{"id":230549,"date":"2025-05-27T15:24:54","date_gmt":"2025-05-27T13:24:54","guid":{"rendered":"https:\/\/us.edu.pl\/?page_id=230549"},"modified":"2025-06-11T14:43:39","modified_gmt":"2025-06-11T12:43:39","slug":"cyberbezpieczenstwo-incydent-bezpieczenstwa-informacji","status":"publish","type":"page","link":"https:\/\/us.edu.pl\/en\/bezpieczenstwo\/cyberbezpieczenstwo-incydent-bezpieczenstwa-informacji\/","title":{"rendered":"Cybersecurity \u2013 information security incident"},"content":{"rendered":"<p><\/p>\n<p>[vc_row][vc_column]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        <h3 class=\"page-title text__title\">Cybersecurity \u2013 information security incident<\/h3>\r\n                        <div class=\"text-modules__content\"><\/p>\n<p>An information security incident is an unexpected event that disrupts the normal functioning of an IT system, service or process. This could be, for example, a failure, technical error, human error, breach of IT infrastructure security or any other situation requiring a rapid response. Reporting an incident allows for faster corrective action and minimises the impact on users and the organisation. Incidents can be reported using:<\/p>\n<ul>\n<li><strong>the form available at <\/strong><a href=\"https:\/\/incydent.us.edu.pl\/site\/index?lang=en\"><strong>https:\/\/incydent.us.edu.pl<\/strong><\/a><strong> (preferred form of making a report)<\/strong><\/li>\n<li>an email sent to <a href=\"mailto:incydent@us.edu.pl\">incydent@us.edu.pl<\/a>,<\/li>\n<li>by telephone at: 32 359 1800.<\/li>\n<\/ul>\n<h3><span style=\"font-size: 16px;\">Examples of situations that should be reported include:<\/span><\/h3>\n<ul>\n<li>data theft in any form,<\/li>\n<li>loss of data storage media or paper documentation,<\/li>\n<li>unauthorised copying or removal of data,<\/li>\n<li>unauthorised modification of data in any form,<\/li>\n<li>disclosure of data to an unauthorised person,<\/li>\n<li>failure to comply with the provisions of the Information Security Policy at the University of Silesia in Katowice,<\/li>\n<li>noticing signs of attempted or actual break-ins into rooms or locked document cabinets,<\/li>\n<li>\u00a0breach of confidentiality of access data to the IT system (the system does not respond to the password),<\/li>\n<li>partial or total loss of data or access to data beyond the scope of the granted permissions,<\/li>\n<li>lack of access to the appropriate application or change in the scope of designated access to server resources,<\/li>\n<li>suspicion of the presence of a computer virus,<\/li>\n<li>noticing signs of an attempt to break into the IT system,<\/li>\n<li>significant slowdown in the operation of the IT system,<\/li>\n<li>anomalies in the functioning of the computer network,<\/li>\n<li>theft or suspected theft of computer equipment or documents containing data,<\/li>\n<li>unexpected change in the location of computer equipment.<\/li>\n<\/ul>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][\/vc_row]<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row] [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/us.edu.pl\/en\/bezpieczenstwo\/cyberbezpieczenstwo-incydent-bezpieczenstwa-informacji\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":28,"featured_media":0,"parent":224881,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/inner-page.php","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"acf":[],"_links":{"self":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/230549"}],"collection":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/comments?post=230549"}],"version-history":[{"count":1,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/230549\/revisions"}],"predecessor-version":[{"id":234310,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/230549\/revisions\/234310"}],"up":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/224881"}],"wp:attachment":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/media?parent=230549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}