Immaculata University IT Security Incident Response Plan
Immaculata University IT Security Incident Response Plan
Immaculata University IT Security Incident Response Plan
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Wherever possible and in conjunction with the application of other IU policies relating toinformation security, IU will undertake to prevent Data <strong>Security</strong> <strong>Incident</strong>s by monitoringand scanning its own network for anomalies, and developing clear protection proceduresfor the configuration of its Information Technology and other related resources.VIII. MODIFICATIONS AND ADJUSTMENTSThis <strong>Plan</strong> and its procedures will be reviewed periodically to adjust processes, identifynew risks and remediations.IX.SPECIAL S<strong>IT</strong>UATIONS/EXCEPTIONSAny personally-owned devices, such as PDAs, phones, wireless devices or otherelectronic transmitters which have been used to store Institutional Data and aredetermined to have contributed to a Data <strong>Security</strong> <strong>Incident</strong>, may be subject to seizureand retention by IU authorities until the Data <strong>Security</strong> <strong>Incident</strong> has been remediated,unless the custody of these devices is required as evidence for a court case. By usingthese devices within the IU network for business purposes, individuals are subject to IUpolicies restricting their use such as the IU Acceptable Use Policy.DM3\956481.7-5-