Possible Sensitive Information Security Breach Handling Information

Overview of Security Breach Handling and required call information

[Doc 24143 content is unavailable at this time.]


Service Description

The UW-Madison Information Incident Reporting Policy requires the reporting of an incident where there is a reasonable belief that unauthorized persons may have accessed sensitive information held by the UW-Madison, such as Social Security numbers, personal health information, and student data.

Agents are NOT expected to validate breach incidents.

For details, see Help Desk - Security Breaches.

Support Conditions

  • Service Users: UW Madison Faculty, Staff and Students
  • Availability: N/A
  • Server Information: N/A
  • Unique Support Conditions: Per UW Madison campus policy, anyone reporting the loss of University Sensitive data will call the DoIT Help Desk. Help Desk Agents will gather required call information to forward to HDQA.

Creating WiscIT Incidents

Select an appropriate service, category and subcategory from the options below.

  • Incident Response and Investigations

    • BadgIRT
      • Submit Incident

Required call information (other than the usual problem symptom, troubleshooting and contact info, etc):

NOTE: There are two types of possible breaches: Physical or Logical. Gather the required handling information based on the specific type reported as noted below:

Type 1: Physical - includes incidents such as the loss of a laptop, theft of computer equipment, etc.

  • If the device is a UW device, ask caller to contact UW Police at (608) 264-COPS or (608) 264-2677,  as well as their local police unit.
  • If customer has a police number or case, include that in the call.
  • If the customer has not reported the loss/theft, advise him/her to report it:
Inform customer to expect an acknowledgment from Campus Information Security within 1 business day.

Type 2: Logical - includes incidents such as sensitive information accidentally released on Google, an attacker gaining unauthorized access to a server or application processing/storing sensitive information, etc.

Inform customer to expect an acknowledgment from Campus Information Security or DoIT service provider within 4 hours.

HDQA Procedure for Handling a Confirmed Security Breach

Business Hours Procedure:

  1. Determine the type of security breach (Type 1 or Type 2) from the descriptions above.

  2. Gather the relevant handling information for the type of security breach, entering the information in a Journal Note and NOT in the Description field (This is so the details of the security breach are kept internal).

  3. Please use the following flowchart to complete the handling procedure:

    updated_security_breach-workflow

After-Hours Procedure:

It is standard protocol that OCIS contact the Help Desk in the event of a security breach after normal business hours (as opposed to a customer contacting us during normal business hours).

Thus, after-hours handling of a security breach should be handled in the same manner as normal business hours handling. Please refer to the procedure listed above for handling.

 



Keywords:
threat handling HDI steps incident security breach theft loss hdqa quality assurance exposure i-Sight isight
Doc ID:
24063
Owned by:
Wanjiru P. in DoIT Help Desk
Created:
2012-04-27
Updated:
2024-10-31
Sites:
DoITHelpDesk-internal, hd-cps-internal, SNCC-internal