Lost or Stolen Mobile Device Response Procedure (OP-PROC-003)
1. Purpose
To provide the immediate steps a user and the IT Security Team shall take when a mobile device used for company business is reported lost or stolen.
2. Scope
This procedure applies to all users of company-issued or personal mobile devices (BYOD) that are enrolled in the company’s Mobile Device Management (MDM) system.
3. Overview
This procedure details the rapid response actions mandated to mitigate the security risk arising from a lost or stolen mobile device. The primary goals are to protect company data by remotely locking and wiping the device and to prevent unauthorized access by revoking associated credentials.
4. Procedure
Step | Who | What |
---|---|---|
1 | User | Immediately (within 1 hour of discovery) reports the lost or stolen device to the IT Security Team through the designated emergency contact channel. |
2 | IT Security Team | Upon receiving the report, immediately initiates the remote lock command via the MDM system to prevent access to the device. |
3 | IT Security Team | Initiates the remote wipe command via the MDM system to erase all corporate data from the device. |
4 | IT Security Team | Immediately revokes all access credentials associated with the device, including disabling the user’s primary account, VPN access, and any application-specific passwords. |
5 | IT Security Team | Creates a formal incident report to document the event, the actions taken, and the outcome. |
5. Standards Compliance
This section maps the procedure steps to specific controls from relevant information security standards.
Procedure Step(s) | Standard/Framework | Control Reference |
---|---|---|
1-5 | SOC 2 | CC7.1 |
1-5 | HIPAA Security Rule | 45 CFR § 164.310(d)(1) |
6. Artifact(s)
A completed incident report documenting the loss/theft, response actions, and resolution.
7. Definitions
Remote Lock: A feature of MDM software that allows an administrator to remotely make a device inaccessible.
Remote Wipe: A feature of MDM software that allows an administrator to remotely delete all data from a device.
8. Responsibilities
Role | Responsibility |
---|---|
User | Responsible for the timely reporting of a lost or stolen device. |
IT Security Team | Responsible for executing the remote lock and wipe procedures, revoking credentials, and documenting the incident. |