Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Who should be contacted in the event of a security breach or suspected security breach?

breach contacted event security
0
Posted

Who should be contacted in the event of a security breach or suspected security breach?

0

The Information Security Office must be informed when there is a breach or suspected security breach of information security. This is particularly important when protected health information may be involved. Procedures for how to appropriately respond to a suspected computer compromise can be found at the following location: Procedure for Responding to a Compromised Computer http://www.cmu.edu/iso/governance/procedures/first-respond.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123