May 27, 2017


Incident Handling

In general, types of activity that are commonly recognized as being in violation of a typical security policy include but are not limited to attempts (either failed or successful) to gain unauthorized access to a system or its data, including PII related incidents (link to the below description) unwanted disruption or denial of service the unauthorized use of a system for processing or storing data changes to system hardware, firmware, or software characteristics without the owner’s knowledge, instruction, or consent.

We encourage you to report any activities that you feel meet the criteria for an incident. Note that our policy is to keep any information specific to your site confidential unless we receive your permission to release that information. In particular, CamCERT responds to incidents as follows: