2. When prompted, swipe your nger over the reader.
3. On request, type your windows password. The enrolled ngerprint is now associated with your windows
password.
The next time you start the computer, you can log on to the system by swiping your nger over the
reader once.
Attention: If you always use your ngerprint to log on to the system, you may forget your password. Write
down your password, and keep it in a safe place.
Care for the ngerprint reader
The following actions could damage the ngerprint reader or cause it not to work properly:
• Scratching the surface of the reader with a hard, pointed object.
• Scraping the surface of the reader with your ngernail or anything hard.
• Using or touching the reader with a dirty nger.
If you notice any of the following conditions, gently clean the surface of the reader with a dry, soft, lint-free
cloth:
• The surface of the reader is dirty or stained.
• The surface of the reader is wet.
• The reader often fails to enroll or authenticate your ngerprint.
If your nger has any of the following conditions, you may not be able to register or authenticate it:
• Your nger is wrinkled.
• Your nger is rough, dry, or injured.
• Your nger is very dry.
• Your nger is stained with dirt, mud, or oil.
• The surface of your nger is very different from when you enrolled your ngerprint.
• Your nger is wet.
• A nger is used that has not been enrolled.
To improve the situation, try the following:
• Clean or wipe your hands to remove any excess dirt or moisture from the ngers.
• Enroll and use a different nger for authentication.
• If your hands are too dry, apply lotion to them.
Notice on deleting data from your hard disk drive or solid state drive
As computers spread into every corner of life, they process more and more information. The data on your
computer, some of which is sensitive, is stored on a storage device, either a hard disk drive or the solid state
drive. Before you dispose of, sell, or hand over your computer, make sure to delete data stored on it.
Handing your computer over to someone else without deleting the loaded software, such as operating
systems and application software, may even violate License Agreements. You are advised to check the
terms and conditions of those Agreements.
There are methods that seem to delete the data:
• Move the data to the recycle bin, and then choose the Empty recycle bin command.
78 User Guide