Approved by President’s Cabinet 7-30-14
This policy addresses IT incident response issues involving the college's IT resources. The policies and procedures listed in this document provide a mechanism for East Georgia State College faculty, staff and students to report any potential IT-related security incidents.
IT Resource: A system or application that consists of computer hardware, software, networking equipment, and any data on these systems. Such assets include but are not necessarily limited to desktop computers, servers, printers, telephones, network infrastructure, E-mail and web based services.
Security Incident: An incident meeting one or more of the following conditions:
- Any potential violation of Federal law, Georgia law or East Georgia State College Policy or Plan involving an East Georgia State College IT Resource.
- A breach, attempted breach or other Unauthorized Access of an East Georgia State College Information Technology Resource. The incident may originate from inside the East Georgia State College network or via an outside entity.
- Internet worms, Trojans, viruses and similar destructive files/services
- Any action and/or conduct using in whole or in part an East Georgia State College Information Technology Resource which could be construed as harassing, or in violation of any East Georgia State College policy or state/federal regulation.
Unauthorized Access: Any action or attempt to utilize, alter or degrade an IT resource owned or operated by East Georgia State College in a manner inconsistent with the college policies.
III. Reporting and Response Procedures
All incidents involving East Georgia State College's IT resources will be handled via the following procedures:
- Department or Division Manager will be notified of incident.
- Department or Division manager will communicate incident to Vice President of IT. If it is unclear as to whether an issue/situation should be considered an IT security incident, the Department or Division manager should contact the Vice President for IT for assistance.
- The Vice President for IT, Department or Division Manager will communicate incident to college's senior administration. The college's Human Resources Officer, and if necessary, the college's campus security office will also be notified of incident.
- Depending on scope of incident, the USG Information Technology Services(ITS) will also be contacted.
- If warranted, local law enforcement officials will be notified.
- All issues (cause, scope, resolution) relating to the security breach incident will be documented by and retained in the offices of the college's senior administration. Any costs associated with the security breach will also be documented.
- Individuals (faculty, staff or student), who report a breach of security incident will receive appropriate feedback and updates regarding the incident from one or more of the following areas: college's senior administration; human resources department; campus security department; department / division manager; VP for IT.
- Individuals reporting a breach of security incident will be assured of confidentially, and if necessary, appropriate protection.
Additional items regarding Reporting and Response:
With the exception of items listed below, it is imperative that any investigative or corrective action be performed ONLY by a member of East Georgia State College's IT Department.
When faced with a potential IT-related security situation, faculty and staff should do the following:
- If the incident involves a compromised computer system, do not alter the state of the computer system. The computer system should remain powered on and all currently running computer programs should be left as is. Do not power down the computer or restart the computer.
- Immediately disconnect the computer/laptop or other IT connected device from the campus network by removing the patch cable from the back of the computer. If the computer, laptop or device is utilizing wireless network connectivity, the system's wireless network hardware should be disabled via the Network Settings in the Control Panel or via the appropriate system configuration tool.
Revision history: July 2014