11.07.2015 Views

Immaculata University IT Security Incident Response Plan

Immaculata University IT Security Incident Response Plan

Immaculata University IT Security Incident Response Plan

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Wherever possible and in conjunction with the application of other IU policies relating toinformation security, IU will undertake to prevent Data <strong>Security</strong> <strong>Incident</strong>s by monitoringand scanning its own network for anomalies, and developing clear protection proceduresfor the configuration of its Information Technology and other related resources.VIII. MODIFICATIONS AND ADJUSTMENTSThis <strong>Plan</strong> and its procedures will be reviewed periodically to adjust processes, identifynew risks and remediations.IX.SPECIAL S<strong>IT</strong>UATIONS/EXCEPTIONSAny personally-owned devices, such as PDAs, phones, wireless devices or otherelectronic transmitters which have been used to store Institutional Data and aredetermined to have contributed to a Data <strong>Security</strong> <strong>Incident</strong>, may be subject to seizureand retention by IU authorities until the Data <strong>Security</strong> <strong>Incident</strong> has been remediated,unless the custody of these devices is required as evidence for a court case. By usingthese devices within the IU network for business purposes, individuals are subject to IUpolicies restricting their use such as the IU Acceptable Use Policy.DM3\956481.7-5-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!