In addition to passwords and biometric inspection, they are requiring employees to use computers or other hardware that is directly connected to a central security system--so that if they report a computer or cell phone as stolen, a security officer will immediately be able to track the device once it is turned on.