Here’s a Philippines-focused, everything-you-need playbook for what to do—legally and practically—after your smartphone is stolen. It covers immediate account protection, police/NBI reporting, telco/NTC actions (IMEI/SIM), e-wallet & bank steps, evidence preservation, and what to expect if you pursue a case.
First 10 minutes: stop the financial/data bleed
Use a friend’s phone or a computer to:
Trigger your platform’s device-locator and remote lock/wipe:
- iPhone: Find My → Mark as Lost → Erase iPhone.
- Android: Find My Device → Secure device → Erase device.
Sign out of all sessions (Google/Apple/Microsoft/Facebook/Instagram/TikTok, etc.).
Change passwords on email and messaging apps first (Gmail/Outlook/Apple ID, WhatsApp/Telegram/Viber/Signal), then on banking, e-wallets, shopping sites, ride-hailing, delivery apps.
Kill SIM access immediately (to block OTP/SMS hijack):
- Call your telco (Globe/Smart/DITO) to suspend the SIM/eSIM. Ask for the Affidavit of Loss requirements for replacement and SIM blocking under the SIM Registration Law.
- If dual-SIM, suspend both lines if the device is still logged-in to your accounts.
Freeze money apps:
- Log into GCash/Maya/GrabPay/CoinsPH and banks via web; change PINs, set biometric lock, and temporarily disable the wallet/card if the app allows.
- If you can’t access, call the issuer and request account freeze or card hotlisting.
First 1–24 hours: formal reporting & preservation
Police blotter immediately (nearest police station):
- Ask to record Theft (no violence) or Robbery/Snatching/Pickpocketing (if force/intimidation/violence).
- Bring/submit: government ID, phone model + color, IMEI (from box/receipt or your Apple/Google account), mobile numbers, last known time/place.
- Get a blotter/station diary number—you’ll need it for telco, NTC, bank, and insurance.
NBI Cybercrime or PNP Anti-Cybercrime report (optional but helpful if accounts were accessed):
- Share evidence of unauthorized logins/transactions. This enables data preservation requests to platforms and issuers.
Telco follow-through:
- Request SIM replacement (same number) with a SIM swap block until you appear with ID + Affidavit of Loss.
- Ask how to place your device IMEI on the blacklist (telcos can block reported stolen IMEIs from registering on their networks). Keep the ticket/reference.
NTC angle (IMEI blocking & complaints):
- You (or your telco at your request) may seek IMEI barring and file a consumer complaint if needed. Prepare: police blotter, proof of ownership (receipt/box), IMEI.
- Result: the device becomes unusable on PH networks once blacklisted (helps deter resale).
Bank & e-wallet disputes (within issuer deadlines):
- File fraud/chargeback or dispute; submit: police blotter, device loss timeline, screenshots of unauthorized debits, and any SMS/email alerts.
- Request issuer to file STR (Suspicious Transaction Report) with AMLC and to freeze counterpart accounts where possible.
Evidence vault (don’t skip):
- Write a timeline (where/when/how; who saw it).
- Screenshot account security pages showing new logins/device removals, and transaction lists post-theft.
- Keep the box, IMEI sticker, purchase invoice, and any CCTV details (ask establishments to preserve footage; many overwrite in 7–30 days).
After 24–72 hours: legal positioning & recovery chances
- Complaint-Affidavit (optional, strong)
- Upgrade the blotter into a Complaint-Affidavit for the City/Provincial Prosecutor (or via NBI/PNP cyber units if online fraud occurred). Attach your exhibits (see templates below).
- If “Find My” shows a location
- Do not confront the suspected holder. Coordinate with police; provide live location screenshots and request assistance. DIY “entrapment” can put you at risk.
- Insurance/employer reporting
- If insured or company-issued, file a claim with: police blotter, affidavit of loss, telco suspension proof, and IMEI. Follow your company’s incident-response policy.
What crimes are commonly involved (so you can label things right)
- Theft (no force; e.g., pickpocket, table snatch).
- Robbery (with violence/intimidation).
- Qualified theft (by a trusted person/employee).
- Computer-related fraud/identity theft (if they accessed your accounts).
- Access device fraud (misuse of cards/e-wallets/online banking credentials).
- Extortion/Grave threats (if they contact you demanding money for return).
- Fencing (possession/sale of stolen property)—useful if you spot your phone being re-sold.
If intimate images or minors are involved due to device access, other special laws kick in—flag this to police/NBI for priority handling.
Civil/administrative angles (sometimes relevant)
- Establishment negligence: If theft occurred in a place with assumed custody (e.g., a bag inspection counter) and gross negligence is evident, you may demand compensation; success is fact-specific.
- Data privacy: If your work data or client info was exposed, your organization may need to assess/report the incident under privacy policies.
Practical templates
A) Affidavit of Loss (Device & SIM)
I, [Name], Filipino, of legal age, residing at [address], state:
- On [date/time] at [place], my [brand/model/color] smartphone bearing IMEI [IMEI-1 / IMEI-2] with mobile number [number] was [stolen/snatched/pickpocketed].
- The incident was reported at [station] under blotter no. [____] on [date].
- I request SIM suspension/replacement and device IMEI blocking.
- Annexed are the purchase receipt/box showing IMEI, and my ID. (Signature over printed name) ID details / Jurat
B) Bank/E-Wallet Fraud Dispute Letter (Email)
Subject: Urgent Fraud Dispute — Account [last 4 digits] — Phone Theft Dear [Bank/E-wallet], My phone was stolen on [date/time]; police blotter [no.] attached. I dispute the following unauthorized transactions on [dates] totaling ₱[amount] (see attached list/screenshots). Please freeze the account as needed, reverse/charge back, and file an STR with AMLC. I request written confirmation and next steps. [Name | mobile/email]
C) Complaint-Affidavit (short-form skeleton)
COMPLAINT-AFFIDAVIT I, [Name], state:
- On [date/time], at [place], my [phone details, IMEI] was [stolen/robbed].
- Immediately after, [describe unauthorized logins/transactions] occurred (Exhibits B-1…B-n).
- I reported to [police station], blotter [no.] (Exhibit A-1); telco suspended SIM and initiated IMEI block (Exhibit A-2).
- I respectfully request investigation and filing of proper charges for [theft/robbery + computer-related fraud/access device violations]. (Signature/Jurat) Exhibit List: A-1 blotter; A-2 telco ticket; A-3 device invoice/box (IMEI); B-series screenshots of logins/transactions; C-series password reset notices, etc.
Evidence checklist (what to gather now)
- IMEI (box, receipt, Find My device info, carrier portal).
- Blotter number & station details.
- Screenshots: unauthorized transactions, security alerts, location pings, device removal logs.
- Account logs (Google/Apple “devices signed in” pages).
- CCTV request details (store/mall, camera coverage, time window).
- Telco tickets (SIM suspension, IMEI blacklist).
- Bank/e-wallet dispute reference numbers.
Safety & recovery realities
- Self-help recovery is risky. Always use police assistance for meetups/“buy-back” stings.
- IMEI blacklisting helps deter local resale/activation; it doesn’t guarantee recovery.
- Speed matters: OTP/SMS interception is the #1 path to account takeover; suspending the SIM early prevents cascades.
Smart prevention going forward
- Strong device lock (alphanumeric; disable lock-screen previews for OTPs).
- Separate authenticator device or hardware security key where possible; avoid SMS-only 2FA.
- Hidden recovery codes in a secure offline place.
- eSIM + physical SIM management with clear “suspend” instructions kept at home.
- Stickers off the box: store the IMEI sticker separately (scan it).
- Wallet “app lock” independent of device unlock (most PH wallets allow this).
Bottom line
- Act in layers and fast: lock/wipe; kill the SIM; freeze money apps; file blotter; push telco/NTC for SIM/IMEI actions; dispute transactions; preserve evidence.
- Escalate appropriately: If accounts were accessed or money moved, involve NBI/PNP cyber units for preservation and tracing.
- Stay safe, not heroic: coordinate with authorities if a location pops up; don’t confront suspects yourself.
If you want, tell me (1) your phone model/IMEI if you have it, (2) where/when it was taken, and (3) which apps/banks you used. I can turn that into a ready-to-file Affidavit of Loss, bank dispute email, and a Complaint-Affidavit tailored to your facts.