Accessibility statement

Information Security Incident Management Policy

Related pages

This policy explains how information about reporting incidents is provided, who is responsible for reporting, responding and investigating and how these are handled.

It applies to everyone who is involved in an actual, suspected, threatened or potential incident which involves data loss or a breach of information security.

This potentially includes all staff, students, associates, and anyone else authorised to use University IT facilities and information.

1. Policy

1.1 It is the policy of the University of York that Information Security incidents will be handled properly, effectively and in a manner that minimises the adverse impact to the University and the risk of data loss to members of the University and the public.

1.2 The University will ensure that:

  • incidents are reported in a timely manner and can be properly investigated
  • incidents are handled by appropriately authorised and skilled personnel
  • appropriate levels of University management are involved in the determination of response actions
  • incidents are recorded and documented
  • the impact of the incidents are understood and action is taken to prevent further damage
  • evidence is gathered, recorded and maintained in a form that will withstand internal and external scrutiny
  • external bodies or data subjects are informed as required
  • the incidents are dealt with in a timely manner and normal operations restored
  • the incidents are reviewed to identify improvements in policies and procedures.

1.3 The University will provide information on its website, and through other training and communications channels, which explains how information security incidents should be reported and will encourage the reporting of all incidents whether they are actual, suspected, threatened or potential.

1.4 The Information Security Board will monitor and review information security incidents to identify recurring incidents and areas of risk. The review process will be used to identify requirements for new or changed policies, to update the University risk register and to identify any other relevant controls.

1.5 If an information security incident occurs which requires a coordinated response across the University or the incident has possible external or media interest, the University’s Business Continuity Plan will be triggered.

1.6 The University will conduct periodic testing of the information security handling procedures to maintain and improve staff awareness of the procedures and the actions required.