Investigating and responding to security incidents by identifying threats, mitigating risks, and ensuring the protection of sensitive data.

Categories (2)

Device Collection & Analysis

Offers technical support for institutional departments engaged in authorized internal investigations. Services include secure collection, forensic imaging, and detailed analysis of university-owned computing systems to preserve digital evidence, support investigative efforts, and uphold compliance with institutional policies and legal requirements.

Suspicious Activity & Response

This allows faculty, staff, and students to report malicious or suspicious activity, including phishing or fraudulent e-mails, enabling the analysis of the activity and the implementation of appropriate responses.