
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Courier Tracking System. Small Courier Operations Small courier services collect Letters and parcels from customers and issues its own POD number Then.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Phillip Zerzan, Chief Emergency: 911 or Non-Emergency: Portland State University Campus.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
New Principal Training Property Control July 7, 2015.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
The State of Computer & Data Security in Corporations Independent Survey.
Who are Orakelet? l IT-support service for students and employees at the University of Tromsø l IT-support service for the student hostels owned by studentsamskipsnaden.
Student Deployment. Logging In When you receive your computer, you will log in using your PS Connect login. This is the username and password you use.
Fixed Assets Campus Operations Portal SAISD Data Warehouse What is the Fixed Assets portal? The purpose of the Fixed Assets portal is to give campus and.
New Principal Training Property Control July 21, 2014.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Campus Operations Portal SAISD Data Warehouse Fixed Assets Fixed Assets Office The purpose of the Fixed Assets portal is to give campus and department.
Network management system
Grant Training Property Control July Mission Our Mission is to ensure proper tagging, tracking, and disposition of District assets while maintaining.
What you need to know about Technology. Getting Started.
HDPlus Asset Management HDPlus, Inc. Landline: Fax Cellphone:
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
Policies and Procedures
Chapter 7. Identifying Assets and Activities to Be Protected
Race to the Top Laptop Cart Training
Technology Distribution Procedures
Port Salerno Elementary School BYOD
Computer Security.
Fill out the Student Acceptance and Technology Agreement Sheet
G061 - Network Security.
Property Control Asset Forms
Presentation transcript:

Started using security software on new Dell computers in mid-2004 Currently purchase 3 year licenses for desktop, laptop, and netbook computers Points of contact are: Det. Cliff Martinez, SAISD - Police department ( ) Sylvia Orta, SAISD – Technology ( )

Absolute’s Computrace Intended to deter thefts, increase recovery possibilities and provide valuable asset information San Antonio ISD (Dec 20, 2009 – Present) Total Reported Lost or Stolen: 178 Total Recovered: 36 Total Systems Paid: 84 Amount Paid: $56, Active in Recovery Period: 58

How Computrace works…. A pre-determined, unique, check-in date and time is encoded in each computer Every 24-hours, the computer will try to call-in to Absolute’s web site Requires power and a connection to the network/ Internet Preferably using a network patch cable If it is successful, the computer’s information will be updated If it is not successful, the computer will keep trying every 24 hours. This is where we need your help!

How Computrace works…. Technology periodically s Principals with a list of computers that have not checked-in, in over 90 days. After every attempt is made to find the computer and it can not be found, take the next step – Report the computer as “stolen”. A theft report can be canceled if the computer is later found.

Report the theft Contact SAISD’s Police department, within 90 days, and provide: The computer’s SAISD asset tag number, serial number, make, model, date, time, event details, status of the power cord, and type of data (e.g. sensitive data) If the theft occurs outside of SAISD’s property – provide the location name and address You will receive a Police case number. Technology asks that the computer is “tracked” for a possible recovery. If the computer is on campus, the theft report is canceled.

Absolute’s reimbursement Absolute provides another service. If a stolen computer successfully checks-in every 30 days and is not recovered in 60 days, the computer may qualify for a pro-rated reimbursement. A pro-rated reimbursement is based on: the age of the computer the base cost of the computer, excluding the cost of SAISD required services and software. The campus will be notified when a payment is received.

Absolute’s inventory data Collects call-in information, including the ESN, Last- call date/time, Username, Operating system, Agent version, Serial number, Asset number, Make, Model, Agent status Collects IP address, all hardware/software information IP address is specific to the campus and areas on campus

Tips! Do not leave a laptop unattended If you travel with a laptop, lock it in the trunk At the end of the day, lock a laptop in a secured closet or drawer. Lock your classroom or office. Notify your campus or office when a computer is removed from SAISD’s property. Thank you for all you do!