Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

(E.g., a server/laptop/desktop was breached/stolen/lost in <school or location>)

Wiki MarkupExample: In December 2004, campus officials were notified of the theft of an \ [department name\] laptop computer

Example: . . . an on-campus server containing data on University international students was a target of computer hacking. As a result, these data were downloaded from the machine.

...

What data was potentially compromised?

Wiki MarkupExample: This computer contained a list of \ [department\] student employees. The list included the names and Social Security Numbers of the students.

Example: The data fields downloaded were: name, telephone number, University email address (if one was registered), social security number, date of birth, University identification number, passport number, city and country of birth, country of citizenship, school and department, degree sought, major field, University employee identification number (if employed at the University), non-immigration classification (e.g., F-1, J-1, etc.), and local and permanent address. Not all of these fields were filled for every student. It is also probable that a small number of students included in the database were domestic students who had been identified as international students prior to verification.

...

  • Obtain and carefully review credit reports. Order free credits reports from all three credit agencies by going to the website at [http://www.annualcreditreport.com/|http://www.annualcreditreport.com/] or by calling 877-322-8228.
  • Review bank and credit card statements regularly, and look for unusual or suspicious activities.
  • Contact appropriate financial institutions immediately upon noticing any irregularity in a credit report or account.

...