Since February 2014, UC Berkeley Police received 55 reports of stolen laptops on the UC Berkeley campus and University properties. According to theft reports, many of those stolen laptops were the result of "smash-and-grab" car break-ins. Lieutenant Marc DeCoulode with UCPD warns, "it only takes 10 seconds for a thief  to smash a window and grab a laptop.”  To protect your laptop or mobile device and its data in the event of theft, follow these basic security practices.

Physically Protect Your Device From Theft

  • Never leave your laptop or mobile device in a vehicle.
  • Do not walk away from your laptop, even for a minute.
  • If you must sleep while you're studying in the library, sleep on the laptop.
  • Do not leave valuables in common areas or ask strangers to watch them for you.
  • Secure your laptop in an office with cable locks, lockdown devices or inside a locked drawer, and be careful not to leave your device in plain sight -- even if locked.

Register and Track Your Device

  • Engrave or brand serial numbers, company names, and logos onto a laptop.
  • Use commercial location software, such as Apple FindMyiPhone. (UCPD uses LoJack Security software on their departmental laptops.)
  • Use tamper-resistant tags that can be applied to the laptop to identify it in case of theft, such as Stop Tag.

Protect the Data on Your Device

UC Berkeley's Minimum Security Standards for Electronic Information states that sensitive/notice-triggering data must not be stored on a laptop (or any other portable device) unless absolutely necessary and if so must be strongly encrypted. Encryption can be applied to laptop data in different ways. The two most common methods to protect data on laptops are "whole disk encryption" and "file encryption".

(See: “Data Encryption on Removable Media” for industry-accepted encryption technologies to protect your devices.)

Time is of the Essence

If your laptop or mobile device is stolen or lost, file a police report immediately: visit

If the computer is the property of UC Berkeley and is used for university business or accessing university data see My laptop was stolen or lost. What should I do? for reporting contacts and guidelines.