Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. Security breaches can take several forms. The best defense against security breaches are conscientious and alert users. You are the most important person for early detection and prevention. Examples of breaches include:

  • Damage to equipment, facilities or utilities.
  • Loss or misplacement of media (e.g. disks, tapes, paper) containing confidential/highly restricted information.
  • Inappropriate use of the computing environment.
  • Unauthorized access or attempted unauthorized access to information or computing resources.

If you discover a security breach, you should report the breach to your Information Security Officer or manager immediately.