Brown University

Procedures for Emergency Data Requests, Computing Incidents & Copyright Complaints

The Information Security Group (ISG) is the prime contact for security breaches, which include but are not limited to:

  • Security attacks that compromise a personal computer
  • Compromises of Brown's computing systems or its network
  • Loss of personally identifiable, restricted, regulated, or confidential information
  • Computing activities that do not comply with established policies, including copyright infringement, harassment of others via email, breaching another's privacy, or capturing other users' passwords, as specified in Brown's Acceptable Use Policy

Following is an evolving list of resources to assist the IT professional in managing urgent information requests and incidents.

Emergency Email / Data Access Request Procedures:

Incident Response Procedures:
» Incident Handling & Analysis Report | Request Privileged Access | Request Release of Student Computing Data

Managing Copyright Complaints:

For major security incidents, please follow the instructions on the Reporting an Incident page, which includes a link to filing a Remedy ticket online. Please contact with any questions.