Policy (open access)
All authorized users have an interest in the security of the computer resources at Georgia Southern University, and share in the responsibility for protection of those resources, prevention of problems, and incident detection and response. The purpose of this document is to describe the general procedures that will be followed in response to a security incident involving University resources. Cooperation of personnel with these procedures is mandatory. A security incident is defined as a threat to the legitimate use and/or operation of any University computing resource as defined in the Computer Use Policies, or the actual occurrence of any situation identified as a potential risk to those resources. Threats may be internally or externally generated.
Vice President of Information Technology
"Incident Response Procedures - IT-3110-00" (2002). Information Technology Services. 8.