ICT Best Practises - Immediately report any successful or attempted security breach to the DICTS
You are here
In order to adequately respond to successful or attempted security breaches at the university, managers and technicians should immediately report such events to the UISO. Upon receiving a report of a successful breach, DICTS will:
- Minimally, file the report for future reference.
- Ensure that all logs and other information are protected from loss or damage.
- Immediately assess actual or potential disclosure or inappropriate access to institutional or personal information.
- Report the situation to the Network, Systems and Database Units through helpme@dicts.mak.ac.ug and these will be routed to the responsible managers to analyse
- Assign the incident to a security analyst or technician within the DICTS unit.
- Provide advice or comment to the functional unit technician as necessary.
- Warn other Makerere University technicians if it appears that the situation has the potential to affect other University systems as well.
- Consult with functional unit technicians and management, University Counsel, law enforcement, and other agencies as required.
- Perform or assist in any subsequent investigation and/or perform computer forensics.
Category: