Security incidents could involve, but are not limited to, any of the following:

  • attempted or successful breaches of facilities or systems that store confidential information (either paper-based or in electronic format)
  • theft of devices such as smartphones, tables,laptops, portable hard drives or flash drives containing UCT information
  • the presence of a virus, spyware, ransomware or any other malicious program
  • the loss, corruption or compromise of any UCT data
  • compromised user accounts or login details (e.g. sharing or hacking of passwords or access details)
  • posting restricted or confidential data to publicly-accessible websites
  • sending restricted or confidential data to unauthorized recipients
  • any violation of the UCT computer security policies and standards

How do I report a computer security incident? You can log an incident by sending an email to UCTcsirt@uct.ac.za

web-graphic