The Computrace® Agent and
the Monitoring Center
Most devices today come with firmware that contains the embedded Computrace® persistence module. When you install LoJack for Laptops, you are installing the Computrace Agent and activating our technology. After activation, the Agent contacts the Absolute Monitoring Center every day. Computrace technology is tamper resistant and only you - the authorized user - can remove the Agent and disable data and device security features.
If you file a report that your device was stolen (excluding Absolute Data Protect licenses), the frequency of Agent calls from your device to the Monitoring Center increases. The Agent sends specific information about your device and the device’s current user to the Monitoring Center. The Absolute Theft Recovery Team uses advanced forensic technologies on collected information to determine who has your device and what they are doing with it. We provide any evidence and location information that we collect to the appropriate law enforcement agency, who uses it to catch the criminal and recover your device.