Dear ....,
Thanks for your interest in Undercover!
To answer your questions,
Me said:
1- "Undercover is the world's first theft-recovery software that will
send screenshots of your stolen Mac at regular intervals"
Who is the person who actually gets the screenshots? Is it the owner
of the notebook (i.e. me) or is it you ?
We receive the screenshots, and then choose the useful ones, and send them to you and the police. You will always be the first to receive information, and we always add you as cc when communicating with the police and the ISP provider.
Me said:
2-"The network information enables us to work with the network administrators of the ISP the thief is connected to. Since ISPs
consider computer theft as network abuse, they will uncover the
thief's identity."
This means that an Internet Service Provider would actually tell who
an IP belongs to. I think that the law about the ISP's rights/duties
changes from country to country. Do you have specials agreements to
collaborate with ISPs?
The ISP won't disclose this information directly to us, but it will share the information with the police.
Me said:
3-"Together with law enforcement, we work to recover the Mac."
So does this mean that once a notebook is stolen, undercover employees
take care of everything and contact the authorities to try to recover
the notebook? Undercover works "wordwide" so does it mean that you
will collaborate with authorities all around the world?
Yes, we do work woldwide and communicate with the police, however, we expect you also to help us communicating with the police. This would include giving us details, handing over documents when we do not have a police e-mail, etc.