Quick Start
Available to: Students, Faculty, Researchers, Staff, Departments, IT Professionals
Cost: No charge for most cases. In certain large scale incidents, some business units might be asked to help defer the costs of external services, such as credit monitoring and notification services.
Information Security manages and maintains the Cyber Incident Response Policy for incidents and events involving loss of data that includes sensitive and protected information such as social security numbers, credit card numbers, or any data classified as internal use, confidential, or restricted use. For a complete listing of data classified as sensitive, please see the BU Data Classification Guide.
Getting Started
- Security is everyone’s responsibility. If you see anything that suggests we may have a cybersecurity incident or event, contact the IT Help Center
- If you suspect a cybersecurity incident or event, DO NOT power off, log in to, continue to use, or alter any system unless directed to do so by the Incident Response Team (IRT)
Benefits
Having an approved, documented procedure is crucial for handling potential data loss incidents properly. In the unfortunate event where such information may have been accessed by unauthorized individuals, there are regulatory requirements to which the University must adhere.
Key Features
- IRT (BU Information Security Incident Response Team) – Coordinates the technical response to cybersecurity incidents at the University
- CISO (Chief Information Security Officer) – The Chief Information Security Officer is responsible for defining a cross-functional Senior Incident Management Team (SIMT) of university leadership that will provide oversight and be able to bring additional resources to aid in response during a major incident.
- The First Responder Checklist – Provides guidance to the first people to observe indicators that a security issue may be occurring
What to Expect
This service is available 24 hours a day, 7 days a week.
Incidents are triaged according to the severity of the incident. Some factors that contribute to severity are:
- Safety concerns for people and buildings
- Loss or exposure of personal or institutional data
- Violation of laws and contracts
- Interruption of service to a community
- The size of the affected community
Requirements
Anyone can and should report a suspected data breach incident.
