. "If you have loaded Maverick's software on the stolen phone, you can use another phone to pull your contact data or other information off the purloined handset." . . .