{"id":79,"date":"2020-07-10T13:57:39","date_gmt":"2020-07-10T17:57:39","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/theft-and-loss\/"},"modified":"2025-07-10T14:30:06","modified_gmt":"2025-07-10T18:30:06","slug":"theft","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/theft\/","title":{"rendered":"Theft and Loss"},"content":{"rendered":"<p>Since your mobile devices contain a lot of information about you (i.e. accounts, credit card info, etc.), having one stolen can be more than an inconvenience. You may need to take further action to protect yourself from additional consequences.<\/p>\n<h2>What You Should Do<\/h2>\n<p>When your device is lost, or if you suspect that it has been stolen, call the <a href=\"https:\/\/www.adelphi.edu\/safety-transportation\/\">Public Safety<\/a>\u00a0immediately by dialing 516.877.3511. As long as your computer is logged in to our wireless network and still on campus, we might be able to help find it.<\/p>\n<ul>\n<li>Do not leave devices unattended in labs, classrooms, libraries, lounges, dining facilities or other public areas. If you live in a dorm room or are visiting a friend in a residence hall, make sure the door is locked if you plan to leave your device for even a short time.<\/li>\n<li>If you must leave a computer in your car, lock it in your trunk and make sure it is out of sight.<\/li>\n<li>Enable a passcode or lock screen on your devices.<\/li>\n<li>Use a tracking app on your devices.\n<ul>\n<li>Apple devices have a &#8220;<a href=\"https:\/\/www.icloud.com\/find\/\" target=\"_blank\" rel=\"noopener noreferrer\">Find my<\/a>&#8221; app that you can use to locate, lock or remotely disable a lost device.<\/li>\n<li>Android devices can be tracked, locked and wiped using the <a href=\"https:\/\/support.google.com\/accounts\/answer\/3265955?hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">Android Device Manager<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Since your mobile devices contain a lot of information about you (i.e. accounts, credit card info, etc.), having one stolen can be more than an inconvenience. You may need to take further action to protect yourself from additional consequences. What You Should Do When your device is lost, or if you suspect that it has&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":27,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-79","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Theft of Devices on Campus | Security Week | Adelphi University<\/title>\n<meta name=\"description\" content=\"Cell phones and tablet computers are easy targets of thieves and are often stolen or accidentally lost. Learn how to prevent or report theft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Theft of Devices on Campus | Security Week | Adelphi University\" \/>\n<meta property=\"og:description\" content=\"Cell phones and tablet computers are easy targets of thieves and are often stolen or accidentally lost. Learn how to prevent or report theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/theft\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-10T18:30:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>","yoast_head_json":{"title":"Theft of Devices on Campus | Security Week | Adelphi University","description":"Cell phones and tablet computers are easy targets of thieves and are often stolen or accidentally lost. Learn how to prevent or report theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/theft\/","og_locale":"en_US","og_type":"article","og_title":"Theft of Devices on Campus | Security Week | Adelphi University","og_description":"Cell phones and tablet computers are easy targets of thieves and are often stolen or accidentally lost. Learn how to prevent or report theft.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/theft\/","og_site_name":"Information Technology","article_modified_time":"2025-07-10T18:30:06+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/theft\/","url":"https:\/\/www.adelphi.edu\/it\/security\/theft\/","name":"Theft of Devices on Campus | Security Week | Adelphi University","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-10T17:57:39+00:00","dateModified":"2025-07-10T18:30:06+00:00","description":"Cell phones and tablet computers are easy targets of thieves and are often stolen or accidentally lost. Learn how to prevent or report theft.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/theft\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"Theft and Loss"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/79"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":2,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/79\/revisions"}],"predecessor-version":[{"id":702,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/79\/revisions\/702"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}