• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Bloomington Indiana University Bloomington IU Bloomington

Menu
Open Search

The College of Arts & Sciences


Information Technology Support in The College

  • About Us
  • Support Request
    • Chem ITG
    • Zone 4 (CITO)
    • Footprints (PBS)
    • IT Incident
    • By Zone or Department
    • Zoom Support
    • Kaltura Support
    • Canvas Support
    • Help Me Decide
  • Storage
    • IU Box Retirement
    • IU Box Migration Dashboard
    • Storage @ IU
    • Cloud Storage
    • OneDrive
    • Google Drive
    • Geode
    • Scholarly Data Archive (SDA)
    • Unit File Servers
    • Critical Data Infrastructure
  • Security
    • IT Policies
    • Data Classifications
    • HIPAA
    • FERPA
    • SecureMyResearch Cookbook
    • Compliance Lookup Tool
    • Acceptable Use Agreement
  • Services
    • Linux Administration – Landscape
    • Future Development
  • Software
    • Software and Services Selection Process Form
    • OriginPro
  • Resources
    • Zoom/Canvas Solutions
    • COVID-19
    • Faculty IT Advisory Council
    • Faculty Tech Guide
    • For IT Pros
    • High Performance Computing (HPC)
    • IT Outages/Construction Alerts
    • One.IU
    • IUware
    • IUanyWare
    • IU Knowledge Base
    • IU Fax
    • Campus Networks Speedtest
  • Contact Us
    • By Zone or Department
    • IT People
    • College Technology Leadership Team (CTLT)
    • CoAS Storage Architect
  • Search
  • IT Notices
  • Anonymous Feedback
Box READ ONLY on March 1
  • Home
  • IU’s Process for Handling Compromised Accounts, Explained

IU’s Process for Handling Compromised Accounts, Explained

April 6, 2016

Spotlight Image

Have you ever wondered what IU does when university email accounts are hacked? Well, we’ve got answers.

Upon receiving an incident report, the University Information Policy Office (UIPO) incident response team will follow the incident response procedures. As a general practice, the UIPO will attempt to immediately sever access by any unauthorized users to the compromised IU network accounts or resources.

Learn more >>


Previous
Next
  • The College of Arts & Sciences
  • COLL+IT

The College of Arts & Sciences

Indiana University

Accessibility | Privacy Notice | Copyright © 2021 The Trustees of Indiana University

  • About Us
  • Support Request
    • Chem ITG
    • Zone 4 (CITO)
    • Footprints (PBS)
    • IT Incident
    • By Zone or Department
    • Zoom Support
    • Kaltura Support
    • Canvas Support
    • Help Me Decide
  • Storage
    • IU Box Retirement
    • IU Box Migration Dashboard
    • Storage @ IU
    • Cloud Storage
    • OneDrive
    • Google Drive
    • Geode
    • Scholarly Data Archive (SDA)
    • Unit File Servers
    • Critical Data Infrastructure
  • Security
    • IT Policies
    • Data Classifications
    • HIPAA
    • FERPA
    • SecureMyResearch Cookbook
    • Compliance Lookup Tool
    • Acceptable Use Agreement
  • Services
    • Linux Administration – Landscape
    • Future Development
  • Software
    • Software and Services Selection Process Form
    • OriginPro
  • Resources
    • Zoom/Canvas Solutions
    • COVID-19
    • Faculty IT Advisory Council
    • Faculty Tech Guide
    • For IT Pros
    • High Performance Computing (HPC)
    • IT Outages/Construction Alerts
    • One.IU
    • IUware
    • IUanyWare
    • IU Knowledge Base
    • IU Fax
    • Campus Networks Speedtest
  • Contact Us
    • By Zone or Department
    • IT People
    • College Technology Leadership Team (CTLT)
    • CoAS Storage Architect

The College of Arts & Sciences