There's another use, but of limited value. If a unit known to be "stolen" is booted with network, it could do some sort of notification if the new "owner" was foolish enough to put a new hijack on it. There's a lot of ifs, there.