Workforce members must promptly report an unforeseen event, a potential or confirmed breach of personal data, or an information security incident. Reporting information security issues is necessary to protect our computer systems, network, and data. Seemingly harmless actions can compromise patient, student, and other confidential data.
Examples of Information Security Issues
- Data breach or unauthorized access to UWSOD data
- Use of cloud software or services not covered by UW legal agreements
- Installation and use of software not related to School of Dentistry work
- Passwords shared or left in obvious locations
- Computers left unlocked while unattended
- Alteration of UW School of Dentistry installed software
- Use of another person’s axiUm card or login credentials
- Stolen or lost computer, hard drive, or other media
Guide for Reporting Security Issues
All incidents must be reported to the IT Director, or Compliance Director if IT Director is not available. Contact sodit@uw,edu, the Director of Information Technology at 206-221-4007, or the Director of Compliance at 206-543-5331, email@example.com.
All incidents will be assessed and if the assessment reveals that an incident did not pose any risk of compromise, then the incident will be in the IT service desk request tool and evaluated for remediation, where necessary.
If the incident involves a potential or confirmed breach of confidential or protected data, the IT Director and/or the Compliance director will notify the responsible UW office(s), and follow the incident response plans provided by those offices as indicated in UW Administrative Policy Statement 2.5.
Any reported incidents will be investigated by the Compliance Director, IT Director, and other appropriate UW security, privacy, or compliance offices. Any intentional or repeated violations may result in corrective action.
If a virus, malware or other system compromise is confirmed:
- The computer must be removed from network, but no further action should be taken except on direction of IT Director, Compliance Director, or investigative entity
- The IT technician working on computer must immediately change all network passwords used to access the computer
- User for whom machine belongs needs to change all network passwords used to access the computer
- Depending on the level of infection or compromise, the computer may not be returned to service until the drive is completely reformatted and system software reinstalled to base standards