Who should be contacted in the event of a security breach or suspected security breach?
The Information Security Office must be informed when there is a breach or suspected security breach of information security. This is particularly important when protected health information may be involved. Procedures for how to appropriately respond to a suspected computer compromise can be found at the following location: Procedure for Responding to a Compromised Computer http://www.cmu.edu/iso/governance/procedures/first-respond.