This article gives guidance on reporting a lost or stolen device. It contains instructions about:
In the unlikely event you have lost your device, or someone has stolen it, fill out the form “Lost or stolen device” and submit it as soon as possible.
The sooner iSolutions receive your request, the sooner we can start ensuring the safety of your data and the protection of your identity.
Any lost or stolen device used by criminals can generate personal and university data breaches.
You can report your lost or stolen device using the form “Lost or stolen device”.
The ticket will be sent to iSolutions Incident Response and Cyber Security teams.
If you need to report more than one device, please submit one ticket for any device.
---
In the unlucky case you lose your devices, or someone steals them, the sections below show a list of actions you can do to avoid worse scenarios.
If you do not have an alternative device to complete the following steps, please:
Please note that ServiceLine does not operate out of hours.
If you have previously linked your device to a Google Account, please follow the instructions listed in the Google support article “Find, lock, or erase a lost Android device”.
With Android handsets, you can use Find My Mobile or Find My Device to remotely access your phone. You will need to:
Instructions work for Android phones, Android tablets, and Wear OS watches.
Windows you can find and lock your devices by reading the Microsoft Support article “Find and lock a lost Windows device”.
If you need to change or reset your Windows password, please read the Microsoft Support article “Change or reset your Windows password”.
If you were using a Windows laptop owned by the University, you can disable it – that will block anyone else to access your data.
To do that, please:
You can locate any Apple device from iCloud.com following the Apple support article “Use Find Devices on iCloud.com”.
Using iCloud.com you can:
Apple iPhone and iPad users can find support on the Apple support page “If your iPhone, iPad or iPod touch is lost or stolen”.
Macbook users can find support on the Apple support page “If your Mac has been lost or stolen”.
---
You can sign out everywhere from your university account. To do that, please:
Be sure there are no suspicious changes to your default and second method of authentication.
To do that, please:
Desktop interface:
Mobile interface:
You can change your university password from Subscribe. If you do not remember your university password and need help, please call ServiceLine.
Step-by-step instructions:
Every time your security questions have been changed, you will receive an email notification from Serviceline:
Please contact ServiceLine if you notice something suspicious.
How to review or update your security questions:
You can see the list of your account’s sign-in following the steps below:
Please note: that location is not always 100% accurate and can position you in slightly different places. That said, sign-in locations give you a general idea of where the login came from.
You might have associated your university account with apps different from Microsoft Authenticator or other accounts.
Monitor whether there is anything suspicious and act as soon as possible.
Manage your email and OneDrive carefully. Spot if there’s anything suspicious or unfamiliar within:
---
Report the theft to the police straight away. You can call the non-emergency number 101 or visit a local police station in person.
If possible, give them the device’s International Mobile Equipment Identity (IMEI) number or serial number. They can use it to register your device on their stolen phone database. Major retailers will be alerted to its stolen status if someone tries to sell it to them.
The police should give you a Crime Reference Number, which will be requested to fill out the university form “Lost or stolen device”.
Further information: on the web page Contact the police - GOV.UK.
Windows and Android devices:
Apple devices:
Contact your bank or building society straight away, calling their customer service for reporting theft / loss issues or visiting a branch in person. That should prevent anyone to spend your money or have access to your account. The bank can also disable Apple Pay and equivalents if set up on that device.
We recommend changing the passwords of your social media as soon as possible to avoid potential compromise of these accounts.
If necessary, your friends and family can be made aware. Keeping them informed can protect them from receiving any request for money or actions from people that are using your device.
Report your missing device to your wireless network provider and ask to disable your account. This should prevent calls, texts and data use from people that are using your device.
---
In the unlikely event the Cyber Security Team discover that your account has been compromised as a result of the loss or theft of a device, iSolutions can suspend the access to your account and / or reset your password. You will receive a notification from ServiceLine – however:
If you have restricted access to your university account, you need to call ServiceLine to regain access to your account.
We will ask you to confirm your identity by coming to our Tech Hubs or calling us. Our technicians will generate a temporary password and will ask you for your security answers.
After those steps, you will be able to change your password and manage your account as before.
Multi-Factor Authentication (MFA) protects your account from the risk of being compromised. Though, if you suspect your account has been compromised, you need to call ServiceLine or visit our Tech Hubs and request an enforced password change.
Our technicians will generate a temporary password and will ask you for your security answers.
After those steps, you will be able to change your password and manage your account as before.
---
University-owned and managed Windows laptops have Full Disk Encryption (often abbreviated to FDE) enabled by default, using the Microsoft Windows BitLocker disk encryption solution.
The Apple equivalent FDE solution, FileVault for MacOS, will need to be manually set up by the user.
Here is how to view the settings and setup both solutions for your personal device:
Please note: encrypting your data is a preventative preventative feature that you need to enable to help secure your data in the event of loss/theft.
Full disk encryption is the process of encoding data or messages from “plaintext” (unencrypted) to “ciphertext” (encrypted). During this process, the information is converted into a non-human readable format, hiding the contents unless successfully decrypted.
As a result, the encoded data or message cannot be understood by any person other than its intended recipient. Only authorised parties can understand the information.
---
In case you need to request new equipment, please fill out the form that most suits you from the page "Equipment Requests".
Further information about the computer specifications and the “Hardware Provisioning Policy” can be found on the following pages:
Please be aware that, as per the above policy, orders to replace lost or stolen equipment will be charged to your faculty or professional service so be sure to provide a cost code when ordering.
---
iSolutions is ready to help you if you need IT support. You can both:
Find the opening times and all information on the web page “ServiceLine - The IT Service Desk”.
---
Lost or stolen device (form)
Attached files:
Was this article helpful?
If you have any further comments, please put them below.
Please note that feedback is anonymous - if you require a reply or assistance, please raise a ticket via ServiceLine.
Thank you for your feedback, it is much appreciated.