Report a System Compromise

Overview

This service allows users to report suspected or confirmed compromises of university-owned systems, accounts, or devices. Examples include unauthorized access, malware infections, or data exposure. Prompt reporting helps protect institutional data, minimize disruption, and ensure compliance with security and privacy requirements.

Features and Benefits

Rapid Triage and Investigation: Security staff assess the report and determine the scope and severity of the issue. - Containment and Remediation: Immediate steps are taken to isolate affected systems and prevent further damage. - Stakeholder Coordination: Relevant parties are engaged to support resolution and communication. - Documentation and Follow-Up: Findings are recorded, and recommendations may be provided to prevent future incidents. - Compliance Support: Ensures incidents are handled in accordance with institutional policies and regulatory obligations.

Who is this Service Offering Available to?

Available to faculty, staff, and students who use university-owned computers, accounts, or devices.

Service Availability:

Requests can be submitted 24/7, and they're typically reviewed within 2 business days. Investigation and resolution times may vary depending on the nature and complexity of the incident/

Fees or Costs Associated with the Service

There is no fee for reporting or investigating a system compromise. Any costs related to remediation (e.g. hardware replacement or software licensing) will be communicated before action is taken.