How to Block a Stolen Mobile Phone in the Philippines

I. Introduction

A stolen mobile phone is not merely a lost gadget. In the Philippines, a phone commonly contains access to banking apps, e-wallets, government accounts, email, social media, private photos, work communications, one-time passwords, and registered SIM cards. Because of this, the legal response should address two separate but related concerns:

First, the physical device must be disabled or made difficult to use or resell.

Second, the SIM card, mobile number, online accounts, financial accounts, and personal data connected to the phone must be secured.

Blocking a stolen mobile phone in the Philippines usually involves several institutions: the mobile network operator, the National Telecommunications Commission, the police, banks or e-wallet providers, and sometimes the courts or prosecutors if a criminal case is pursued.

This article explains the legal framework, practical steps, required documents, remedies, and risks involved in blocking a stolen mobile phone in the Philippine context.


II. Meaning of “Blocking” a Stolen Mobile Phone

The phrase “block a stolen phone” may refer to different actions. It is important to distinguish them because each is handled by a different entity.

1. SIM Blocking or SIM Deactivation

This means preventing the stolen SIM card from being used for calls, texts, mobile data, OTPs, banking verification, and account recovery.

This is usually done through the mobile network operator, such as Globe, Smart, DITO, or another authorized telecommunications provider.

2. IMEI Blocking

Every mobile phone has a unique identifier called the International Mobile Equipment Identity, or IMEI. IMEI blocking prevents the physical device from connecting to mobile networks, even if another SIM card is inserted.

In the Philippines, IMEI blocking is generally handled through the National Telecommunications Commission, often with supporting documents such as proof of ownership and a police report or affidavit of loss.

3. Remote Locking or Remote Wiping

This is done through the phone’s operating system or account services:

For Android phones, this is usually through Google’s Find My Device.

For iPhones, this is usually through Apple’s Find My iPhone and Activation Lock.

Remote locking and remote wiping are not government procedures. They are account-based security features offered by the platform provider.

4. Account Blocking

This means securing access to accounts connected to the phone, such as:

bank accounts, GCash, Maya, ShopeePay, Lazada Wallet, email, Facebook, Instagram, TikTok, Telegram, WhatsApp, Viber, government portals, work accounts, cloud storage, and password managers.

This step is legally significant because unauthorized access, fraud, identity theft, and data misuse may follow after the theft.


III. Legal Basis and Relevant Philippine Laws

There is no single “stolen phone law” that covers every aspect of the problem. Instead, several Philippine laws and regulations may apply.

A. Revised Penal Code

The theft of a mobile phone may constitute a criminal offense under the Revised Penal Code.

1. Theft

If a person takes a mobile phone without violence, intimidation, or force upon things, with intent to gain, the act may fall under theft.

2. Robbery

If the phone is taken through violence, intimidation, or force, the offense may be robbery.

3. Qualified Theft or Other Aggravated Circumstances

Depending on the facts, the offense may be aggravated. For example, theft committed by a person with special trust or confidence may raise additional legal issues.

4. Fencing

If another person knowingly buys, sells, receives, possesses, keeps, or disposes of a stolen phone, that person may be liable under the Anti-Fencing Law. This is important because stolen phones are often resold through informal markets, online marketplaces, repair shops, or secondhand dealers.


B. SIM Registration Act

The SIM Registration Act, Republic Act No. 11934, requires SIM registration and connects mobile numbers with verified subscriber information.

For a stolen phone, this matters because:

The victim should promptly report the stolen SIM to the telco.

The telco may deactivate, block, or replace the SIM after identity verification.

A stolen registered SIM can expose the registered owner to risks if the SIM is used for scams, fraud, or unlawful communications.

A prompt report helps create a record that the subscriber no longer had control over the SIM after the theft.

The SIM Registration Act does not, by itself, automatically block the physical phone. It primarily concerns the SIM card and mobile number.


C. National Telecommunications Commission Regulations

The National Telecommunications Commission, or NTC, is the government agency that regulates telecommunications in the Philippines.

For stolen phones, the NTC is commonly involved in requests for IMEI blocking. Once a device’s IMEI is blocked, the phone may be prevented from accessing mobile network services in the Philippines.

This is especially useful when the thief replaces the stolen SIM with another SIM. SIM blocking alone does not stop the physical device from being reused. IMEI blocking targets the device itself.


D. Data Privacy Act of 2012

The Data Privacy Act of 2012, Republic Act No. 10173, may become relevant when a stolen phone contains personal information.

A stolen phone may expose:

private photos and videos, personal messages, contact lists, IDs, bank details, government records, employer data, client data, medical information, school records, business records, and confidential communications.

If the phone contains sensitive personal information, especially work-related or client-related data, the owner may need to notify an employer, data protection officer, bank, or affected persons, depending on the circumstances.

For ordinary personal use, the practical concern is immediate account protection. For business or professional use, the loss may have formal data privacy implications.


E. Cybercrime Prevention Act

The Cybercrime Prevention Act of 2012, Republic Act No. 10175, may apply if the thief or another person uses the stolen phone to commit cybercrimes, such as:

unauthorized access, identity theft, computer-related fraud, misuse of accounts, online scams, extortion, blackmail, or unlawful publication of private materials.

The theft of the phone is one issue. The later use of the phone to access accounts or commit online fraud is a separate and potentially more serious issue.


F. E-Commerce, Banking, and Consumer Protection Rules

If the stolen phone is used to access e-wallets, online banking, shopping accounts, or lending apps, additional rules may apply depending on the provider and the transaction.

Victims should immediately notify banks and e-wallet providers because many fraud investigations depend on how quickly the account holder reported the compromise.

Delayed reporting may make recovery harder.


IV. Immediate Steps After a Phone Is Stolen

Time is critical. The best approach is to act in layers: secure the SIM, secure the accounts, locate or lock the device, report the incident, and request IMEI blocking.

Step 1: Call the Mobile Network Operator

The first legal and practical step is to contact the telco and report that the SIM card was stolen with the phone.

Ask for:

SIM deactivation or blocking, suspension of outgoing calls and texts, suspension of mobile data, prevention of OTP use, replacement SIM issuance, and preservation of records if needed for investigation.

The telco may require identity verification. If the SIM was registered under the SIM Registration Act, the subscriber may be asked to prove identity through a valid government ID or other verification process.

Why this matters

The stolen SIM can be used to receive OTPs, reset passwords, impersonate the owner, access e-wallets, or communicate with the victim’s contacts.

Blocking the SIM is often more urgent than blocking the device.


Step 2: Use Remote Locking Features

The owner should attempt to remotely lock the device.

For iPhone, use Apple’s Find My service and mark the device as lost.

For Android, use Google’s Find My Device to lock the phone, sign out, locate it, or erase it if necessary.

Remote locking can prevent casual access. Remote wiping can protect data, but it may also reduce the chance of locating the device afterward. The choice depends on the sensitivity of the data and the likelihood of recovery.

Important note

Remote lock or wipe requires that the phone be connected to the internet, logged into the relevant account, and not already reset or disabled by the thief.


Step 3: Change Passwords Immediately

Change passwords for the most important accounts first:

email account connected to the phone, Apple ID or Google account, online banking, e-wallets, social media, work accounts, cloud storage, password manager, and government portals.

The email account is especially important because many other accounts use email for password recovery.

After changing passwords, log out of all sessions where possible.


Step 4: Notify Banks and E-Wallet Providers

If the phone had banking apps, GCash, Maya, or similar services, report the theft immediately.

Ask the provider to:

temporarily freeze the account, block device access, revoke active sessions, disable transactions, investigate unauthorized transfers, and document the report.

Keep screenshots, reference numbers, ticket numbers, and names of representatives.

For financial fraud, time of reporting is often crucial.


Step 5: File a Police Report or Police Blotter

A police report is usually needed for formal blocking requests and insurance claims. It may also support later criminal proceedings.

Go to the police station with jurisdiction over the place where the theft occurred, if known. If the exact place is uncertain, go to the nearest police station and explain the circumstances.

The report should contain:

the owner’s full name, date and time of theft or discovery of loss, location, phone brand and model, color and distinguishing features, IMEI number if available, SIM number or mobile number, account of how the theft happened, estimated value, and any suspect information or CCTV details.

Request a copy of the police report or blotter entry.


Step 6: Prepare Proof of Ownership

For IMEI blocking, the owner should prepare proof that the phone belongs to them.

Useful documents include:

official receipt, sales invoice, phone box showing IMEI, warranty card, carrier purchase contract, installment agreement, screenshots from device settings showing IMEI, photos of the box, Apple or Google account device record, insurance documents, and affidavits if formal proof is incomplete.

The strongest proof is usually an official receipt or box showing the IMEI.


Step 7: Request IMEI Blocking Through the NTC

After securing the SIM and accounts, the owner may request IMEI blocking.

The request typically requires:

a written request for blocking, valid government ID, proof of ownership, IMEI number, police report or affidavit of loss/theft, and contact details of the requesting owner.

The request is usually directed to the NTC. The exact filing method may vary depending on the NTC office, current administrative process, and whether the request is submitted physically or electronically.


V. The IMEI Number: Why It Is Important

The IMEI is central to device blocking.

A. Where to Find the IMEI

The IMEI may be found:

on the phone box, on the official receipt or invoice, on the warranty card, in the telco contract, in the device settings, in the Apple ID device list, in the Google account device list, or by dialing *#06# on the phone before it was stolen.

For dual-SIM phones, there may be two IMEI numbers. Both should be reported.

B. What IMEI Blocking Does

IMEI blocking may prevent the device from connecting to Philippine mobile networks. This can reduce the resale value of the stolen phone and make it harder for the thief or buyer to use it as a phone.

C. What IMEI Blocking Does Not Do

IMEI blocking does not necessarily:

delete your data, recover the phone, identify the thief, block Wi-Fi use, remove access to already-open apps, stop use outside the Philippines, or prevent the phone from being dismantled for parts.

IMEI blocking is useful, but it is not a complete remedy.


VI. Documents Commonly Needed to Block a Stolen Phone

A victim should prepare a file containing the following:

1. Government-Issued ID

Examples include passport, driver’s license, UMID, SSS ID, GSIS ID, PRC ID, PhilID, voter’s ID if accepted, or other government-recognized identification.

2. Police Report or Blotter

This proves that the theft or loss was reported to law enforcement.

3. Affidavit of Loss or Theft

Some offices or companies may ask for a notarized affidavit. It should state the facts of the loss, the phone details, and the owner’s request for blocking.

4. Proof of Ownership

This may include receipt, invoice, phone box, warranty document, contract, or other evidence.

5. IMEI Number

For dual-SIM phones, include both IMEI numbers.

6. Mobile Number and Telco

Identify the SIM number or mobile number inside the stolen phone and the network provider.

7. Contact Information

Provide an active email address and alternate mobile number for updates.


VII. Sample Affidavit of Loss for a Stolen Mobile Phone

Below is a general format. It should be adapted to the facts and notarized if required.

AFFIDAVIT OF LOSS

I, [Full Name], Filipino, of legal age, single/married, and residing at [Address], after being duly sworn, state:

  1. I am the owner of a mobile phone described as follows:

Brand/Model: [Brand and Model] Color: [Color] IMEI No.: [IMEI Number] Second IMEI No., if any: [Second IMEI Number] Mobile Number/SIM: [Mobile Number] Network Provider: [Telco]

  1. On or about [Date], at around [Time], at [Place], the said mobile phone was stolen/lost under the following circumstances: [Brief narration].

  2. Despite diligent efforts to locate or recover the phone, I have been unable to find it.

  3. I am executing this affidavit to attest to the loss/theft of the said mobile phone and to support my request for SIM blocking, IMEI blocking, replacement SIM issuance, account security measures, insurance claim, and other lawful purposes.

IN WITNESS WHEREOF, I have signed this Affidavit on [Date] at [Place].

[Signature] [Name of Affiant]

SUBSCRIBED AND SWORN to before me this [Date] at [Place], affiant exhibiting competent proof of identity.


VIII. Sample Request Letter for IMEI Blocking

[Date]

National Telecommunications Commission [Address of NTC Office]

Subject: Request for IMEI Blocking of Stolen Mobile Phone

Dear Sir/Madam:

I respectfully request the blocking of my stolen mobile phone from accessing mobile network services in the Philippines.

The details of the device are as follows:

Owner: [Full Name] Brand/Model: [Brand and Model] Color: [Color] IMEI No.: [IMEI Number] Second IMEI No., if any: [Second IMEI Number] Mobile Number Used in Device: [Mobile Number] Network Provider: [Telco] Date and Place of Theft/Loss: [Date and Place]

Attached are copies of my valid government ID, police report or affidavit of loss/theft, and proof of ownership.

I respectfully request that the above IMEI number be blocked to prevent unauthorized use of the stolen device.

Thank you.

Respectfully,

[Signature] [Full Name] [Address] [Email Address] [Alternate Contact Number]


IX. Blocking the SIM vs. Blocking the Phone

These are often confused.

A. SIM Blocking

SIM blocking prevents use of the stolen SIM card.

It protects against OTP theft, text scams, calls, mobile data use, and unauthorized use of the number.

It is handled by the telco.

B. IMEI Blocking

IMEI blocking targets the physical phone.

It prevents the phone from connecting to mobile networks, even with another SIM card.

It is commonly handled through the NTC or through a process involving telcos and regulators.

C. Both Should Be Done

Blocking only the SIM leaves the phone usable with another SIM.

Blocking only the IMEI may still leave the stolen SIM exposed if not separately deactivated.

The safest approach is to block or suspend the SIM immediately, then pursue IMEI blocking.


X. Replacement SIM and Mobile Number Recovery

After reporting the stolen SIM, the owner may request a replacement SIM with the same mobile number.

This is important because many services depend on the number for OTPs and identity verification.

The telco may require:

valid ID, proof that the SIM was registered to the requester, affidavit or police report, personal verification, and payment of replacement fees, if any.

Once the replacement SIM is issued, the old SIM should no longer work.


XI. Special Concerns for Registered SIM Owners

Because Philippine SIMs are registered, the registered subscriber should act quickly after theft.

A stolen registered SIM may be misused for:

scam texts, fraudulent calls, account takeovers, harassment, threats, fake transactions, loan app registration, or impersonation.

Reporting the stolen SIM creates a record that the subscriber lost possession and control of the SIM at a particular date and time.

This record can be important if the number is later linked to suspicious activity.


XII. When the Phone Contains Work or Client Data

If the phone contains employer files, client data, legal records, medical records, school records, customer data, or business information, the owner should notify the proper person immediately.

This may include:

employer, supervisor, data protection officer, IT department, client, compliance officer, or business owner.

Under the Data Privacy Act, a security incident involving personal data may require assessment. In serious cases, breach notification obligations may arise.

Employees should not hide the loss of a work phone or a personal phone used for work. Delay can worsen legal and disciplinary consequences.


XIII. When the Stolen Phone Is Used for Fraud

If money is transferred from bank or e-wallet accounts after the theft, act immediately.

A. Report to the Financial Institution

Contact the bank or e-wallet provider and ask for immediate freezing or investigation.

Provide:

date and time of theft, date and time of unauthorized transaction, transaction reference numbers, screenshots, police report, telco report, and identity documents.

B. Preserve Evidence

Do not delete messages, emails, app notifications, transaction history, call logs, or screenshots.

C. File a Police or Cybercrime Complaint

If the stolen phone is used for online fraud, identity theft, or unauthorized account access, the matter may involve cybercrime in addition to theft.

The victim may report to law enforcement cybercrime units or other appropriate authorities.


XIV. Can the Police Track a Stolen Phone?

The police may investigate theft, review CCTV, interview witnesses, conduct follow-up operations, or coordinate with proper agencies.

However, ordinary citizens should not expect immediate real-time tracking simply because they filed a report. Access to telecommunications data is subject to legal and procedural restrictions.

Private individuals should not take the law into their own hands by confronting suspected thieves based only on location tracking. Phone location data may be inaccurate, and confrontation can be dangerous.


XV. Can the Victim Retrieve the Phone Personally?

A victim should be cautious.

If a tracking app shows the phone’s location, the safer approach is to inform the police rather than personally confronting the suspected possessor.

If the phone appears in an online marketplace, repair shop, or secondhand store, preserve screenshots, seller details, listing links, chat records, and transaction information. Report these to the police.

Buying back the phone without documentation may complicate the case and encourage fencing.


XVI. Liability of Buyers of Stolen Phones

A person who buys a stolen phone may face legal risk, especially if circumstances indicate that the buyer knew or should have suspected that the item was stolen.

Red flags include:

very low price, no receipt, seller refuses ID, erased phone, missing box, locked device, suspicious meeting place, inconsistent explanation of ownership, or sale of multiple phones without business registration.

Under the Anti-Fencing Law, possession of stolen property can create serious legal consequences. Good faith may be a defense in some situations, but buyers of secondhand phones should require proof of ownership.


XVII. Selling or Buying Secondhand Phones: Preventive Legal Advice

To avoid legal problems, buyers should ask for:

original receipt, box with matching IMEI, valid ID of seller, written deed of sale, screenshot showing device is not locked to someone else’s account, and confirmation that the phone is not reported stolen.

For iPhones, Activation Lock should be removed by the owner before sale.

For Android phones, Factory Reset Protection should be properly removed by the owner before sale.

A phone that remains locked to another person’s Apple ID or Google account is a major warning sign.


XVIII. Insurance Claims for Stolen Phones

Some phones are covered by insurance, credit card purchase protection, telco device protection, employer property policies, or gadget protection plans.

The insurer may require:

police report, affidavit of loss, proof of ownership, proof of purchase, IMEI number, telco report, and NTC blocking confirmation.

Insurance claims are usually time-sensitive. Late reporting may result in denial.


XIX. Common Mistakes After a Phone Is Stolen

1. Waiting Too Long to Block the SIM

This exposes OTPs, banking apps, and social accounts.

2. Focusing Only on the Phone and Ignoring Accounts

The device may be worth less than the data inside it.

3. Not Knowing the IMEI

Owners should record their IMEI before theft occurs.

4. Failing to File a Police Report

Without a police report, IMEI blocking, insurance claims, or fraud disputes may be harder.

5. Using the Same Password Everywhere

A stolen phone can compromise multiple accounts if passwords are reused.

6. Not Informing Banks and E-Wallets

Financial institutions need prompt notice to restrict access and investigate.

7. Confronting Suspects Personally

This can be dangerous and legally risky.


XX. Preventive Measures Before a Phone Is Stolen

The best protection begins before theft occurs.

A. Record the IMEI

Save the IMEI in a secure place, not only on the phone.

B. Use Strong Screen Lock

Use a strong PIN or password. Avoid simple patterns or birthdays.

C. Enable Biometrics Carefully

Fingerprint and face unlock are convenient, but a strong fallback password remains important.

D. Enable Find My Device or Find My iPhone

These services help locate, lock, or erase the device.

E. Turn On SIM PIN

A SIM PIN can prevent the SIM from being used in another device without the PIN.

F. Use App-Level Security

Enable separate PINs or biometrics for banking and e-wallet apps.

G. Avoid Saving Passwords Insecurely

Do not keep passwords in plain notes, screenshots, or chat messages.

H. Enable Two-Factor Authentication

Use authenticator apps or security keys where possible. SMS OTP is convenient but vulnerable if the SIM is stolen.

I. Keep Purchase Documents

Keep receipts, boxes, warranty cards, and contracts.

J. Back Up Data

Regular backups reduce the harm caused by remote wiping or permanent loss.


XXI. Legal Remedies Available to the Victim

A victim may pursue several remedies depending on the facts.

A. Criminal Complaint for Theft or Robbery

If the offender is known or can be identified, the victim may file a criminal complaint.

B. Complaint for Fencing

If the phone is found in the possession of a buyer, reseller, or shop, a fencing complaint may be considered if facts support it.

C. Cybercrime Complaint

If the phone is used to access accounts, commit fraud, impersonate the owner, or publish private material, cybercrime laws may apply.

D. Civil Recovery

The owner may seek return of the phone or damages, depending on the circumstances and available legal action.

E. Insurance Claim

If covered, the victim may claim compensation under an insurance or protection plan.


XXII. Practical Checklist

Immediately after the phone is stolen:

  1. Call the telco and block or suspend the SIM.
  2. Use Find My iPhone or Find My Device to lock the phone.
  3. Change email, Apple ID, Google, banking, and e-wallet passwords.
  4. Log out of all active sessions where possible.
  5. Notify banks and e-wallet providers.
  6. File a police report or blotter.
  7. Gather proof of ownership and IMEI details.
  8. Request IMEI blocking through the NTC.
  9. Monitor accounts for unauthorized activity.
  10. Preserve all evidence.

XXIII. Frequently Asked Questions

1. Can I block my stolen phone without the IMEI?

IMEI blocking usually requires the IMEI. Without it, blocking the physical device becomes difficult. However, the SIM can still be blocked through the telco, and accounts can still be secured.

2. Can the telco block the phone itself?

The telco can usually block or replace the SIM. Device blocking by IMEI may require coordination with or action through the NTC or relevant regulatory process.

3. Is a police report required?

For SIM replacement, requirements may vary by telco. For IMEI blocking, insurance, or formal legal action, a police report or affidavit is commonly required.

4. Will IMEI blocking erase my data?

No. IMEI blocking prevents network use but does not erase the phone’s contents.

5. Can the stolen phone still be used on Wi-Fi?

Yes. IMEI blocking generally affects mobile network access, not necessarily Wi-Fi access.

6. Can the thief bypass IMEI blocking?

Illegal tampering may be attempted, but altering identifiers or dealing in stolen devices may expose offenders to further legal consequences. Even when blocking is not perfect, it reduces the phone’s usefulness and resale value.

7. Can I still track the phone after it is blocked?

Possibly, depending on whether the phone is online, location services are active, and the account remains connected. Blocking the SIM or IMEI may affect network connectivity, but Wi-Fi-based location may still work in some cases.

8. Should I erase the phone remotely?

Erase it if the data risk is greater than the chance of recovery. If the phone contains sensitive banking, work, client, or private data, remote wiping may be advisable.

9. What if my phone is recovered after IMEI blocking?

The owner may need to request unblocking and prove ownership. Keep all documents and blocking confirmations.

10. What if the phone was borrowed, not stolen?

Do not file a false police report or false affidavit. If the issue is a dispute over ownership or possession, the proper remedy may differ. False statements in official documents can create criminal liability.


XXIV. The Role of Evidence

Evidence is essential in stolen phone cases.

Useful evidence includes:

CCTV footage, witness names, police report, tracking screenshots, marketplace listings, chat messages with seller, receipts, IMEI records, telco reference numbers, e-wallet transaction records, bank alerts, and account login notices.

Preserve evidence in original form where possible. Screenshots help, but original messages, URLs, transaction IDs, and official reports are better.


XXV. Data Privacy and Identity Theft Risks

A stolen phone may lead to identity theft even if the phone itself is never recovered.

The thief may attempt to access:

email, cloud photos, saved IDs, digital wallets, bank apps, messaging apps, social media, government accounts, loan apps, and contacts.

Victims should warn close contacts not to respond to suspicious messages from the stolen number or accounts.

A simple public post or direct message to trusted contacts may prevent scams, but avoid disclosing unnecessary personal details.


XXVI. Special Note on E-Wallets and OTPs

Many Philippine digital transactions rely on OTPs sent by SMS. This creates a serious risk when a SIM is stolen together with the phone.

The thief may attempt:

password resets, wallet transfers, bank transfers, online purchases, loan applications, account recovery, or SIM-linked identity fraud.

This is why SIM blocking should be done immediately, even before filing a full police report.


XXVII. Special Note on Minors and Students

If the stolen phone belongs to a minor, the parent or guardian should assist in reporting.

Schools may also need to be informed if school accounts, class chats, learning platforms, or student records are accessible through the phone.

A parent or guardian may be required for affidavits, telco verification, or police reporting.


XXVIII. Special Note on Company-Issued Phones

For company-issued phones, the employee should notify the employer immediately.

The company may need to:

lock the device through mobile device management, revoke work email access, reset credentials, report a data incident, block corporate apps, notify clients if necessary, and file an insurance or asset report.

Failure to report promptly may expose the employee to disciplinary action, especially if company or client data is compromised.


XXIX. Legal Risks in Making False Reports

A person should not falsely claim that a phone was stolen to avoid debt, insurance obligations, installment payments, or disputes with another person.

False affidavits, false police reports, and fraudulent insurance claims can create criminal and civil liability.

IMEI blocking should only be requested by the lawful owner or authorized representative.


XXX. Conclusion

Blocking a stolen mobile phone in the Philippines requires more than one action. The victim should immediately block or suspend the SIM through the telco, secure online and financial accounts, file a police report, gather proof of ownership, and request IMEI blocking through the proper telecommunications regulatory process.

The legal issues may involve theft, robbery, fencing, cybercrime, data privacy, banking fraud, and consumer protection. Because phones now function as identity devices, the most urgent concern is often not the physical unit but the accounts, money, and personal data connected to it.

The safest approach is prompt documentation, immediate SIM and account protection, formal police reporting, and IMEI blocking supported by proof of ownership.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.