The Computer Incident Reporting Procedure provides a series of channels through which incidents can be reported, investigated, tracked, and administratively reviewed to ensure Temple University information assets and/or infrastructure are protected. The Office of Information Security will be the primary responder to the incidents. Other departments will assist as the need arises.
*AFTER NOTIFYING THE OFFICE OF INFORMATION SECURITY, IT IS ESSENTIAL TO FOLLOW THE INSTRUCTIONS OF THE RESPONSE TEAM. ALL TECHNOLOGY DEVICES MUST NOT BE USED, TURNED OFF OR ON, OR CHANGED IN ANY MANNER THAT MAY COMPROMISE EVIDENCE OR THE INVESTIGATION.
Examples of what type of incidents should be reported appear below:
- Any suspected hacking or intrusion attempts
- Suspicion of a password compromise
- Harassment by e-mail
- Violation of any technology policy