Pocket Pro Tech is born from a desire to deliver high quality computer systems and setting higher standards. Observing the business practices of other technology companies, we discovered many who use deceptive tactics. There is a trend in the industry of collecting information about users and their behavior in order to deliver focused advertising directly aimed at the interests of the user. These days it seems as if protection of privacy is a thing of the past. Most on-line users are aware they are being tracked, and many don’t care. This has led way to advertisers having very detailed information about people on-line. The majority of websites go a step further and share the data with third parties by sending the information over the Internet.

We are not interested in monetizing your personal information by selling it to third parties. We are only interested in how we may better serve our clients and preserving the trust required when performing data sensitive services.

We offer service for computer systems that includes privacy and security. We believe when you call a technician to service your computer systems you trust that your personal information will be protected. You would never knowingly allow a technician to scan your hard drive searching for illegal or personal information. However, this is what you can expect from other computer services. Some of which have an arrangement with the federal government to disclose the information on your system. We will oppose any such disclosure of our clients information. Your data is your data and it is none of our business to look into the content of your data. By respecting your privacy and intentionally ignoring content, it protects both you and our company.

It’s our business to provide the highest quality computer systems custom built for each client. To be able to deliver the most beneficial system to our clients, we must learn about the intended use of each system. Our clients must be able to feel comfortable sharing that information to enable us to build the best. If we were to employ some of the tactics that other services employ, our clients would quickly learn that we could not be trusted. Trust is the cornerstone of our ability to deliver the best.

Why Privacy

There are those who don’t care about privacy. They believe since they have “nothing to hide” that it is okay for businesses to collect information about them and their likes. At face value this seems like an acceptable statement. The problem comes in when the information is leaked or hacked. You can have security without privacy, but you cannot have privacy without security.

Why security

Security is important these days with the increase in breaches of company data. There are individuals out there who prey on data stored by companies with the intent to gather consumer information. Fraud and identity theft rates continue to surge. While the Internet is by nature an insecure platform, there are many ways to protect information that is transmitted over the Internet. One way in which this is accomplished is by using an SSL encrypted connection. With SSL, data transmissions are encoded like a lock that only the site and the user accessing the site have the key. In this way it is very difficult for any third party observers to gain knowledge of personal information.

Security is often neglected and overlooked. Most don’t consider it until it is too late. The effects of having little or no security will eventually invite hackers. The most effective security is realized by education about best practices. The first line of defense begins with choosing a secure password that is not easily guessed.

Why only the Best

When creating a new computer system, quality matters. For electronics, the old saying, “you get what you pay for” is real. After going through a trial and error phase of purchasing electronics, you will quickly discover that some items just cannot be skimped. Low cost items usually strip away functionality or expandability leaving you with a system that is not able to grow along with you.

We believe in purchasing components that we have experienced to be strong and reliable. Using some of the best brands in computing allows us to deliver a final product that we can be proud. Knowing that our clients are left with a dependable, future proof solution provides the added benefit of less service calls to troubleshoot a failing system. That also provides our clients with less down time and improved performance at every level.

Why Pocket

The term pocket is used in many activities. In bowling aim for the ball to hit the pocket. The key is in the pocket. The key to consistent strikes is to angle the ball into the "pocket".

In football, the pocket is where a quarterback is protected on all sides by teammates who are blocking rushers. The offensive line forms a wall of protection around the quarterback. This allows him adequate time to find an open receiver and to pass the ball.

In poker there are pocket aces. The term pocket refers to all cards that the opponent cannot see.

We like to say we are your technology professional in your back pocket.