[fusion_builder_container background_color=”#f4f6f8″ background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”#f4f6f8″ border_style=”solid” padding_top=”20″ padding_bottom=”20″ padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_text]

If you become aware of an event that could result in a breach of personally identifiable information, it is critical that you immediately report any information or network security incident as quickly as possible. The speed with which the campus can respond to an incident can limit the damage and minimize the cost of recovery.
When you report an incident, please provide as much information as possible including:
  • Your name
  • Department
  • Email address
  • Telephone number
  • Description of the information security problem
  • Date and time the problem was first noticed (if possible)
  • Any other known resources affected

Include specific details that indicate a system breach, vulnerability, or compromise of your computer.  The Information Security & Policy team will respond to the reported incident with a plan for further containment and mitigation.
[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_accordion divider_line=”” class=”” id=””][fusion_toggle title=”What is a Security Incident?” open=”no”]A security incident is attempted or actual:

  • Unauthorized access, use, disclosure, modification, or destruction of information
  • Interference with information technology operation
  • Violation of campus policy, laws or regulations

Examples of security incidents include:

  • Computer system intrusion
  • Unauthorized access to, or use of, systems, software, or data
  • Unauthorized changes to systems, software, or data
  • Loss or theft of equipment used to store or work with sensitive university data
    • Personal devices:
      The IT Help Desk may be able to remotely wipe your device. In addition, once all data has been securely removed, contact your service provider to cancel service for your personal phone. To report lost or stolen electronic media or a computing device, please contact the Department of Public Safety (Brooklyn | Post).
    • University-issued mobile phones:
      If the device was University-issued, notify the IT Office immediately. We will suspend voice services and issue a remote wipe of the device, if applicable.
    • Personally identifiable, restricted, regulated, or confidential information:
      If the lost of stolen electronic media or a computing device was used to store personally identifiable, restricted, regulated, or confidential information, please notify IT immediately. We will work with you to determine the next steps, and whether the event requires notification.
  • Denial of service attack
  • Interference with the intended use of IT resources
  • Compromised user accounts

[/fusion_toggle][fusion_toggle title=”What should I do if I suspect a serious Security Incident?” open=”no”]A security incident is considered serious if the campus is impacted by one or more of the following:

  • potential unauthorized disclosure of sensitive information
  • serious legal consequences
  • severe disruption to critical services
  • active threats
  • is widespread
  • is likely to raise public interest

Sensitive information is defined as personally identifiable information that is protected by laws and regulations, as well as confidential research protected by data use agreements, such as:

  • Social security number
  • Credit card number
  • Driver’s license number
  • Student records
  • Protected health information (PHI)
  • Human subject research
If you know or suspect that the compromised system contains sensitive data, please take these steps to respond:

  • Do not attempt to investigate or remediate the compromise on your own
  • Instruct any users to stop work on the system immediately
  • Do not power down the machine
  • Remove the system from the network by unplugging the network cable or disconnecting from the wireless network
  • Report the incident using the instructions above

In the case of a serious incident, please be aware that continued interaction with a compromised machine can severely affect later forensic analysis.

[/fusion_toggle][fusion_toggle title=”How do I report Computer or Network Misuse?” open=”no”]A security incident may also refer to inappropriate use of computers and the campus network.  Common violations and examples of misuse include:

  • Communications for commercial or political marketing purposes
  • Email spam
  • Copyright infringement allegations
For information about how to respond to online copyright infringement allegations, see the following list of resources:  The Copyright ACT and Related Information

[/fusion_toggle][/fusion_accordion][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”yes” overflow=”visible” margin_top=”1%” margin_bottom=”1%” background_color=”rgba(255,255,255,0)” padding_right=”30px” padding_left=”30px” ][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_separator style_type=”none” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_text]

File an Incident Ticket

In the event of a serious incident, create a new ticket to start the incident response process by filling out the report form or sending an email to it@liu.edu. When reporting a possible intrusion, it is helpful if you provide a description of the problem (what happened and when); the computer(s)that was/were affected (names and IP addresses); the actions taken to address this incident; and, any other information or log files that you may have.[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”2_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_text][gravityform id=”1″ title=”false” description=”false”][/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_6″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]