Dear all,
Theft of Property: Movable and Immovable
Theft of property comes in two forms: movable and immovable. These properties must be handled following proper procedures and standard operating procedures (SOP). Documentation should strictly adhere to the prescribed format.
Security Procedures and Policy Alignment
Procedures and the implementation of security rules and regulations must align with the policy design. Security, being a sensitive and critical department, is directly linked to Top Management. Any incidents related to theft, pilferage, or sabotage should be promptly and thoroughly investigated.
Challenges in Conducting Investigations
Conducting a detailed inquiry lacks a scientific tool or prescribed format in HR or Criminology to extract information from individuals. The offense originates in the mind and is executed by the human body. There are no scientifically established rules to identify criminal intent, as there are no qualifying criteria based on gender, race, religion, or academic qualifications.
Investigating Laptop Theft: Key Considerations
Investigating a laptop computer follows a detailed method, varying from one organization to another. Some key questions and issues include:
• How many laptops are in use?
• Who is authorized to use them within the office premises or related work areas?
• Who has access regardless of possession?
• Policy compliance in case of loss or damage by users or non-users.
• Access limitations.
• Security procedures during usage, including entries, names, signatures, dates, times, and pass issuances.
• SOP for usage during domestic and overseas travel.
• Storage devices utilized by users.
• Vendor access during maintenance and repairs.
• Responsibility and accountability, with written agreements in case of loss or mishandling during transit.
Experience with Laptop Misuse and Theft
In my experience, I have encountered instances of misuse, damage, and theft of laptops in leading organizations. Despite clearly defined rules, organizations often refrain from penalizing offenders. Typically, individuals involved in laptop theft are educated, tech-savvy, intelligent, and knowledgeable about security protocols, often using or facilitating the use of stolen gadgets in some way.
Companies frequently opt to report incidents to the police, anticipating the outcome and repercussions, leading to cases being closed and forgotten, with insurance claims as the resolution.
My approach to identifying suspects or offenders differs significantly in my experience.
Best regards,
V. Rangarajan.