Protecting Against Unauthorized Access
Any User who becomes aware of an incident of unauthorized access or/of confidential information must report such to the agency Information Security Officer (ISO), Privacy Officer, or designee as soon as possible.
[Source: ESPSG – Acceptable Use]
Security incidents include, but are not limited to: virus, worm, and Trojan detection, unauthorized use of computer accounts and systems, and improper use of resources as outlined in these standards related to E-mail, Internet, and Acceptable Use.
[Source: ESPSG – Incident Management] |