All users of the Cave Hill Campus’ IT resources are expected to report abuse or a suspected security compromise of these resources.
An IT security incident is any activity involving Cave Hill resources that:
- Violates the law
- Constitutes harassment
- Violates Cave Hill IT Security policy
- Compromises University data or that of any person
- Involves the unexpected disruption of University services
Reporting an IT security incident
- Report anything unusual. If it sets off a warning in your mind, don’t ignore it!
- Immediately report suspected security incidents and breaches to the IT Service Desk. Be sure to indicate whether sensitive information (such as student grades, staff Personal Information) may be at risk.
- If you think your computer has been compromised or someone might be accessing your computer remotely without your permission, it is recommended that you unplug the network cable or turn off the wireless and leave the computer on until help arrives.
Theft of Computing Equipment
Report suspected theft of Campus owned IT resources to the
Campus Security Services department in addition to notifying the
IT Service Desk.
Reporting Spam and Phishing
Spam and phishing complaints should be sent to the IT Service Desk. For more information about spam and how to reduce it, please visit:
Spam, Scams and Phishing (PDF)