Incident Response

The Information Security Officer will be the central point of contact for reporting computer incidents or intrusions. All computer security incidents must be reported to the Information Security Officer. A preliminary analysis of the incident will take place by the SEC and that will determine whether Incident Response Team activation is appropriate.

There are many types of computer incidents that may require Incident Response Team activation.

Some examples include:

  • Compromised Systems
  • Excessive Port Scans / Denial of Service / Distributed Denial of Service
  • Firewall Breach
  • Virus Outbreak / Malware
  • Breach of Personal Information

Your reported incident and your contact information will remain confidential.  Our team takes anonymous tips and incidents as well.

If you and/or one of your employees have encountered an incident, IMMEDIATELY contact the Information Security Group.  You may email our team at itsecurity@uthsc.edu or call (901) 448-1260 or you may fax an incident to (901) 448 - 2777

What if I want to report an incident in-person?

If you would like to report an incident in-person, please, visit our Senior Security Analyst in the Johnson Building, 2nd Floor, Room 227E.  If you plan to report the incident anonymous and in-person, you may place a folded papers with the incident either eligibly written or typed under the door of Room 227E.  

IT Help? Try...

.    or    .

Contact Us

Information Security

877 Madison Ave
Memphis, Tennessee 38163
Phone: 901-448-1260
Fax: 901-448-8199
Email: itsecurity@uthsc.edu

Confidential Compliance Hotline:
901-448-4900