Toshiba m700-m710 User Manual

Page of 282
User’s Manual
6-16
Power and Power-Up Modes
User Token field
Create (button)
You can use an SD Card token, instead of entering the password. After 
you have registered a password, insert an SD Card in SD Card slot and 
click Create. You can use an SD Card of any capacity, but it must be 
formatted correctly.
If an unformatted card or one with an incompatible format is inserted, 
you will be prompted to format it with a tool named TOSHIBA SD 
Memory Card Format. To start the format tool, point to or click the 
following items:
Start -> All Programs -> TOSHIBA -> Utilities -> SD Memory 
Card Format
Disable (button)
Click this button to invalidate the token. You cannot re-validate old 
tokens, but you can use the same SD Cards to create new tokens.
If you forget your HDD User Password, TOSHIBA will NOT be able to 
assist you, and your HDD will be rendered COMPLETELY and 
PERMANENTLY INOPERABLE. TOSHIBA will NOT be held 
responsible for any loss of any data, any loss of use or access to your 
HDD, or for any other losses to you or any other person or organization 
that result from the loss of access to your HDD. If you can’t accept this 
risk, don’t register the HDD User Password.
If you want to register the HDD master Password or the password for 
the Ultra Slim Bay HDD, you can set them by the BIOS SETUP 
Program.
When saving the HDD User Password shut down or restart the 
computer. If the computer is not shut down or restarted, the saved data 
may not be correctly reflected. For more information on shutting down 
or restarting the computer, refer to 
 in Chapter 1. 
Refer to 
 section in Chapter 7 
for more information.
When you format an SD memory card, all data will be deleted. Be sure to 
save data on the card to other media before you format the card.
After using the token created for authentication, do not leave it inserted in 
the SD Card slot, ensure that the token is removed from the slot and stored 
in a safe location. If the token is left in the slot, there is a danger of theft or 
a third party using it for authentication and operating the user's computer 
(resulting in extraction, modification or deletion of data) when the user is 
not at their desk.