A method for deterring unauthorized use of an electronic device is
described. The method includes installing security data in a protected
storage area, installing a security routine operable to check for the
security data, and prompting a user for identity information if the
security data is found, before permitting use of the device. In an
implementation, the device is shut down if the identity information is
incorrect, and manufacturer contact information may be displayed before
shutting down. But if the user responds correctly, the activation process
is continued to enable normal operation of the device.