A system and method for securing and tracking an electronic device. The
system includes hardware, software and firmware components that cooperate
to allow tracking, disabling, and other interaction with the stolen
electronic device. The system includes an application component,
non-viewable component and Basic Input/Output Subsystem (BIOS) component
that are present on the electronic device. The BIOS component maintains
the secured environment of the application and non-viewable components.
If only the application component was provided, a simple low level format
of the hard disk drive would remove the application and bypass the
security features. The system implements an "application and BIOS" based
solution to electronic device security.