Information Security Incident Policy and Procedure
How to report an Information Security Incident
During normal working hours:
You should immediately report the incident by phone to the IT Helpdesk on +44 (0)114 222 1111. Do not leave a voicemail or email.
Outside of normal working hours:
Contact University Security on +44 (0)114 222 4085.
Upon being contacted IT staff will follow our Information Security Incident Procedure to ensure that the incident is properly managed and recorded.
Types of Incident
An Information Security Incident is any occurrence observed or suspected that involves:
- unauthorised access or damage to or originating from any computer system that is owned or managed by the University of Sheffield
- unauthorised access, loss or damage to information that is owned or managed by the University of Sheffield
- violation of information security policies
An information security incident may involve access, loss or damage to information or computer systems that is actual, suspected, threatened, or potential.
Examples of Information Security Incidents include:
- potential security breaches - such as unpatched systems, failure to follow procedure or unusual authentication systems
- compromised systems - such as hacked servers, virus outbreaks
- compromised accounts - such as stolen passwords
- loss of information - such as a lost or stolen laptops
- breach of policy - such as the Information Security policy, IT Code of Practice or Data Protection policy
Misuse of computing facilities (as defined by the IT Code of Practice) that does not constitute an urgent Security Incident should be reported to the Department Director (email email@example.com).