Kaleidoscope class canceled today
Due to inclement weather, all March 25 Kaleidoscope classes have been canceled.
Due to inclement weather, all March 25 Kaleidoscope classes have been canceled.
It is the objective of the college to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations, the Incident Response Team is responsible for a coordinated response to a breach or potential compromise of systems or data. This incident response plan provides guidance for identification, containment, notification, verification, communication, investigation, and remediation of such incidents.
Any college employee or any other person or entity who believes a breach or potential compromise (electronic or physical) of any type or form of system or data has occurred is required to adhere to the steps outlined in this plan.
It is imperative that prior to an incident occurring, adequate protections are put in place to ensure the continuity of business operations before, during, and following the detection of a data security incident. The Information Technology Services department has taken steps to perform ongoing monitoring and detection of college information technology systems and developed the following procedures in effort to minimize the impacts when security events occur. Upon verification of a security incident, steps are taken to neutralize the incident – which in many cases will result in processing delays or system outages – however, these effects are minimized through the coordinated response efforts. In the event of a significant incident (as determined by the incident response team), it may become necessary to enact a full recovery by initiating the disaster recovery process.
Identification of a breach or potential compromise of data is the first step in an incident response. Identification can occur by, but is not limited to, the following:
Containment is the next critical step to limit exposure, preserve potential evidence, and prepare for an investigation of the incident.
Containment steps include:
In the event of a breach or potential compromise of data, notification of the appropriate Augustana personnel will ensure a coordinated and unified response in determining the scope of the breach, business continuity, internal and external communications, and remediation. Notification must be made to the ITS department (309-794-7293) during normal business hours. Do not leave a voicemail message if the call goes unanswered. If the call is not answered or it is being made outside of normal business hours, contact the Office of Public Safety at 309-794-7000 who will notify members of the Incident Response Team. An email notification should also be sent to Helpdesk@Augustana.edu.
The Incident Response Team will be comprised of representation from ITS, Finance, General Counsel, and Marketing / Communications. Upon notification of a suspected breach or potential compromise of data the Chief Information Officer will ensure communication with other members of the Response Team to begin the requisite response activities. The Response Team will convene as soon as possible to initiate a response and will involve others in the college community as circumstances warrant. The Response Team will determine the need and pace of all official communication.
Internal communication strategies begin upon the verification of a data breach or compromise. Once a potential breach or compromise has been reported and verified per the Internal Notification and Verification procedures, the Incident Response Team will facilitate communications to other college areas. Communication will be at a pace consistent with the investigation and resolution process. The following institutional members will be informed of the breach or compromise of data and will be provided with periodic updates of significant findings by the Incident Response Team during the investigation and remediation processes:
The investigation will be the responsibility of Incident Response Team, the Information Technology Services department, appropriate law enforcement agency, or a combination of all. The investigation will include, but is not limited to, the following:
The information gathered during the investigation will allow for assessment of functional impact, informational impact, and remediation.
Review and Revision History
Updated: 03/04/2021