Makerere University

Enter a keyword or two into the search box above and click search..

ICT Best Practises - Immediately report any successful or attempted security breach to the DICTS

You are here

In order to adequately respond to successful or attempted security breaches at the university, managers and technicians should immediately report such events to the UISO. Upon receiving a report of a successful breach, DICTS will:

  • Minimally, file the report for future reference.
  • Ensure that all logs and other information are protected from loss or damage.
  • Immediately assess actual or potential disclosure or inappropriate access to institutional or personal information.
  • Report the situation to the Network, Systems and Database Units through and these will be routed to the responsible managers to analyse
  • Assign the incident to a security analyst or technician within the DICTS unit.
  • Provide advice or comment to the functional unit technician as necessary.
  • Warn other Makerere University technicians if it appears that the situation has the potential to affect other University systems as well.
  • Consult with functional unit technicians and management, University Counsel, law enforcement, and other agencies as required.
  • Perform or assist in any subsequent investigation and/or perform computer forensics.