Security - Report an Incident


A security incident is a threat or possible compromise involving university internal, restricted, or highly-restricted data. For examples of these data types, please refer to:

If you have experienced what you think is a possible security incident, you must report it immediately by clicking on the Report Security Issue button on this page, and submitting the form to report an issue.

Examples of known or suspected security incidents that must be reported:

  • Attempts (failed or successful) to gain unauthorized access to a system or its data.
  • Giving your username and password to someone else.
  • Loss of printed information that is not public.
  • Loss of a physical storage device containing data that is not public (e.g. a flash drive, an external hard drive, a laptop with such data on its hard drive).
  • A virus or malware infection of an institutional computer.

Service Level Agreement: 1 business day


This service and policy only applies to ISU data, ISU owned devices, or any devices connected to the ISU secure network.


You will need to provide the following information:

  1. Description of the incident.
  2. Location of the incident
  3. Type of network connection (if any).
  4. ISU System Name.
  5. Type of data involved such as:
    1. credit card
    2. personal information, such as social security number, passport ID, drivers licences.
    3. personal health information
    4. Any other type of information
Report Security Issue

Related Articles (5)

This article describes how to connect your device to the ISU-SECURE network. These steps should be followed by students, faculty, staff and anyone with an Indiana State University account provided by a campus sponsor. This is a secure network and is the preferred network to be used by students, faculty and staff conducting Indiana State University business.
Office 365 Message Encryption allows ISU email users to send secure protected emails with individuals outside of the University. This can be important to ensure messages securely reach the intended recipient, especially if sensitive data is included.
Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.


Service ID: 26161
Mon 2/19/18 9:48 AM
Tue 11/7/23 9:31 AM