A user enabled application for monitoring the presence of a PDA connected
to a network via a cradle and, in response, ringing a phone in the
vicinity of the PDA. The display on the telephone displays a message that
asks the user to enter an access code via the telephone dialpad. If the
user enters the correct access code then nothing happens and the phone
continues to work as normal. If, however, the correct access code is not
entered, the system communicates the unauthorized removal of the PDA to
pre-selected phone numbers, pager numbers or email addresses. Appropriate
steps can then be taken to try to and recover the missing device.