This document defines a set of requirements that can be used by all industry stakeholders to allow users to protect, track, disable and re-enable stolen devices in a consistent way. These requirements constitute a benchmark set of features that also leave OS developers and handset manufacturers free to design specific offerings to the benefit of their businesses.