Title: C74AMST CreationDate: 06/23/93 17:09:07

Chapter 3. Using the Security Features

This chapter contains information on how you can protect your Dock I against theft or unauthorized use. There are two ways to secure the Dock I; use the security lock or attach the it to a work surface.

This chapter contains:

 

Using the Security Lock

3-2

Security Lock Description

3-2

Key Positions and Their Functions

3-2

Securing the Dock I with the Security Hook

3-4

Ordering Additional Security Lock Keys

3-5

Copyright IBM Corp. 1993

3-1

Page 47
Image 47
IBM Dock I manual Using the Security Features, This chapter contains