Язык: 🇺🇸 🇲🇽 🇷🇺
📦 Return of Company Property & Device Surrender Требования
Recover hardware, access credentials, and конфиденциальный data from departed работникs and подрядчикs
Contractual and Policy Basis for Return

Most работодательs have multiple legal bases for demanding return of property:

Source Typical Language
Offer letter / Трудовое Право agreement "Upon расторжение, Работник agrees to return all Company property, включая, но не ограничиваясь computers, phones, access badges, keys, documents, and data."
Работник handbook "All equipment, materials, and information provided to работникs remain Company property and must be returned immediately upon separation."
IT/Acceptable Use Policy "Работникs have no expectation of privacy in Company devices or systems. All hardware and data must be returned upon request."
Конфиденциальныйity agreement "Работник certifies that upon расторжение, all конфиденциальный information, documents, and materials (physical and electronic) will be returned or destroyed."
Separation agreement "As a condition of severance, Работник agrees to return all Company property and certify destruction of all copies of конфиденциальный information."
💡 Pro Tip: Even if you don't have explicit contract language, common law supports your right to recover property that belongs to you. Однако, written policies make enforcement much easier and reduce disputes.
Supporting Legal Doctrines
Legal Theory Application Limitations
нарушение договора Нарушение of agreement to return property Requires written contract with clear return obligation
Conversion Wrongful exercise of dominion over your tangible property (laptops, phones, etc.) Requires intent to deprive you of possession; may not apply to data
Trespass to chattels Wrongful interference with your possessory rights in property Generally for physical property; digital property is gray area
Trade secret misappropriation Retention of конфиденциальный data = ongoing misappropriation Must qualify as trade secret under CUTSA/DTSA
Computer Мошенничество (CFAA) Unauthorized access to company systems after расторжение Narrow application; mainly for hacking or continued system access, not passive retention
⚠️ CFAA Caution: The Computer Мошенничество and Abuse Act (18 U.S.C. § 1030) is primarily for unauthorized access to systems, not merely retaining data you once lawfully accessed. Don't overclaim CFAA нарушениеs in your требование—courts are skeptical of CFAA claims in employment disputes. Focus on contract breach and trade secret misappropriation.
Certification Requirements

Many agreements require the departing работник/подрядчик to certify that they have:

  • Returned all company property
  • Deleted all конфиденциальный information from personal devices and cloud accounts
  • Not retained copies of company data in any form
  • Not disclosed конфиденциальный information to third parties

If your policy includes certification requirements, demand a signed certification statement as part of the return process. This creates powerful доказательства if you later discover they retained data.

Timing: When to Отправить the Demand
Scenario Timing
Voluntary resignation Отправить checklist/demand on last day of work or within 24 hours of departure
Расторжение for cause Collect property immediately during расторжение meeting; send formal demand same day
Layoff / reduction in force Collect during exit meeting; send confirmation/demand within 24 hours
Подрядчик project completion Отправить with final payment or as condition of final payment
Discovery of missing property post-departure Отправить immediately upon discovery; delay weakens urgency and may suggest you don't care
Physical Hardware
☐ Laptops and desktop computers (including power adapters, mice, keyboards)
☐ Mobile phones and tablets (company-issued or BYOD with company accounts)
☐ Monitors and peripherals
☐ USB drives, external hard drives, SD cards
☐ Chargers, cables, dongles, adapters
☐ Headsets, webcams, microphones
☐ Printers, scanners, fax machines (if assigned)
☐ Corporate credit cards and procurement cards
☐ Access badges, key fobs, security tokens
☐ Office keys, parking passes, building access cards
☐ Company vehicles (if applicable)
Documents and Physical Media
☐ Paper files, binders, printouts
☐ Notebooks, planners, meeting notes
☐ Business cards (company-issued)
☐ Конфиденциальный documents, contracts, proposals
☐ Training materials, manuals, SOPs
☐ Marketing materials, brochures, promotional items
Digital Assets and Access
☐ Company email account credentials (to be disabled by IT)
☐ VPN access and remote desktop credentials
☐ Cloud storage accounts (Dropbox, Google Drive, OneDrive, Box)
☐ SaaS platform logins (Salesforce, Slack, Asana, GitHub, etc.)
☐ Social media account access (LinkedIn company page admin, Twitter business accounts)
☐ Domain and hosting credentials (if работник managed websites)
☐ Password manager vault contents (if used for company passwords)
☐ Two-factor authentication devices (hardware tokens, Yubikeys)
🔐 IT Security Checklist: While demanding physical return, immediately disable all system access: revoke email, VPN, cloud storage, and application logins. Don't rely on the работник to "hand over" credentials—proactively terminate access via IT.
Specialized Equipment by Industry
Industry Additional Property to Recover
Healthcare Medical devices, pagers, HIPAA-compliant laptops, patient data (must be securely destroyed)
Construction / field services Tools, safety equipment, company vehicles, fuel cards, uniforms
Sales Demo products, sample inventory, client gift inventory, corporate credit cards
Tech / software Development environments, code repositories (ensure no unauthorized forks), API keys
Finance Trading platform access, market data terminal credentials, Bloomberg terminal logins
Creating a Comprehensive Inventory

Maintain an asset inventory for each работник/подрядчик from day one. Track:

  • Asset tag / serial number for all hardware
  • Date issued and condition at issuance
  • Assigned user and department
  • Value (for conversion убытки if not returned)
  • Software licenses tied to specific devices or users

When an работник departs, cross-reference this inventory in your требование to show exactly what's missing.

The Digital Data Problem

Even if the работник returns the physical hardware, конфиденциальный data may still exist in multiple locations:

Location Risk How to Address
Personal devices Files emailed to personal accounts, downloaded to personal laptop/phone Demand certification of deletion from all personal devices
Personal email Forwarded company emails containing конфиденциальный info Demand deletion of all forwarded emails and attachments
Personal cloud storage Dropbox, Google Drive, iCloud, OneDrive synced with company files Demand deletion and certification; may request access to verify if судебный процесс likely
External hard drives / USB Backups or copies made "just in case" Demand return of all external media and certification that no copies exist
Cloud collaboration tools Slack messages, Notion pages, Asana tasks exported or saved Revoke access immediately; demand deletion of any offline copies
Code repositories GitHub forks, GitLab mirrors, local git clones on personal machines Demand deletion of all forks, clones, and local repositories
⚠️ You Can't Force Deletion Without Legal Process: Your требование can request deletion and certification, but you generally cannot force the работник to let you access their personal devices to verify deletion. If you need to confirm deletion, you'll need to pursue судебный процесс and discovery (forensic imaging, interrogatories, depositions).
Certification of Data Deletion

Include a certification template in your требование requiring the работник to sign and return:

CERTIFICATION OF RETURN AND DELETION

I, [Работник Name], hereby certify under штраф of perjury that:

  1. I have returned all Company property, including all hardware, documents, access credentials, and materials listed in Exhibit A;
  2. I have deleted all Company конфиденциальный information, documents, files, and data from my personal devices, including computers, phones, tablets, USB drives, and external hard drives;
  3. I have deleted all Company emails, attachments, and data from my personal email accounts (including [list specific accounts if known]);
  4. I have deleted all Company data from my personal cloud storage accounts, including Dropbox, Google Drive, iCloud, OneDrive, and any other cloud services;
  5. I have not retained any copies, backups, or derivatives of Company конфиденциальный information in any form or location;
  6. I have not disclosed any Company конфиденциальный information to third parties, including my new работодатель;
  7. I will not access any Company systems, accounts, or data after the date of this certification.

Signed: _________________________
Date: _________________________

Data on BYOD (Bring Your Own Device)

If the работник used a personal device for work under a BYOD policy, you face additional challenges:

Issue Solution
Can't demand return of personal device Demand deletion of company data and apps; if company used MDM (mobile device management), remotely wipe corporate partition
Commingled personal and work data Demand deletion of work data only; cannot force deletion of personal data
Нет visibility into соблюдение Require written certification; reserve right to pursue forensic verification if судебный процесс ensues
Работник refuses to delete Pursue trade secret misappropriation требование and seek суд order
💡 MDM Solutions: If you use Mobile Device Management software (Intune, AirWatch, Jamf, etc.), you can remotely wipe corporate data from BYOD devices without affecting personal data. Exercise this option immediately upon расторжение, then follow up with a demand for certification.
Preservation vs. Deletion

There's a tension between demanding deletion and preserving доказательства for судебный процесс:

  • If судебный процесс is NOT anticipated: Demand immediate deletion and certification to minimize ongoing exposure
  • If судебный процесс IS anticipated: Отправить a preservation notice prohibiting deletion, alteration, or destruction of data, then seek суд-ordered forensic imaging to verify what was taken

Preservation notice language:

You are hereby instructed to preserve all доказательства related to your access, use, and retention of [Company]'s конфиденциальный information and property, including:

  • All devices (computers, phones, tablets, USB drives) that may contain Company data;
  • All emails, text messages, and electronic communications;
  • All cloud storage accounts and file-sharing services;
  • All documents, files, and data in any format.

Do not delete, alter, or destroy any of these materials. Failure to preserve доказательства may result in sanctions, including adverse inference instructions and spoliation штрафы.

Essential Elements of Property Return Требование
  1. Reference to contractual/policy obligations: Cite specific provisions requiring return of property
  2. Itemized list of property: Be specific—serial numbers, asset tags, descriptions
  3. Return logistics: Where to send, how to ship, who to contact, prepaid shipping label (if applicable)
  4. Deadline: Typically 5–10 рабочих дней
  5. Certification requirement: Include certification of deletion template to be signed and returned
  6. Consequences of non-соблюдение: Conversion требование, trade secret misappropriation, cost взыскание, адвокатs' fees
Sample Property Return Требование

Dear [Former Работник/Подрядчик]:

As you are aware, your employment with [Company] ended on [date]. в соответствии с [Трудовое Право Agreement / Работник Handbook / IT Policy] Section [X], you обязаны return all Company property immediately upon расторжение.

Our records indicate that you have not yet returned the following items:

Item Описание / Serial Number Value
Laptop MacBook Pro 16", Serial: C02X12345678 $2,800
iPhone iPhone 14 Pro, IMEI: 123456789012345 $1,200
Access badge Badge #4521 $50
Итого Value: $4,050

ТРЕБОВАНИЕS:

  1. Return all items listed above to [Company Address, Attn: [Контакт Name]] by [specific date, typically 10 days from letter];
  2. Complete and return the attached Certification of Return and Deletion, confirming that you have deleted all Company data from personal devices and cloud storage; and
  3. Контакт [IT Контакт Name] at [email/phone] to arrange return logistics. We will provide a prepaid shipping label upon request.

CONSEQUENCES OF NON-COMPLIANCE:

If you fail to return the property by the deadline, [Company] will pursue all available legal remedies, including:

  • A требование for conversion and взыскание of the fair market value of unreturned property ($[total value]);
  • Trade secret misappropriation claims for retained конфиденциальный data;
  • Withholding of final paycheck [if permitted by state law] to offset the value of unreturned property;
  • Адвокатs' fees and costs; and
  • Referral to law enforcement if appropriate.

Please contact me immediately if you have any questions.

С уважением,

[Sender Name / HR Director / Адвокат]

⚠️ Final Paycheck Withholding: Check your state's law before threatening to withhold final paychecks. In California and many other states, you cannot withhold заработная плата to offset unreturned property—you must pay final заработная плата on time and pursue property взыскание separately. Illegal withholding can trigger waiting-time штрафы.
Tone: Cooperative vs. Aggressive
Approach When to Use Образец Текста
Cooperative Amicable departure, valued former работник, likely just forgot "We know you've been busy with your transition. As a reminder, please return the following items at your earliest convenience..."
Firm but professional Standard departure, property not returned within reasonable time "в соответствии с your contractual obligations, you must return all Company property by [date]. Failure to do so will result in [consequences]."
Aggressive Расторжение for cause, suspected theft, unresponsive to initial requests "Your failure to return Company property constitutes conversion. We will pursue immediate legal action, including claims for убытки, адвокатs' fees, and potential criminal referral."
Balancing Preservation Rights and Работник Privacy

When requesting return or forensic imaging of devices, be mindful of privacy concerns:

Situation Privacy Concern Balanced Approach
Company-issued device (no personal use allowed) Minimal—работник had no expectation of privacy Demand immediate return; forensic imaging is permissible
Company device with incidental personal use Some personal data may exist (personal emails, photos) Offer neutral third-party imaging with filter protocols to exclude personal data
BYOD (personal device with company data) High—significant personal data commingled Cannot demand return of device; can only demand deletion of company data and certification
🔐 Acceptable Use Policies Matter: If your IT policy clearly states "no expectation of privacy" and "company may access, monitor, and image devices at any time," you have much stronger footing to demand imaging. Without such a policy, expect pushback.
Forensic Imaging Protocols

If судебный процесс is likely and you need to verify data deletion:

  1. Propose neutral third-party forensic examiner: Mutually agreed upon expert who will image the device and apply search terms/filters
  2. Define search scope: Limit to company-related data (file names, email addresses, specific terms)
  3. Filter out personal data: Protocol for excluding personal emails, photos, medical records, адвокат-client communications
  4. Privilege log: Работник can требование privilege over адвокат communications or other protected materials
  5. Cost sharing: Negotiate who pays for forensic imaging (often split or работодатель bears cost)
Sample Forensic Imaging Proposal Language

To verify your соблюдение with the return and deletion obligations, we propose the following protocol:

  1. You will deliver the laptop to [Neutral Forensic Firm], a mutually agreed-upon third-party forensic examiner;
  2. The examiner will create a forensic image of the device and search for Company-related data using the following search terms: [list specific terms, file extensions, email domains];
  3. The examiner will filter out personal data unrelated to [Company] business, including personal emails (non-Company domains), personal photos, and privileged адвокат communications;
  4. The examiner will provide a report to [Company] identifying any Company data found on the device, without disclosing your personal information;
  5. [Company] will bear the cost of the forensic examination.

This protocol protects your privacy while allowing us to verify соблюдение with your contractual obligations.

⚠️ Spoliation Sanctions: If the работник deletes data after you send a preservation notice, вы можете потребовать суд sanctions for spoliation of доказательства. This can include adverse inference instructions (jury is told to assume the deleted data was harmful to the работник's case) and monetary штрафы.
Remote Wipe: When and How

If you have remote wipe capabilities (via MDM or "Find My" features), consider these factors:

Factor Consideration
Legal right to wipe Your IT policy should reserve right to remotely wipe company-issued devices
Preservation concern If you may need to prove data theft, wiping destroys доказательства—consider imaging first
BYOD devices You can wipe corporate partition/apps, but cannot wipe entire personal device without consent
Notice to работник Best practice: notify работник before wiping to avoid claims of destruction of personal data
How I Can Help

I assist companies in recovering property and конфиденциальный data from former работникs and подрядчикs. I draft требованиеs, coordinate forensic imaging, negotiate return protocols, and pursue судебный процесс for conversion and trade secret misappropriation when necessary.

Услуги Offered
  • Property return требованиеs: Comprehensive letters with itemized inventory, clear deadlines, and certification requirements
  • Data deletion certification protocols: Draft certification templates and follow-up procedures
  • Forensic imaging coordination: Negotiate neutral third-party imaging protocols that balance preservation and privacy
  • Preservation notices: Prevent spoliation when судебный процесс is anticipated
  • Conversion and trade secret судебный процесс: Pursue claims for unreturned property and retained конфиденциальный data
  • Policy review and drafting: Strengthen your IT policies, acceptable use policies, and exit procedures to prevent future disputes
My Approach
  1. Asset inventory review: I work with your IT and HR teams to create a complete inventory of what should be returned.
  2. Tailored требованиеs: I draft letters calibrated to the relationship—cooperative for valued ex-работникs, aggressive for bad actors.
  3. Privacy-conscious protocols: I propose forensic imaging and verification procedures that protect работник privacy while securing ваши права.
  4. Rapid escalation readiness: If the работник ignores the demand, I'm prepared to file for injunctive relief and pursue conversion/misappropriation claims quickly.
  5. Policy improvement: I identify gaps in your current policies and help you implement stronger property return and exit procedures to prevent future issues.
📦 Former Работник Won't Return Company Property?

Контакт me for a consultation. I'll draft a требование, coordinate return logistics, and if necessary, pursue legal action to recover your property and data.

Email: owner@terms.law
Часто Задаваемые Вопросы
In most states, no. California, for example, prohibits withholding final заработная плата to offset unreturned property (Lab. Code § 221). You must pay final заработная плата on time and pursue property взыскание separately through требованиеs or судебный процесс. Check your state's wage payment laws before withholding.
If the loss or damage was due to халатность or intentional conduct, you can pursue a conversion or халатность требование for the fair market value of the property. Однако, if the loss was due to normal wear-and-tear or circumstances beyond their control, взыскание may be limited. Your employment agreement may address responsibility for lost/damaged property.
You can wipe the corporate partition or company-managed apps if your MDM solution supports containerization. You cannot wipe the работник's entire personal device without their consent—doing so could expose you to ответственность for destruction of personal data. Always notify the работник before initiating a remote wipe.
Forensic imaging of devices (if you can access them), system logs showing downloads/emails before departure, third-party reports (clients saying the работник used your конфиденциальный info), and side-by-side comparison of your materials vs. the работник's new work product. In судебный процесс, you can use discovery to compel production and forensic examination.
For conversion: fair market value of the property at the time of conversion. For trade secret misappropriation (retained конфиденциальный data): actual losses, unjust enrichment, and up to 2× убытки for willful misconduct. You may also recover адвокатs' fees if your contract or applicable statute permits.
If судебный процесс is not anticipated: demand deletion to minimize ongoing risk. If судебный процесс is likely or you need to prove data theft: send a preservation notice prohibiting deletion so you can later seek forensic imaging. You cannot do both—choose based on whether you prioritize risk mitigation or доказательства preservation.

📝 Создайте Ваше Требование

Generate a professional требование, CA суд исковое заявление, or арбитраж demand