Every semester, UC Berkeley Police received numerous reports of stolen laptops on the campus and University properties. According to theft reports, many of those stolen laptops were the result of "smash-and-grab" car break-ins. UCPD warns that, "it only takes 10 seconds for a thief to smash a window and grab a laptop.” To protect your laptop or mobile device and its data in the event of theft, follow these basic security practices.
- Never leave your laptop or mobile device in a vehicle
- Do not walk away from your laptop, even for a minute
- If you must sleep while you're studying in the library, sleep on the laptop
- Do not leave valuables in common areas or ask strangers to watch them for you
- Secure your laptop in an office with cable locks, lockdown devices or inside a locked drawer, and be careful not to leave your device in plain sight -- even if locked
- Engrave or brand serial numbers, company names, and logos onto a laptop
- Use commercial location software, such as Apple FindMyiPhone (UCPD uses LoJack Security software on their departmental laptops)
- Use tamper-resistant tags that can be applied to the laptop to identify it in case of theft, such as Stop Tag
UC Berkeley's Minimum Security Standards for Electronic Information states that sensitive/notice-triggering data must not be stored on a laptop (or any other portable device) unless absolutely necessary and if so must be strongly encrypted. Encryption can be applied to laptop data in different ways. The two most common methods to protect data on laptops are "whole disk encryption" and "file encryption".
- Whole Disk Encryption Software protects the entire hard drive.
- File EncryptionSoftware encryptes a file or folder.
(See: “Data Encryption on Removable Media” for industry-accepted encryption technologies to protect your devices.)
If your laptop or mobile device is stolen or lost, file a police report immediately: visit http://police.berkeley.edu/about_UCPD/contact-info.html#NonEmergency
If the computer is the property of UC Berkeley and is used for university business or accessing university data see My laptop was stolen or lost. What should I do? for reporting contacts and guidelines.