A PC that is protected by STOPMonitor was lost or stolen. What do I do?

You have a few options, depending on which version of STOPMonitor is installed on the missing PC:

STOPMonitor:

Will provide Public IP Address of the server through which the missing device is reporting the the STOPMonitor Web-based Console. Use the Public IP Address to geolocate the missing device on the Google Map that appears to the right of the device profile in the Web-based Console. Law enforcement can use that information to obtain the legal documents needed to perform a search for the device. In the meantime, administrators can continue to monitor the location of the device if it is moved, provided it is connected to the Internet.

STOPMonitor Pro:

Provides a more precise geolocation – to within approximately 100 feet – using Wi-fi triangulation to pinpoint the location of the device on the Google Map that appears to the right of the device profile in the Web-based Console. Law enforcement can use that information to obtain the legal documents needed to perform a search for the device. Location info obtained with Wi-fi triangulation increases the likelihood of finding and recovering the device. Pro also enables administrators to encrypt specific documents on the missing device and send a remote real-time encryption command. If the missing device is connected to the Internet, the encryption command will be executed within a few seconds. An event log within the Web-based Console enables the administrator to confirm in real time that the command was executed. In addition, Pro enables administrators to send a remote real-time Bootlock command. If the missing device is connected to the Internet, the Bootlock command will be executed within a few seconds and a black screen with an administrator-customizable message will appear after a forced reboot; an automatically generated password will be required to enable a safe reboot. An event log within the Web-based Console enables the administrator to confirm in real time that the command was executed. Pro also enables administrators to pre-set an “Offline Curfew” command that will automatically and locally bootlock the device if the device remains offline for longer than the pre-set number of days.