Issuing Authority and Effective Date
Effective Date: November 21, 2011
Date Last Reviewed: July 6, 2022
Issuing Authority: Chief Information Security Officer
Information Security Reporting Procedures
The Computer Incident Reporting Procedure provides a series of channels through which incidents can be reported, investigated, tracked, and administratively reviewed to ensure Temple University information assets and/or infrastructure are protected. The Office of Information Security will be the primary responder to the incidents. Other departments will assist as the need arises.
*AFTER NOTIFYING THE OFFICE OF INFORMATION SECURITY, IT IS ESSENTIAL TO FOLLOW THE INSTRUCTIONS OF THE RESPONSE TEAM. ALL TECHNOLOGY DEVICES MUST NOT BE USED, TURNED OFF OR ON, OR CHANGED IN ANY MANNER THAT MAY COMPROMISE EVIDENCE OR THE INVESTIGATION.
Examples of what type of incidents should be reported appear below:
- Any suspected hacking or intrusion attempts
- Suspicion of a password compromise
- Harassment by e-mail
- Violation of any technology policy
Critical Issues
- Critical issues should be reported immediately to your manager and the Office of Information Security and Privacy via phone. Follow the contact list below for the Office of Information Security.
- Critical issues involving notification of an intrusion from our Intrusion Detection Systems or Network logging facilities should be brought to the attention of the Office of Information Security and Privacy immediately.
The Office of Information Security and Privacy Contact Information:
- Office of Information Security and Privacy – Sheena Thomas, 215-204-4070 or infosec@temple.edu
- Escalation for all of Information Technology Services – Larry Brandolph, Vice President for Information Technology and University Privacy Officer, 215-204-7077 or larry.brandolph@temple.edu