ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Laptop, Tablet Or Smartphone Theft: What To Do To Prevent It And How To Try To Recover It

Updated on February 13, 2013


When your smartphone, laptop or tablet has been stolen, your first step should definitely be the police station; the theft should be reported at once, so you have higher chances that the thief is found and of course, higher chances of recovering your device. If you have more information, let them know of the exact circumstances; where you were, who was near you, whom you suspect, etc. The more detailed information they got, the more chances for you.

If it is a smartphone with a contract, you need to call your provider at once and ask them to “lock” your phone’s sim. This will prevent any unwanted calls through your phone that would cause higher bill. In some areas, it might even be possible to locate where the phone is, if the thief ever uses it to make calls. This is not possible in all countries, however.

These two steps are crucial and should be done at once; not only is it possible that the device is found, but they are prerequisites in some occasions. For example, Toshiba can replace a stolen laptop since they offer a theft warranty; in order to avail for it, you need to have reported the theft to police in no more than 48 hours after the incident occurred. So, all in all, you should be swift in your first moves after you notice the theft.

The Apps Force!

A variety of “anti-theft” applications have been created and are available at online stores, some of which are provided for free of charge. They can help you locate the traces of your phone, and even give you signs of it, such as send you pictures of the area they are in or the person who is using them, if they have changed the SIM card and went online ( 3G or WI-FI) with it. Remember, however that it still will not help you unless you have reported the theft to the police.

Android Lost, a powerful freeware application which can help you locate a lost or stolen Android smartphone is a typical example of such applications; you can find a hub on Android Lost here.

General Advice

Aside the steps to take when the theft has already occurred, you better follow some guidelines in order to prevent the theft. Some general advice about your own practices and tips on how to avoid this ever happening to you are shown here.

- Keep the IMEI number of your device noted. This 15-digit number is a characteristic of your device and only it and cannot be found on another smartphone; having it at hand can be helpful. You can find it by typing *#06# or by checking in the phone settings area; the place should differ according to your operating system.

- Note the serial number of your device; its location will differ, but usually it is either at bottom of the device or inside the battery compartment.

- Create a visual sign on your device; this could be a minor scratch or spot , anything that would help you in identifying the device if ever the thief is caught. When you have created the spot, take a photograph of your device in which that spot is obvious. If you would not like to create a visual flaw, you could use a specialized pen that only shows when particular UV light is used.

- Don’t trust strangers who seem to want to view your smartphone; excuses could be many, like to see how it looks in that color, or to examine it etc. Moreover, if someone asks you to use your phone to make an emergency call, try to make sure that there is really a need for it.

- Always keep your smartphone unseen in public when you aren’t using it; keep it in a safe and hard-to-reach area (for example, an inside coat pocket or a zipped purse).

- Set a PIN code or even an unlock code on your device, and avoid using it in places where you don’t feel particularly safe or when you feel too “exposed”.

- Be careful with how you deal with your smartphone or tablet when you have to put it aside and do something else; it is well known that the majority of thefts occur when you are busy and the device is not near you, like at a café, when you take a swim, etc.

- When you are on the go with your car, make sure that your device is not visible from outside. There’s nothing easier than someone snatching it from the open window or after opening the door when you have stopped at a red traffic light. Additionally, mind where you are storing or putting your device accessories; if an iPad case is seen in the car’s backseat, chances are that the iPad is in there too. Even if it isn't, you still risk to have to repair a broken glass or a damaged car lock, because the thief decided to check where your iPad is.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)