NON-EMERGENCY DISPATCH PHONE NUMBER 757-357-2151
FAQ - Create a Home Inventory
HAVE YOU CREATED A HOME INVENTORY?
Having a home inventory becomes invaluable if you are ever the victim of theft or fire. A home inventory documents and records all your valuables in detail if they are stolen or destroyed. This will aid the police and insurance companies in assisting you. That last thing you need to do is to scramble to try to remember all this information after a loss.
A home inventory can be as simple as writing down the make/model/serial number of electronic items and firearms and taking photos of these items and jewelry. One downside to this is that this list may become lost or damaged. There are many online methods of creating inventories as well including phone apps.
The Isle of Wight County Sheriff’s Office recommends using Report It by Leads Online. This is a FREE online system that will help keep track of valuable --- and invaluable --- personal property. Report It is a free, secure online service allowing citizens to record serial numbers and upload images for phones, electronics, and other valuables. Should those items ever be stolen or destroyed, having this information on file will go a long way in accurately and quickly identifying your property.
Citizens can access the site at http://reportit.leadsonline.com
This website contains public information and is provided as a service by the Isle of Wight County Sheriff's Office to its citizens and the general public. Information presented throughout this website may be freely downloaded, copied or distributed with the exception of the agency logo, shoulder patch, and badge. Although the Sheriff's Office makes every effort to ensure that information available on its website is accurate and current as of the date indicated, the Sheriff's Office expressly does not warrant its accuracy or currency. Any use of such information shall be at the user's own risk. Unauthorized attempts to upload information or alter information on this website are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.