Report an Incident

Anyone can make a report of any known or suspected violations of health information privacy, security or University policy to University Information Security (UIS). Suspected or known security incidents should be reported immediate to UIS.

An information security incident is any activity which may involve:

  • Misuse of technology resources, compromise of integrity or loss of confidentiality of University data (electronic or paper-based).
  • Threats to availability of resources (i.e., cyber attack), misrepresentations of identity, or harassment of or by individuals using technology resources.
  • Loss or theft of a University-owned computer (or a personal computer/device storing University data).
Immediately discontinue use of the device or system that may be involved in a suspected security incident or data breach. Instead, use alternative communication methods (e.g., different devices, call Technology Help at 612-301-4357) to report the incident to University Information Security and wait for further instructions prior to turning the device or system off. 

Reporting an Incident

Known or suspected violations should be reported immediately through any one of the following options:
  • U Report: The UReport provides a way for University community members to report violations of rules, regulations and policies via phone or online. The report can be made anonymously.
  • Via email to This email is monitored by staff at OIT University Information Security.  Your report will be reviewed by OIT University Information Security and forwarded to MSI for follow up as needed. 
  • If you suspect you are the victim of a phishing attack, report the attack to  Additional information about phishing attacks can be found at

Symptoms to watch for include, but are not limited to:

  • Unwanted browser toolbars, homepage, or plug-ins appear. You see lots of pop-ups or web page redirects. Your online passwords stop working.
  • New accounts or programs/apps appear on your device.
  • Anti-virus or malware detection software reports that the virus/malware hasn’t been cleaned or quarantined. You see fake anti-virus messages from software you don’t remember installing.
  • Programs are requesting elevated privileges that you did not expect. Programs randomly crash. File names look like garbled nonsense.
  • Your mobile device suddenly has unexplained very high data or battery usage. Your computer is unexpectedly running slower than normal. Service or application is unavailable when the service or application is normally available.
  • You are asked to pay ransom to access your data (aka ransomware). Charges for premium SMS numbers show up on your bill.
  • You clicked on an attachment, opened a file, or visited a website that was infected or contained an infected ad. You downloaded music or software that contained unwanted programs.
  • University Information Security sends you a notice (
If in doubt, reach out by contacting Technology Help or the University Information Security team at

Examples of an incident could include:

  • Exposure of University private data (including paper), accidental or inadvertent e-mail, social media, or posting of data on a web site. See Report Suspected Data Breach.
  • Suspected abuse/misuse of University of Minnesota Internet password and Duo access.
  • Unauthorized use of the accounts used to access University systems or information, which includes escalation of access privilege by an unauthorized person or persons.
  • Spam and email forgery that originates from or is relayed through See Manage Spam Email.
  • Harassment or threats to individuals. Call 911 if you fear for your safety. See Report Electronic Harrassment.
  • Suspected information technology policy violation as described in the University Acceptable Use of Information Technology Resources Policy.
  • Root-level or denial-of-service attacks on networking infrastructure, critical systems, or large, multi-purpose or dedicated servers.
  • Attacks launched on others from within