![]() ![]() ![]() Faculty or staff: we will look up your department code and notify the IT People listed with that department in the IT Pro database.Students: we will notify the UITS Support Center, who will attempt to contact you via phone.If a username is compromised and we must scramble the passphrase: ![]() In order to help you understand how we choose which email addresses we use, we’ll outline here part of that process: User incidents These alert people to computer and account compromises and malicious activities. When warranted and feasible, the evidence will be collected in a manner that ensures compliance with industry best practices.Įvery day the UISO Incident Response team sends dozens of email notifications to the university community. The gravity of the situation will determine the method by which evidence and other pertinent information are collected. The UIPO and UISO will oversee the investigation of the incident and involve Legal Counsel, IUPD, local, state, and federal law enforcement as necessary. The same kit will be used for all incidents to ensure that a consistent approach is taken. The kit has been, and will continue to be, refined as incidents are handled to improve the process and make it as efficient and effective as possible. This kit contains the information needed by the unit experiencing the incident, in cooperation with the other individuals on the Incident Team, to handle the incident. The nature of the incident and the type(s) of information involved will determine the exact makeup of the Incident Team, but it will include representatives from a number of university organizational units such as the unit experiencing the incident, Legal Counsel, Media Relations, the Committee of Data Stewards and/or the Compliance Officer for the information sector(s) implicated.Īn incident response tool kit has been developed to guide the activities of this Incident Team. When the UIPO and/or UISO are notified, an Incident Team will be assembled to advise and assist in containing and limiting the exposure, in investigating the incident, in obtaining the appropriate approvals, and in handling notification to the affected individuals and agencies. The University Information Policy Office (UIPO) and the University Information Security Office (UISO) are charged with the investigation and coordination of incidents where the loss, corruption, inappropriate disclosure, or inappropriate exposure of information assets is suspected. Sharing institutional data with third parties.Information systems acquisition, development, and maintenance.Protecting data in copiers and multifunction devices.Copyright infringement incident resolution.Contesting copyright infringement notices. ![]()
0 Comments
Leave a Reply. |