Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Lost or Stolen Equipment Policy
"I need a policy outlining procedures for reporting lost or stolen equipment within 24 hours, including data breach protocols, employee responsibilities, and recovery steps, applicable to all devices containing sensitive data."
What is a Lost or Stolen Equipment Policy?
A Lost or Stolen Equipment Policy sets clear rules for handling company assets that go missing in Philippine workplaces. It outlines the steps employees must take when devices, tools, or other business equipment disappear - from immediate reporting to security teams and local police to documenting the incident details.
These policies help organizations comply with Philippine data privacy laws and protect sensitive information stored on missing devices. They typically include procedures for remote data wiping, asset tracking requirements, and employee responsibilities under Republic Act 10173. The policy also guides insurance claims and reduces liability risks by establishing consistent response protocols.
When should you use a Lost or Stolen Equipment Policy?
Your business needs a Lost or Stolen Equipment Policy when it starts issuing company devices or valuable equipment to employees. This becomes especially crucial for organizations handling sensitive data under Philippine privacy laws, or when operating in multiple locations where asset tracking becomes complex.
Use this policy immediately after acquiring business equipment worth over ₱50,000, or when expanding operations beyond a single office. It's particularly important for companies with mobile workers, field operations, or those managing confidential client information on portable devices. The policy helps prevent unauthorized access to company data and streamlines insurance claims when incidents occur.
What are the different types of Lost or Stolen Equipment Policy?
- Basic Equipment Policy: Covers fundamental reporting procedures and employee responsibilities - ideal for small businesses with limited assets
- Comprehensive Device Management Policy: Includes detailed protocols for both company-owned and BYOD equipment, plus data security measures
- High-Security Asset Policy: Features enhanced tracking systems and strict compliance rules for organizations handling sensitive Philippine government or financial data
- Field Operations Policy: Specifically designed for businesses with mobile workers and equipment used across multiple locations
- IT-Focused Equipment Policy: Emphasizes cybersecurity protocols and data protection measures for tech-heavy organizations
Who should typically use a Lost or Stolen Equipment Policy?
- HR Managers: Draft and maintain the Lost or Stolen Equipment Policy, coordinate with department heads on implementation
- IT Department: Oversee technical aspects, device tracking, and data security protocols
- Department Heads: Ensure team compliance and help customize policies for specific operational needs
- Employees: Follow reporting procedures and maintain responsibility for assigned equipment
- Compliance Officers: Monitor adherence to Philippine data protection laws and update policies accordingly
- Security Teams: Handle incident investigations and coordinate with local law enforcement when needed
How do you write a Lost or Stolen Equipment Policy?
- Asset Inventory: Create a complete list of company equipment, including serial numbers and current values
- Security Protocols: Document existing tracking systems and data protection measures used by your organization
- Reporting Chain: Map out your incident response team and their specific roles
- Insurance Details: Review current coverage and claim requirements for lost or stolen equipment
- Legal Requirements: Check Philippine data privacy laws affecting your industry sector
- Recovery Procedures: Outline steps for remote data wiping and equipment retrieval
- Documentation Forms: Prepare incident report templates and tracking logs
What should be included in a Lost or Stolen Equipment Policy?
- Policy Scope: Clear definition of covered equipment and affected employees
- Reporting Requirements: Detailed procedures and timeframes for incident reporting
- Employee Responsibilities: Specific duties for equipment care and security measures
- Data Protection Measures: Compliance with RA 10173 (Data Privacy Act) requirements
- Security Protocols: Steps for immediate data protection and device deactivation
- Recovery Procedures: Process for equipment retrieval and documentation
- Disciplinary Actions: Consequences for policy violations or negligence
- Acknowledgment Section: Employee signature and date fields
What's the difference between a Lost or Stolen Equipment Policy and an Access Control Policy?
A Lost or Stolen Equipment Policy differs significantly from an Access Control Policy. While both deal with security, they serve distinct purposes in Philippine organizations.
- Focus and Scope: Lost or Stolen Equipment policies deal with incident response after equipment disappears, while Access Control policies prevent unauthorized access before incidents occur
- Timing of Application: Access Control works proactively through daily security measures; Lost Equipment policies activate reactively when incidents happen
- Legal Requirements: Lost Equipment policies must align with insurance claim procedures and police reporting protocols, while Access Control focuses on system security standards
- Departmental Ownership: IT typically owns Access Control implementation, but Lost Equipment procedures involve multiple departments including security, HR, and finance
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it