Office of the Chief Information Officer

Privacy & Cybersecurity

  • Report a Cybersecurity Incident
    • Report a Cybersecurity Incident
      • Report a Compromised Device
      • Report a Phishing Email
    • Report a Stolen Device
    • Cybersecurity Vulnerability Disclosure
  • Students
    • 2-Factor Authentication
    • Be Aware of Threats
    • Cybersecurity Training
    • Develop Safe Online Habits
    • Manage and Protect My Devices
      • Report a Stolen Device
    • Manage and Protect My Identity
    • Privacy Guide to University Data
      • Passwords
        • Password Reset
  • Faculty & Staff
    • 2-Factor Authentication
    • Cybersecurity Training & Awareness
      • Be Aware of Threats
      • Develop Safe Online Habits
    • Data Classification
    • Manage and Protect My Devices
      • Report a Compromised Device
      • Report a Stolen Device
    • Manage and Protect My Identity
    • Privacy Guide to University Data
      • Privacy Solutions & Consulting
      • Passwords
        • Password Reset
  • Researchers
    • Be Aware of Threats
    • Cybersecurity Training & Awareness
    • Data Classification
    • Data Governance
    • Manage and Protect My Research
    • Privacy Solutions and Consulting
  • IT Staff
    • Help for IT Staff
    • 2-Factor Authentication
    • Be Aware of Threats
    • Cybersecurity Training & Awareness
    • Cybersecurity Vulnerability Disclosure
    • Data Classification
    • Nuts and Bolts Talks
    • Privacy Solutions and Consulting
    • Secure Code Development
    • Secure & Protect My Devices
      • Report a Compromised Device
      • Report a Stolen Device
    • Standards and Controls
  • Policies & Governance
    • Policies & Governance
      • Data Governance
      • Privacy 101
      • Ethical and Responsible Use of Generative AI
    • Illinois Security Program
      • Standards and Controls
      • Data Classification
  • Our Teams
    • Office of the CIO
    • About Us
    • Cybersecurity Team
      • CSOC
      • Infrastructure and Engineering
      • Software Development & Assurance
    • Cybersecurity Training & Awareness Team
    • Governance, Risk, & Compliance
    • Identity & Access Management Team
    • Privacy Team
    • Contact
  • Vulnerability Disclosure (link opens in new window)
  • News
  • Events
  • Resources
  • Report a Cybersecurity Incident