Technology Security Incident Report

Report a security incident. Example incidents include, but are not limited to:

  • compromised passwords, accounts, or data
  • theft or loss of any university technology resource, or any hardware containing university data
  • infected computers (viruses, malware, rootkits)
  • data / information accessed or accessible by unauthorized individuals, or collected/stored in inappropriate locations
  • unlawful activity, including internal or external hacking or denial of service
  • U of I policy or standard violations

If you aren't sure if something is a security incident we still ask that you report it for confirmation. Per IETF RFC 2142, we can also be reached at security@uidaho.edu. For emergency or after-hours response, leave a message at 208-885-1060.

No fee is associated with this service. This service is provided to students, faculty, staff and departments at the University of Idaho.

To report spam or phishing email messages, please see How do I report a phishing message? If you provided credentials on page linked from within a phishing email, please change your password right away and report the incident with this form.

 

 
Request Service

Related Articles (9)

Overview, FAQ, and change log of the data security standards
List of vendors and manufacturers U of I is NOT allowed to purchase from. This list comes from the US Department of Defense.
What to do about spam. Some people and business indiscriminately send large amounts of unsolicited commercial email (UCE). In recent years, spam content has expanded to include offensive advertising, malicious content and computer viruses.
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
Information about and helpful tips on identifying phishing emails.
This article contains information about Whole Disk Encryption at U of I.
Answers to frequently asked questions about Whole Disk Encryption.
This article explains the why and how for implementing different security measures for your account and computer.

Attachments (0)

No files found.