07.12.2012 Views

Core Services Catalogue - BCIT

Core Services Catalogue - BCIT

Core Services Catalogue - BCIT

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Customers of this service<br />

Students and Staff:<br />

Everyone should report security incidents involving devices connecting to the<br />

<strong>BCIT</strong> network to the Service Desk. (See customer role section.)<br />

Staff:<br />

System administrators may request security incident investigations.<br />

IT <strong>Services</strong>, Human Resources, Labour Relations, Safety & Security, and<br />

Harassment & Discrimination Mediation may request policy violation<br />

investigations.<br />

Affiliates and other non-<strong>BCIT</strong> groups (e.g. Student Association and<br />

Unions):<br />

Report all security incidents involving tenant or non-<strong>BCIT</strong> computers on the <strong>BCIT</strong><br />

network.<br />

Not included:<br />

Security for personal end devices not connected to the <strong>BCIT</strong> network.<br />

Business process enabled by this service<br />

This service supports the enabling of business at <strong>BCIT</strong> by ensuring that <strong>BCIT</strong><br />

computers are able to run with minimum downtime due to outside influence.<br />

This service is critical as it helps to:<br />

� Prevent downtime due to policy violation<br />

� Prevent data loss, due to viruses and vulnerabilities in the operating<br />

systems<br />

� Reduces potential liability<br />

� Supports risk management for information technologies<br />

Customer role<br />

Contact the Service Desk to report a computer security incident including:<br />

� Theft of equipment (report to <strong>BCIT</strong> Security first)<br />

� Virus infections and malware infestations<br />

� Suspected compromises (i.e. hacking)<br />

Please have the following information available (as appropriate):<br />

� Your name and contact information<br />

� The hostname and IP address of the computer (if applicable)<br />

� The date and time that the incident occurred<br />

� Details of the incident<br />

Enterprise IT Security<br />

Version 5.0 – Effective June 30, 2012 120

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!