{"id":2309,"date":"2020-12-15T08:54:35","date_gmt":"2020-12-15T13:54:35","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/help-support\/tech-support\/security\/lost-or-stolen-mobile-devices\/"},"modified":"2026-02-02T16:23:44","modified_gmt":"2026-02-02T21:23:44","slug":"lost-or-stolen-mobile-devices","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/","title":{"rendered":"Lost and Stolen Devices"},"content":{"rendered":"<p>With the growing use of personal devices to access college email and systems, business data may be accessed on these devices. While Trinity College strongly discourages using personal devices for handling sensitive college data, it&#8217;s crucial to be proactive if your device is lost or stolen.<\/p>\n<p>To protect your information and secure your data, take the following actions immediately if your device is lost or stolen:<\/p>\n<ol>\n<li><strong>If theft has occurred, promptly report the incident to the police.<\/strong>\n<ul>\n<li>If the theft occurs on campus, contact Campus Safety to file a report (860) 297-2222<\/li>\n<li>If the theft occurs off-campus, please contact the local police department in the jurisdiction where the theft took place.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Immediately notify your supervisor and <a href=\"https:\/\/trincoll.haloitsm.com\">submit a ticket<\/a> to the IT helpdesk<\/strong><\/li>\n<li><strong>Submit a <a href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=aqDNptlSckauH_b5yfFONw5vsHrnzbxGmjQDTjKeFYRUOVNNQk9YMjRCRzNYWVZXMzBVRzM2MDY2Qy4u&amp;route=shorturl\">cybersecurity breach form<\/a> and include your ticket number for reference.<\/strong><\/li>\n<li><strong><a href=\"https:\/\/internet3.trincoll.edu\/PasswordReset\/\">Change your college password<\/a> immediately.<\/strong><\/li>\n<li><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><strong>Many devices sync email and calendar events with Trinity&#8217;s Microsoft 365. To prevent unauthorized access, the device must be remotely wiped. Users can initiate<\/strong> <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/remove-a-device-from-your-microsoft-account-dda2c664-9d57-e5db-acf0-67f14d5fdf3c#:~:text=Go%20to%20account.microsoft.com,%2C%20select%20More%20actions%20%3E%20Remove\"><b>this process<\/b><\/a> themselves.<\/span><\/li>\n<\/ol>\n<p>A member of the Information Security Team will contact you shortly. Please be prepared to provide a copy of the official police report and details about the device and its contents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the growing use of personal devices to access college email and systems, business data may be accessed on these devices. While Trinity College strongly discourages using personal devices for handling sensitive college data, it&#8217;s crucial to be proactive if your device is lost or stolen. To protect your information and secure your data, take [&hellip;]<\/p>\n","protected":false},"author":301,"featured_media":0,"parent":2971,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2309","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lost and Stolen Devices - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lost and Stolen Devices\" \/>\n<meta property=\"og:description\" content=\"With the growing use of personal devices to access college email and systems, business data may be accessed on these devices. While Trinity College strongly discourages using personal devices for handling sensitive college data, it&#8217;s crucial to be proactive if your device is lost or stolen. To protect your information and secure your data, take [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T21:23:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/\",\"name\":\"Lost and Stolen Devices - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2020-12-15T13:54:35+00:00\",\"dateModified\":\"2026-02-02T21:23:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Incident Response &amp; Reporting\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Lost and Stolen Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Lost and Stolen Devices - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/","og_locale":"en_US","og_type":"article","og_title":"Lost and Stolen Devices","og_description":"With the growing use of personal devices to access college email and systems, business data may be accessed on these devices. While Trinity College strongly discourages using personal devices for handling sensitive college data, it&#8217;s crucial to be proactive if your device is lost or stolen. To protect your information and secure your data, take [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2026-02-02T21:23:44+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/","name":"Lost and Stolen Devices - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2020-12-15T13:54:35+00:00","dateModified":"2026-02-02T21:23:44+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/lost-or-stolen-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Incident Response &amp; Reporting","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/"},{"@type":"ListItem","position":5,"name":"Lost and Stolen Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/2309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/301"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=2309"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/2309\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/2971"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=2309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}