Incident Reporting
Information Security Incident Reporting Procedures
Purpose
Information Technology is a critical component of the University’s academic, research, and administrative functions. Despite efforts to minimize risks, Information Security Incidents will occur that jeopardize the confidentiality, integrity, and availability of these resources. Prompt notification of observed or suspected Information Security Incidents will lessen the impact on systems, services, and people.
Scope
These procedures should be used by all Users accessing the University’s IT Resources, and Users supporting the University’s mission, regardless of location or Information System ownership.
Procedures
Users are the University’s first line of defense, and recognizing Information Security Incidents is the responsibility of all Users. For a list of example Information Security Incident types, review Appendix A: Information Security Incident Examples. Users must report observed or suspected Information Security Incidents to the designated Information Security resources listed below.
- Urgent Reporting
- An Information Security Incident is in progress, affecting University systems and services, or sensitive Data may be compromised.
- Call the CCIT Support Center at 864-656-3494
- Available 24x7x365 for immediate response
- An Information Security Incident is in progress, affecting University systems and services, or sensitive Data may be compromised.
- Normal Reporting
- Unusual/suspicious activity or general questions.
- Email the CCIT Support Center at ithelp@clemson.edu
- Available during normal business hours with a response typically within 24 hours
- Unusual/suspicious activity or general questions.
- Anonymous Reporting
- Available via the University’s Ethics and Safety Hotline at 1-877-503-7283 or by completing the online form at http://www.lighthouse-services.com/clemson.
- Details regarding this service can be found at https://www.clemson.edu/administration/internalaudit/ethicsline.html.
When reporting Information Security Incidents, include as much information as possible, such as:
-
- Information Systems involved
- User Accounts and people affected
- Physical location the Information Security Incident was observed
- Time and date the Information Security Incident occurred
Additional Resources:
Information Security Policy
Acceptable Use Policy
Approval & Revision History:
Reviewed: 10/19/2023
Reviewed by: Office of Information Security
Appendix A:
This list is not all inclusive but is intended to provide an understanding of Security Incident types.
Incident Category
|
Definition
|
Examples
|
---|---|---|
Confidentiality | Actual or suspected loss, unauthorized use, or disclosure of confidential Information. |
|
Integrity | Corruption of Information such that it is no longer accurate. |
|
Availability | Inability to access Information for any reason. |
|
Intrusion | An actual, suspected, or attempted Information System intrusion, Information Security weakness, or unauthorized access of IT Resources. This includes the identification of an Information Security weakness that may facilitate an intrusion. |
|
Policy Violations | Improper usage of Computer Networks or Computing Devices, disregard of policies and standards, or misrepresentation of facts which put Information Security at risk. |
|
Vulnerability | Defensive measures in an Information System that are diminished, compromised, or lacking. |
|