Theft of data carriers, IT systems, accessories, software or data results in costs for replacement and restoration to a working condition, as well …