How to Report a Stolen Mobile Phone in the Philippines

I. Introduction

A stolen mobile phone is not merely a lost gadget. In the Philippines, a stolen phone may involve several legal, financial, privacy, and cybersecurity concerns. A mobile phone often contains personal information, banking applications, e-wallets, private photos, identification documents, work files, social media accounts, and access to one-time passwords. Because of this, a victim should treat phone theft as both a property crime and a data-security incident.

Reporting a stolen mobile phone properly is important for four main reasons: first, to create an official record of the theft; second, to support insurance, employer, bank, or telco-related claims; third, to help law enforcement investigate the offender; and fourth, to reduce the risk that the stolen device, SIM card, or personal data will be misused.

This article explains how a stolen mobile phone may be reported in the Philippine setting, what documents are usually needed, which offices may be approached, what legal remedies may be available, and what practical steps should be taken immediately after the incident.


II. Legal Nature of Mobile Phone Theft

A. Theft under Philippine criminal law

A stolen mobile phone is generally treated as a form of theft under Philippine criminal law. Theft occurs when a person takes personal property belonging to another, with intent to gain, without the owner’s consent, and without violence or intimidation against persons or force upon things.

A mobile phone is personal property. If someone secretly takes it from a table, pocket, bag, car, office desk, classroom, restaurant, public utility vehicle, mall, or other location, the act may constitute theft.

B. Robbery versus theft

The proper classification may change depending on how the phone was taken.

It may be theft if the phone was taken without the owner’s knowledge and without force or violence, such as pickpocketing, snatching from an unattended table, or taking a phone left inside a bag.

It may be robbery if violence, intimidation, or force was used. For example, if the offender threatened the victim with a knife, punched the victim, forcibly grabbed the phone, or broke into a locked vehicle or room to obtain it, the case may be treated as robbery rather than ordinary theft.

This distinction matters because the legal consequences, evidence required, and police classification may differ.

C. Other possible offenses

Depending on what happens after the phone is stolen, other offenses may also arise. These may include:

Estafa or fraud, if the offender uses the phone to deceive others into sending money.

Identity theft or computer-related offenses, if the offender accesses accounts, messages, photos, banking apps, or online platforms without authority.

Unauthorized access, if the offender opens or uses digital accounts stored in the device.

Use of stolen SIM or mobile credentials, if the SIM card is used for scams, unauthorized transactions, or account takeovers.

Fencing, if another person knowingly buys, sells, possesses, or deals in the stolen phone.


III. Immediate Steps After Discovering the Theft

The first few hours after the theft are critical. A victim should act quickly to protect both the device and the information inside it.

A. Call or message the phone

If safe and reasonable, call the phone immediately. Sometimes the device may have been misplaced rather than stolen. However, the victim should not personally confront a suspected thief without police assistance.

B. Use device-location services

The owner may use available device-tracking services, such as “Find My iPhone” for Apple devices or “Find My Device” for Android devices. These may allow the owner to locate, ring, lock, or erase the device.

However, a victim should avoid going alone to a location where the stolen phone appears to be located. Device-location data can be inaccurate, and personal confrontation may be dangerous. The safer approach is to give the information to police investigators.

C. Lock or erase the phone remotely

If the phone contains sensitive information, the owner should immediately activate remote lock. If recovery appears unlikely or if the information is highly sensitive, remote erase may be considered. This may help protect photos, messages, banking details, work data, and personal documents.

D. Block online accounts and change passwords

The victim should change passwords for email, social media, online banking, e-wallets, cloud storage, shopping apps, messaging apps, and work accounts. Email accounts are especially important because they are often used to reset other passwords.

Two-factor authentication should also be reviewed. If authentication codes are sent to the stolen SIM card, the victim should immediately coordinate with the mobile network provider.

E. Report to banks and e-wallet providers

If the phone contains banking apps or e-wallets, the victim should notify the bank or e-wallet provider right away. The victim may request account restriction, device unlinking, temporary suspension, or additional security measures.

This is especially important when the stolen phone has saved passwords, biometric access, unlocked banking apps, or a SIM card capable of receiving OTPs.

F. Contact the mobile network provider

The victim should contact the telecommunications provider to report the stolen SIM and request temporary deactivation or SIM replacement. This prevents the thief from receiving calls, messages, and OTPs through the stolen SIM.

The victim should also ask about device blocking or IMEI-related procedures, if available.


IV. Information to Gather Before Filing a Report

Before going to the police station, the victim should prepare as much information as possible. A complete report helps police, telcos, insurers, employers, and prosecutors.

Important information includes:

Owner’s full name, address, contact number, and valid ID details.

Date, time, and place of the theft.

Brand and model of the mobile phone.

Color and physical description of the phone.

IMEI number.

Serial number, if available.

Mobile number/SIM number inside the phone.

Network provider.

Proof of ownership, such as receipt, warranty card, box, service record, installment contract, or screenshots from account settings showing the device.

Estimated value of the phone.

Description of how the theft happened.

Names and contact details of witnesses.

CCTV availability, including the establishment, building, barangay, subdivision, transport terminal, or vehicle where footage may exist.

Device-location screenshots, if tracking services show a location.

Any suspicious messages, calls, or transactions after the theft.

The IMEI number is particularly important. It is the unique identifier of the device and may be found on the original box, purchase receipt, warranty card, telco contract, Apple ID or Google account device list, or previous screenshots of phone settings.


V. Where to Report a Stolen Mobile Phone

A. Philippine National Police station

The usual first step is to report the incident to the nearest Philippine National Police station, preferably the station with jurisdiction over the place where the theft happened. The victim may request that the incident be recorded in the police blotter and may ask for a police report or certification.

For example, if the phone was stolen in Quezon City, the report should ideally be made at the police station covering that area. If the victim only discovers the theft elsewhere, the nearest police station may still receive the report or refer the victim to the proper station.

B. Barangay

In some situations, a victim may also report the incident to the barangay, especially if the theft happened in a residential area, subdivision, local market, school zone, or barangay-managed facility. A barangay blotter may be useful, but for criminal investigation and formal law enforcement action, a police report is generally more important.

C. Cybercrime unit or anti-cybercrime authorities

If the stolen phone was used to access online accounts, commit fraud, send scam messages, make unauthorized transfers, or impersonate the owner, the matter may involve cybercrime. In that case, the victim may report to appropriate cybercrime authorities or a police cybercrime unit.

This is especially relevant when the theft is followed by:

unauthorized GCash, Maya, bank, or credit-card transactions;

Facebook, Messenger, Instagram, TikTok, Gmail, or other account takeover;

messages sent to contacts asking for money;

use of private photos for blackmail;

unauthorized access to work accounts;

SIM-related scams;

or identity theft.

D. Telecommunications provider

The mobile network provider should be notified separately. The police report helps support requests for SIM replacement, account security action, or device blocking where applicable.

E. Insurance provider, employer, or school

If the device is company-issued, school-issued, insured, or covered by a plan, the victim should also report the incident to the relevant office. A police report is commonly required for claims or internal documentation.


VI. How to File a Police Report

A. Go to the police station

The victim should proceed to the police station with jurisdiction over the location of the theft. Bring valid identification and available proof of ownership.

B. Request blotter entry

The victim may ask that the incident be recorded in the police blotter. The blotter is the official station record of reported incidents. It does not by itself prove guilt, but it creates an official record that the report was made.

C. Give a clear statement

The victim should narrate what happened clearly and chronologically. The statement should include:

when the phone was last seen;

where the owner was located;

how the theft was discovered;

who may have had access to the phone;

whether anyone saw the taking;

whether CCTV may have captured the incident;

whether the phone has since been located through tracking;

whether the SIM or accounts were misused;

and what steps have already been taken.

The statement should avoid exaggeration or speculation. If the victim only suspects a person, that should be stated as suspicion unless there is direct evidence.

D. Submit supporting documents

The victim should provide copies of receipts, IMEI details, device screenshots, tracking-location screenshots, bank/e-wallet incident reports, screenshots of suspicious messages, and other relevant documents.

E. Ask for a police report or certification

The victim may request a copy of the police report, blotter certification, or incident report. This document is often needed for telco requests, insurance claims, employer records, school records, or further complaints.

F. Follow up with investigators

If the case has leads, such as CCTV footage, witness names, tracking-location data, or marketplace listings of the suspected phone, the victim should coordinate with the assigned investigator. The victim should keep copies of all documents submitted.


VII. Sample Police Report Details

A useful report should contain the following:

Complainant: Full name, age, address, contact details, and identification.

Incident: Theft or robbery of mobile phone.

Date and time: Exact or approximate date and time of loss.

Place: Specific location, including establishment name, address, vehicle route, room, floor, or landmark.

Property stolen: Phone brand, model, color, storage capacity, serial number, IMEI number, SIM number, phone number, case description, and accessories.

Value: Purchase price or estimated current value.

Narrative: Clear account of how the phone was taken or discovered missing.

Suspect: Name, description, or unknown person, depending on the facts.

Witnesses: Names and contact details, if any.

Evidence: CCTV, screenshots, receipts, box, IMEI, account records, tracking data, messages, bank/e-wallet notices.

Action requested: Investigation, recovery of property, assistance with telco blocking, filing of appropriate complaint.


VIII. Sample Affidavit of Loss or Complaint-Affidavit

An affidavit may be required by a telco, insurer, employer, school, or investigating office. In some cases, a simple affidavit of loss is enough for administrative purposes. For a criminal case, a complaint-affidavit may be required.

A. Sample Affidavit of Loss

AFFIDAVIT OF LOSS

I, [NAME], of legal age, Filipino, and residing at [ADDRESS], after having been duly sworn in accordance with law, state:

  1. That I am the lawful owner of a mobile phone described as follows:

Brand/Model: [BRAND AND MODEL] Color: [COLOR] IMEI No.: [IMEI NUMBER] Serial No.: [SERIAL NUMBER, IF ANY] Mobile Number/SIM: [MOBILE NUMBER] Estimated Value: [AMOUNT]

  1. That on or about [DATE], at around [TIME], while I was at [PLACE], I discovered that the said mobile phone was missing/stolen.

  2. That despite diligent search and efforts to locate the same, I could no longer find or recover the said mobile phone.

  3. That I am executing this affidavit to attest to the truth of the foregoing facts and for whatever lawful purpose it may serve, including reporting the incident to the proper authorities, my telecommunications provider, bank, employer, insurer, or other concerned offices.

IN WITNESS WHEREOF, I have signed this affidavit this ___ day of __________ 20__ at __________, Philippines.

[Signature] [Name of Affiant]

SUBSCRIBED AND SWORN to before me this ___ day of __________ 20__ at __________, Philippines, affiant exhibiting competent evidence of identity: [ID DETAILS].

Notary Public

B. Sample Complaint-Affidavit

COMPLAINT-AFFIDAVIT

I, [NAME], of legal age, Filipino, and residing at [ADDRESS], after being duly sworn, state:

  1. I am the owner of a mobile phone described as follows:

Brand/Model: [BRAND AND MODEL] Color: [COLOR] IMEI No.: [IMEI NUMBER] Serial No.: [SERIAL NUMBER, IF ANY] Mobile Number/SIM: [MOBILE NUMBER] Estimated Value: [AMOUNT]

  1. On [DATE], at around [TIME], I was at [PLACE].

  2. At that time and place, my mobile phone was [describe circumstances: inside my bag/on the table/in my pocket/being used/placed on the counter].

  3. I later discovered that the said phone was missing. Upon checking, I believe that it was unlawfully taken without my consent.

  4. [State facts about suspect, if known. Example: I saw a person described as ______ standing near my bag shortly before the phone disappeared. CCTV footage from ______ may have captured the incident.]

  5. I did not give anyone permission to take, possess, sell, use, or dispose of my mobile phone.

  6. I am executing this complaint-affidavit to charge the person or persons responsible with the appropriate offense and to request investigation and prosecution.

IN WITNESS WHEREOF, I have signed this complaint-affidavit this ___ day of __________ 20__ at __________, Philippines.

[Signature] [Name of Complainant]

SUBSCRIBED AND SWORN to before me this ___ day of __________ 20__ at __________, Philippines, affiant exhibiting competent evidence of identity: [ID DETAILS].

Notary Public / Administering Officer


IX. Importance of the IMEI Number

The International Mobile Equipment Identity or IMEI is one of the most important pieces of information in a stolen phone report. It identifies the physical device, not merely the SIM card or phone number.

A phone may have one or more IMEI numbers, especially if it supports dual SIM or eSIM. The owner should provide all available IMEI numbers.

The IMEI may help in:

identifying the recovered phone;

proving ownership;

supporting telco blocking requests;

distinguishing the device from similar models;

and preventing resale or misuse.

A phone number alone is not enough because a SIM card may be removed and transferred. The IMEI identifies the handset itself.


X. Reporting to the Telecommunications Provider

After filing a police report, the victim should contact the network provider. The victim may request several actions.

A. SIM deactivation

The provider may temporarily deactivate the stolen SIM to prevent the thief from using the victim’s number, receiving OTPs, making calls, sending messages, or impersonating the victim.

B. SIM replacement

The victim may request a replacement SIM with the same number, subject to the provider’s requirements. The provider will commonly require valid identification and may request a police report or affidavit of loss.

C. IMEI blocking or device-related action

The victim may ask the telco whether the stolen device can be blocked or blacklisted using the IMEI. Requirements may vary, but the owner should be ready to provide proof of ownership, IMEI number, police report, and valid ID.

D. Account security

Postpaid subscribers should request review of any unauthorized charges. Prepaid users should check whether the stolen SIM was used after the theft.


XI. Reporting to Banks, E-Wallets, and Financial Platforms

Because many Filipinos use mobile phones for banking and e-wallet transactions, reporting to financial institutions is urgent.

The victim should immediately contact:

banks with mobile apps installed on the phone;

e-wallet providers such as GCash or Maya;

credit-card issuers;

online lending apps;

investment or crypto apps;

shopping apps with saved cards;

and remittance platforms.

The victim should request:

temporary account restriction;

device unlinking;

password reset;

revocation of active sessions;

cancellation or freezing of cards, if necessary;

investigation of unauthorized transactions;

and written confirmation of the report.

The victim should keep reference numbers, screenshots, and email confirmations. These may later support a complaint, chargeback request, cybercrime report, or civil claim.


XII. Cybersecurity and Data Privacy Concerns

A stolen phone may expose the owner to serious privacy risks. The thief may access photos, IDs, passwords, contacts, emails, messages, cloud accounts, banking apps, work platforms, and personal documents.

The victim should take these steps:

change email passwords first;

log out of all devices where possible;

revoke active sessions from social media and messaging apps;

reset passwords for banking and e-wallet accounts;

disable or update two-factor authentication tied to the stolen SIM;

notify contacts not to respond to suspicious messages;

monitor bank and e-wallet transactions;

check whether private files were accessed;

and report unauthorized account activity immediately.

If sensitive personal information was compromised, the victim may need to notify affected institutions, employer, clients, or other persons depending on the circumstances.


XIII. When the Stolen Phone Is Used for Scams

A common problem in the Philippines is that a stolen phone or SIM may be used to send messages asking the victim’s contacts for money. The message may claim there is an emergency, hospital bill, business problem, or urgent transfer request.

The victim should immediately warn family, friends, co-workers, and contacts through alternative channels. The warning should state that the phone was stolen and that messages or calls from the number should be ignored until further notice.

If money was sent to the offender, the victim and affected contact should preserve evidence, including:

screenshots of the conversation;

recipient account details;

transaction reference numbers;

phone numbers used;

names shown in e-wallet or bank apps;

dates and times;

and any voice recordings or call logs.

This may become a separate fraud, cybercrime, or estafa-related complaint.


XIV. CCTV, Witnesses, and Evidence Preservation

Evidence can disappear quickly. CCTV recordings may be overwritten within days. The victim should act promptly.

A. Request preservation of CCTV

The victim may ask the establishment, building administrator, barangay, school, mall, transport operator, or office to preserve relevant CCTV footage. Some establishments may not release footage directly to private individuals but may provide it to police upon request.

The victim should note:

exact location of the camera;

date and time range;

description of the suspect;

direction of movement;

and names of security personnel spoken to.

B. Identify witnesses

Witnesses may include companions, guards, waiters, drivers, sales staff, classmates, co-workers, bystanders, or passengers. Their names and contact details should be given to the police.

C. Preserve digital evidence

The victim should not delete suspicious messages, transaction notices, emails, or call logs. Screenshots should show the date, time, sender, phone number, account name, and transaction reference where applicable.


XV. What to Do If the Phone Appears Online for Sale

A stolen phone may appear on online marketplaces or social media selling groups. If the victim sees a listing that appears to match the stolen phone, the victim should not personally arrange a confrontation or entrapment.

The safer steps are:

take screenshots of the listing;

record the seller’s name, account link, phone number, price, photos, and description;

compare visible details with the stolen phone;

preserve chat messages, if any;

inform the assigned police investigator;

and ask police whether an operation, verification, or recovery action may be conducted.

Buying back the phone may complicate matters and may not guarantee recovery or prosecution. It may also expose the victim to danger.


XVI. Recovery of the Phone

If the police recover the phone, the owner may be asked to prove ownership. This is why receipts, box, IMEI, serial number, photos, account records, and police documents are important.

The owner should avoid altering or wiping the recovered phone until law enforcement has completed any necessary examination, especially if the phone may contain evidence of unauthorized use.

If the phone was used to commit additional offenses, investigators may need screenshots, logs, or forensic examination.


XVII. Filing a Criminal Complaint

A police report does not always mean that a criminal case is automatically filed in court. Depending on the facts, the complainant may need to execute a complaint-affidavit and submit evidence for preliminary investigation or inquest proceedings, as applicable.

A. If the suspect is unknown

If the offender is unknown, the police may continue investigation. The case may remain under investigation until a suspect is identified.

B. If the suspect is known

If the victim can identify the suspect, the victim may submit a complaint-affidavit, witnesses’ affidavits, CCTV evidence, proof of ownership, and other documents. The complaint may proceed through the prosecutor’s office depending on the offense and circumstances.

C. If the suspect is caught immediately

If the suspect is caught shortly after the incident, police may conduct procedures appropriate to warrantless arrest situations, subject to legal requirements. The matter may proceed more quickly through inquest.


XVIII. Civil Liability and Restitution

In criminal cases involving stolen property, the offender may be held liable not only criminally but also civilly. Civil liability may include return of the stolen phone, payment of its value if it cannot be returned, and damages where legally proper.

If the phone is damaged, erased, sold, or unrecovered, the victim may claim its value. Proof of value may include official receipt, installment documents, market value, screenshots of the model’s price, or other supporting records.


XIX. Insurance, Employer, and School Requirements

A police report is commonly required for insurance claims, company reimbursement, replacement of issued devices, school records, or administrative processing.

The victim should prepare:

police report or blotter certification;

affidavit of loss;

proof of ownership;

valid ID;

IMEI number;

incident narrative;

and any employer, school, or insurer forms.

For company-issued phones, the employee should report immediately to the employer’s IT, HR, security, or legal department. The employer may need to remotely wipe work data, revoke access credentials, and document the loss.


XX. Special Situations

A. Phone stolen in a public utility vehicle

If the phone was stolen in a jeepney, bus, taxi, UV Express, tricycle, train, or ride-hailing vehicle, the victim should record the route, plate number, body number, driver details, booking reference, time, and location. Ride-hailing apps may provide trip details useful to investigators.

B. Phone stolen in a mall, restaurant, or commercial establishment

The victim should notify security immediately and ask that CCTV footage be preserved. The police report should identify the establishment, floor, branch, table number, counter, or area.

C. Phone stolen at school

The victim should report to school security, student affairs, or administration, in addition to the police if criminal action is desired. Schools may have CCTV, entry logs, classroom records, or disciplinary mechanisms.

D. Phone stolen at work

The victim should notify workplace security, HR, IT, and management. If the phone contains company information, immediate IT action is important.

E. Phone stolen from a vehicle

If the phone was taken from a locked vehicle after a window was broken or the vehicle was forcibly opened, the matter may involve robbery or theft with aggravating circumstances depending on the facts. The victim should photograph the damage before repairs.

F. Phone lost versus stolen

If the owner simply misplaced the phone and there is no evidence of unlawful taking, an affidavit of loss may be more appropriate than a theft complaint. However, if the phone was taken by another person without permission, it should be reported as theft or robbery depending on the circumstances.


XXI. Common Mistakes to Avoid

Victims often make mistakes that weaken recovery efforts or increase risk.

Common mistakes include:

waiting too long before reporting;

not preserving the IMEI number;

not deactivating the SIM;

not changing passwords;

personally confronting a suspected thief;

failing to preserve CCTV quickly;

deleting suspicious messages;

not warning contacts;

using vague statements in the police report;

failing to get a copy of the report;

and assuming that phone tracking alone is enough to recover the device.

Another common mistake is treating the matter only as a lost phone. If the facts suggest unlawful taking, the report should clearly state that the phone was stolen and describe the circumstances.


XXII. Practical Checklist

Immediately after the theft

Lock the phone remotely.

Track the phone if possible.

Deactivate or replace the SIM.

Change email and banking passwords.

Log out of social media and messaging accounts.

Notify banks and e-wallet providers.

Warn contacts about possible scam messages.

Preserve screenshots and evidence.

Before going to the police

Prepare valid ID.

Get IMEI and serial number.

Bring receipt, box, or proof of ownership.

Write down date, time, and place.

List witnesses.

Identify possible CCTV sources.

Prepare tracking-location screenshots.

Gather suspicious messages or transaction records.

At the police station

Request blotter entry.

Give a clear statement.

Submit supporting documents.

Ask for a police report or blotter certification.

Get investigator contact details.

Follow up on CCTV or leads.

After reporting

Submit police report to telco.

Request SIM replacement or deactivation.

Ask about IMEI blocking.

Submit documents to insurer, employer, or school.

Monitor accounts.

Report unauthorized transactions.

Coordinate with police if the phone is located or listed online.


XXIII. Frequently Asked Questions

1. Is a police report required for a stolen phone?

It is not always required for every private action, but it is highly advisable. A police report creates an official record and is often required by telcos, insurers, employers, schools, or banks.

2. Can the police track my phone?

Police may use lawful investigative methods, but ordinary victims should not assume that police can instantly track a phone. Device tracking through the owner’s Apple, Google, or other account may provide useful information, but it should be handled carefully and shared with investigators.

3. Can I go to the location shown by Find My Device or Find My iPhone?

It is unsafe to go alone. Tracking data may be inaccurate, and the person at the location may be dangerous or uninvolved. The safer course is to coordinate with police.

4. What if I do not know the IMEI?

The victim should check the phone box, purchase receipt, warranty card, telco contract, Apple ID, Google account, or old screenshots. If the IMEI cannot be found, the report can still be made, but recovery and identification may be harder.

5. What if the phone was stolen together with my wallet or IDs?

The victim should report all stolen items in the police report. The victim should also notify banks, replace IDs, monitor accounts, and guard against identity theft.

6. What if my SIM was used to scam people?

The victim should report the stolen SIM to the telco and police immediately, preserve evidence, and warn contacts. If money was transferred, the recipient bank or e-wallet account details should be documented.

7. What if the thief used my GCash, Maya, or banking app?

The victim should report immediately to the provider, request account restriction, preserve transaction records, and include the unauthorized transactions in the police or cybercrime report.

8. What if the phone is company-owned?

The employee should notify the employer immediately. The employer may need to wipe the device, revoke access, reset credentials, and file internal or police documentation.

9. Can I file a case even if the phone is cheap or old?

Yes. The value of the phone may affect legal consequences, but unlawful taking of property can still be reported.

10. Can I report a stolen phone online?

Some agencies or offices may have online reporting or hotlines depending on location and circumstances, especially for cyber-related complaints. However, for a formal police blotter, affidavit, or criminal complaint, personal appearance at the proper station or office is commonly required.


XXIV. Legal Significance of Proper Reporting

A properly documented report helps establish that the owner acted promptly and consistently. It also helps show the identity and value of the property, the circumstances of the unlawful taking, and the owner’s lack of consent.

For legal purposes, the strongest stolen-phone report usually includes:

a clear narrative;

proof of ownership;

IMEI or serial number;

witnesses;

CCTV leads;

device tracking screenshots;

telco report;

bank or e-wallet incident reports;

and prompt police documentation.

The absence of some documents does not prevent reporting, but the more complete the evidence, the better the chance of recovery, investigation, or successful claim.


XXV. Conclusion

Reporting a stolen mobile phone in the Philippines should be done promptly and carefully. The victim should treat the incident as both a criminal matter and a digital-security emergency. The immediate priorities are to secure accounts, deactivate the SIM, notify financial institutions, preserve evidence, and report to the police.

A complete report should include the phone’s IMEI, proof of ownership, the circumstances of the theft, possible witnesses, CCTV sources, and any signs of unauthorized account use. If the stolen phone or SIM is later used for scams, fraud, account takeover, or unauthorized transactions, the matter may expand beyond theft and involve cybercrime, identity misuse, or financial fraud.

Proper documentation protects the victim, assists law enforcement, supports telco and insurance requests, and reduces the risk of further harm from misuse of the stolen device.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.