Report an Incident

At the University of Cincinnati, we believe in the power of community vigilance to maintain a secure digital environment. Your proactive engagement in incident reporting is crucial — it not only protects the collective security of our university community but also safeguards your personal digital space.

Continue reading to learn about the importance of prompt incident reporting, how to do it effectively, and explore examples of security incidents to stay informed.

How to Report

Report all threats to persons or property immediately by calling the UC Police Department at (513) 556-1111 or during an emergency dial 911.

The security incident team handles complaints of abuse or misuse of university computing resources and complaints of abuse of non-university resources by members of the university community. 

To report information security incidents or concerns please contact:

  • Office of Information Security at 513-558-ISEC (4732) or email

Please be sure to include as much information about the complaint as possible including but not limited to dates, times, attacking and attacked IP address, email internet header information, and audit/security logs on the incident.

Please report concerns of copyright infringement or other abuse of intellectual property per instructions on the UC Copyright Infringement information page

An incident in information security is any unauthorized or harmful event impacting the university's data, systems, or networks. These incidents can range from simple errors to malicious attacks.

Unauthorized Access: Unauthorized system or data access.

  • Example: An unauthorized individual using staff, faculty, or student credentials.

Malware and Viruses: Software compromising security.

  • Example: A virus infecting a student’s laptop via email.

Data Breaches: Exposure/theft of sensitive info.

  • Example: Research or other sensitive or personal data accidentally posted online.

DoS Attacks: Blocking access to digital resources.

  • Example: University website down due to overload.

Phishing Scams: Deceptive methods for data theft.

  • Example: Fake emails posing as university officials.

Network Intrusions: Illegal network access or changes.

  • Example: Cybercriminals accessing university records.

Physical Security Threats: Unauthorized access to devices or areas.

  • Example: Stolen laptop with student data from an office.

Policy Breaches: Violating security policies.

  • Example: Sharing passwords against university rules.

System Misuse: Misusing systems for prohibited activities.

  • Example: Illegal file sharing on university computers.

Unusual ActivityAbnormal behavior hinting at risks.

  • Example: Sudden changes in computer performance.

  • Quick Response: Your reports enable a swift reaction, minimizing damage.
  • Protect Privacy: Helps secure sensitive academic and personal data
  • Risk Management: Aids in identifying and mitigating emerging threats.
  • Legal Compliance: Ensures we adhere to regulatory standards. 
  • Community Safety: Your vigilance contributes to a safer digital space for all.