Step 1 – Notify your manager and IT/security team
This should be your very first action. Even if you think the device might turn up at home, notify IT anyway.
- Tell them when and where it was last seen.
- Specify what type of device it was and whether it was work-issued or BYOD.
- Explain what accounts or documents were accessible.
Step 2 – Report the incident formally if required
Many companies — especially those handling customer data, healthcare information, financial accounts, or regulated industry data — require an incident ticket or written report.
- Security teams need a timestamp for audit logs.
- Insurance may require an official loss report.
- Legal/compliance teams may need documentation.
Step 3 – Revoke access to accounts tied to the device
Work devices are often logged in to high-risk systems:
- Company email and calendar
- Internal tools (Slack, Teams, Jira, GitHub, CRM, etc.)
- VPN access tokens
- Shared drives and cloud storage
- Password manager extensions
Step 4 – Let IT perform remote actions
Modern corporate devices often support remote commands:
- Remote lock (prevents further access)
- Remote wipe (erases sensitive data)
- Device tracking or last-seen location
- Network access revocation
If you are asked whether remote wipe is acceptable, be honest about whether any personal data is on the device.
Step 5 – Document any sensitive data stored locally
IT/security may ask:
- Was anything stored outside encrypted containers?
- Were client files cached locally?
- Were browser tabs logged into internal dashboards?
- Was 2FA tied to the device?
Provide detail, not guesses. They’re trying to assess risk, not blame you.
Step 6 – File external reports if needed
Depending on the situation:
- Police report if device was stolen or contains regulated data.
- Venue report (airport, café, conference, rideshare).
- Travel insurance if applicable.