When a device you own or manage (laptop, cell phone, tablet, etc.) is lost or stolen, the following steps will help you to you act swiftly to protect thedata and possibly recover the device.
- If you believe the device was stolen, you should file a report with the police.
- Please also provide the following information to the IT Security Office at email@example.com:
- Email address of the device’s owner and also of the CSR who manages the device.
- Provide the approximate date and time (within a two-week range) that the device was last on the the CU Boulder network.
- MAC Address: Provide the MAC address(s) of the device which would have been registered on the CU Boulder network. Be aware that the device may have had multiple interfaces (e.g. wired and wireless) and therefore potentially multiple MAC addresses. The address should be formatted as six groups of two hexadecimal digits, separated by colons (e.g. 01:23:45:67:89:ab).
- The classification of the information that was stored on the device (i.e. private or restricted).
- Highly confidential data is data, which if disclosed, would be a violation of federal or state laws , or university contracts. Examples include, but are not limited to, credit card information, social security numbers or associated personally identifiable information.
- Confidential data is data, which if disclosed without authorization, could cause harm or embarrassment to the university, its faculty, students, or staff. This includes data that the data owner feels should be protected to prevent unauthorized disclosure. Examples include but are not limited to student records and personnel information.
For help with identifying and classifying the information stored on mobile devices, the IT Security Office recommends installing and running Identity Finder.
For more information on identifying and classifying information assets such as private and confidential data click here.