Report Security Incident

University Workforce must report the following to OU IT Security immediately: 

  1. any event in which access to University data might have been gained by an unauthorized person 
  2. any event in which a device containing University information has (or might have been) lost, stolen or infected with malicious software
 
  1. any event in which an account belonging to a person that has access to the data might have been compromised or the password shared with unauthorized person (responding to phishing emails, someone shoulder surfing, and writing down your password, etc.) 
  2. any attempt to physically enter or break into a secure area where University data is or might be stored 
  3. any other event in which University data has been or might have been lost or stolen 
  4. any event in which University information system policies, standards, or practices are violate

Cost

There are no costs associated with this service.

Availability

This service is available to all Faculty, Staff and Students at all OU campus locations.

Additional Information

Next Steps for Individuals

  • First, DO NOT TURN OFF OR UNPLUG POWER TO THE COMPUTER.
  • Second, unplug the network cable from the back of the computer and turn off any wireless internet connection.
  • Following the report, follow any additional directions provided by IT Support staff or IT Security to repair the system, restore service, and preserve evidence of the incident.

Service Alerts

Check Alerts Subscribe

Can't find what you're looking for?

Contact Us

 
 
Submit Report

Related Articles (3)

This Security Incident Management Policy establishes the standardized process for identifying, containing, eradicating, and recovering from security incident. It establishes the basic language to discuss such incidents, identifies roles and responsibilities involved in responding to and recovering from these incidents, and provides a playbook for handling these events from the time an event is detected to the post incident report and event closing.
This Cybersecurity Incident Response Plan establishes the procedures for identifying, reporting, and responding to a cybersecurity event. It establishes the basic language to discuss such events, identifies roles and responsibilities involved in responding to and recovering from these events, and provides a playbook for handling these events from the time an event is detected to the post incident report and event closing.
This guide is for the user or owner of a OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).