1. The location of the device can be tracked, the device can be locked, and all the data from the device can be wiped.