If you become aware of an event that could result in a breach of personally identifiable information (PII), it is critical that you immediately report any information or network security incident to firstname.lastname@example.org using the following recommended actions.
Lost or Stolen Electronic Media or Computing Device
- Personal devices: The IT Service Desk may be able to remotely wipe your device. In addition, once all data has been securely removed, contact your service provider to cancel service for your personal phone. To report lost or stolen electronic media or a computing device, please contact the Department of Public Safety (401-863-3103).
- University-issued mobile phones: If the device was University-issued, notify the Telecommunications Office immediately (email@example.com, 401-863-2007). Telecom will suspend voice services and issue a remote wipe of the device, if applicable.
- Personally identifiable, restricted, regulated, or confidential information: If the lost of stolen electronic media or a computing device was used to store personally identifiable, restricted, regulated, or confidential information, please notify the Information Security Group immediately and complete the Lost/Stolen/Compromised Devices Form, available as a Word document and PDF. ISG will work with you to determine the next steps, and whether the event requires notification.
If you suspect that someone has broken into your computer, please disconnect it from the network and contact the Information Security Group as soon as possible. They will investigate the incident and help you recover your system.
Protected Health Information (PHI)
If any PHI might have been lost, stolen, compromised, misdirected, etc., please notify the Information Security Group at ISG@brown.edu, who will work with you to determine the next steps, and whether the event requires notification.
File an Incident Ticket
In the event of a serious incident, create a new ticket to start the incident response process by visiting https://ithelp.brown.edu/new-ticket) or sending an email to firstname.lastname@example.org. When reporting a possible intrusion, it is helpful if you provide a description of the problem (what happened and when); the computer(s)that was/were affected (names and IP addresses); the actions taken to address this incident; and, any other information or log files that you may have.