Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Lost or Stolen Equipment Policy
I need a Lost or Stolen Equipment Policy that outlines the procedures employees must follow when reporting lost or stolen company equipment, including timelines for reporting, responsibilities for replacement costs, and any disciplinary actions that may be taken. The policy should also include guidelines for safeguarding equipment to prevent loss or theft.
What is a Lost or Stolen Equipment Policy?
A Lost or Stolen Equipment Policy sets clear rules for handling missing workplace assets, from laptops and phones to specialized tools. This policy helps Kiwi organizations meet their obligations under the Privacy Act 2020, especially when lost devices contain sensitive data or personal information.
The policy outlines reporting steps, security measures, and employee responsibilities if equipment goes missing. It includes procedures for tracking devices, notifying IT teams, changing passwords, and working with insurers. Most importantly, it helps protect organizations from data breaches and ensures compliance with NZ's privacy and workplace safety requirements.
When should you use a Lost or Stolen Equipment Policy?
Put a Lost or Stolen Equipment Policy in place before your first major device deployment or when expanding your team beyond 10 employees. This timing lets you establish clear protocols while your asset tracking is still manageable, rather than scrambling to create rules after something goes missing.
Most NZ businesses implement this policy when setting up remote work arrangements, purchasing new equipment fleets, or after a security audit highlights data protection gaps. It's especially crucial for organizations handling sensitive customer information or when providing staff with portable devices that could access company networks from outside the office.
What are the different types of Lost or Stolen Equipment Policy?
- Basic Device Policy: Covers standard workplace equipment like laptops and phones, with simple reporting procedures and basic security measures
- Comprehensive Asset Policy: Extends protection to all business equipment, including specialized tools and machinery, with detailed recovery protocols
- Data-Focused Policy: Emphasizes protecting sensitive information under NZ's Privacy Act, with strict breach notification requirements
- Remote Work Policy: Specifically addresses equipment used outside the office, including personal device provisions
- Industry-Specific Policy: Tailored for sectors like healthcare or finance, incorporating relevant regulatory compliance measures
Who should typically use a Lost or Stolen Equipment Policy?
- IT Managers: Create and maintain the Lost or Stolen Equipment Policy, handle implementation, and oversee security protocols
- HR Teams: Communicate policy requirements to staff and manage training on proper device handling
- Employees: Follow reporting procedures and security measures outlined in the policy when using company equipment
- Privacy Officers: Ensure the policy aligns with NZ Privacy Act requirements and data protection standards
- Department Heads: Monitor compliance within their teams and authorize equipment replacement procedures
- Legal Advisors: Review policy terms and update requirements based on regulatory changes
How do you write a Lost or Stolen Equipment Policy?
- Equipment Inventory: List all company devices, their assigned users, and typical storage locations
- Security Requirements: Document current password policies, encryption standards, and tracking software details
- Contact Chain: Map out who needs notification when equipment goes missing (IT, management, police)
- Data Classification: Identify types of information stored on devices and required Privacy Act protections
- Recovery Steps: Outline remote wiping procedures and device replacement processes
- Insurance Details: Gather coverage information and claim submission requirements
- Template Selection: Use our platform to generate a customized policy that meets NZ legal requirements
What should be included in a Lost or Stolen Equipment Policy?
- Purpose Statement: Clear objectives and scope of the policy, aligned with Privacy Act 2020 requirements
- Equipment Definitions: Detailed list of covered devices and technology assets
- Reporting Procedures: Specific timeframes and steps for notifying relevant parties
- Security Protocols: Data protection measures and breach response procedures
- Employee Obligations: Clear responsibilities for device care and security
- Recovery Process: Steps for device tracking, remote wiping, and replacement
- Compliance Statement: References to relevant NZ privacy and security regulations
- Enforcement Terms: Consequences of non-compliance and disciplinary measures
What's the difference between a Lost or Stolen Equipment Policy and an Access Control Policy?
A Lost or Stolen Equipment Policy differs significantly from an Access Control Policy in both scope and application. While both address security concerns, they serve distinct purposes in protecting organizational assets.
- Focus and Timing: Lost or Stolen Equipment policies activate after a device goes missing, while Access Control policies work proactively to prevent unauthorized use
- Scope of Coverage: Lost Equipment policies cover physical assets and their data, whereas Access Control policies manage user permissions and system entry points
- Response Procedures: Lost Equipment policies outline incident reporting and recovery steps, while Access Control policies detail ongoing security protocols and authentication methods
- Compliance Requirements: Lost Equipment policies emphasize Privacy Act breach notifications, while Access Control policies focus on system security standards
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.