Report a information security breach or incident
Guidelines for reporting information security breach or incident
Examples of information security incidents:
- Email phishing and spam
- Endangering the processing of personal data
- Spam sent from university email
- Hijacked username and password
- Stolen or lost university smartphone, computer, memory stick or card, external hard drive, document
- Incorrect or unnecessary permissions
- Unauthorised access to protected paper documents or open information security containers
- Publications that harm the university's reputation on social media
- Malware
- Data leaks
- Impersonation
- System intrusion, denial-of-service attack
- Technical malfunctions of the systems
- Copyright and licence violations
- Software vulnerabilities or configuration errors that expose information systems to misuse