Skip to main content
Penn Information Systems & Computing Systems Logo
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • Accounts, Access & Security
      • Active Directory
      • Central Authentication & Authorization
        • CAA: Our Mission, Vision & Offerings
      • Incident Handling
      • Information Security Hotline
      • Intrusion Detection System
      • Penn Community
      • Penn Directory
      • PennGroups
      • PennKey
      • Security Logging Service
      • Two-Step Verification
      • Vulnerability Scanning Service
    • Applications & Data Analytics
      • Data Analytics
        • Data Analytics at Penn
      • Data Warehouse
      • Enterprise Application Development & Delivery
      • Integration
      • Non-Enterprise Application Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Backup for Desktop & Laptop
      • Data Center Hosting
      • Database Administration Services
      • Endpoint Management
      • Recovery Services
      • Shared Database Service
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop & Mobile Recommendations
      • IT Orientation
      • Knowledge Link
      • Lab Rentals
      • Lunchtime Learning
      • Lynda.com
      • Provider Support Services
      • Tech Center
      • Training
    • Consulting & Professional Services
      • Business Solution Consulting
      • Database Consulting
      • HireIT
      • Project & Program Management
      • Security & Risk Management Consulting
      • Strategic Technology Coordination
      • Systems Support & Consulting
      • Technology Evaluations
      • Technology Tracking
    • Email, Calendaring & Collaboration
      • Classlists
      • Forward-Only
      • Penn+Box
      • PennNet Mailing Lists
      • PennO365
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • MAGPI
      • Network Design & Installation
      • Network Names & Numbers
      • PennNet
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Broadcasting Studio
      • Contact Center
      • Digital Signage
      • Live Video Streaming
      • Penn Video Network
      • Penn on iTunes U
      • PennNet Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Services
    • — Services A to Z —
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • About the OIS
  • Collaborations
    • Cloud First
    • Project Management Office
    • IT Advisory Groups
      • Common Solutions
      • IT Planning Task Force
        • About ITPTF
      • IT Roundtable
      • Network Policy Committee
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
  • News
  • Events
  • About
    • Overview
    • Leadership & Groups
    • Purpose & Values
    • ISC Priorities Program
    • Recognition
    • Tech Jobs @ Penn
    • Contact Us
  • Hot Topics
  • Get Help
    • Self-Service Forms
    • Contact ISC Client Care
    • My Tickets
    • Rates for All Services
  • Find my LSP
  • Penn
System Status

Search form

You are here

Home » Reporting Concerns to Penn Information Security

Reporting Concerns to Penn Information Security

Penn's Office of Information Security is available to respond to computing security incidents on a 24-hour a day, 365-day a year basis. You can reach us in either of the following ways:

  • Telephone: (215) 898-2172
  • E-mail: security@isc.upenn.edu 

IMPORTANT! If you believe that the computer security issue you wish to report involves a possible threat to the personal safety of yourself or any other person, or if you believe that it involves criminal activity (including identity theft), we strongly urge you to report it directly to Penn Public Safety by calling them at 511 (on-campus) or 215-573-3333 (off-campus/cell phone). Although Penn Information Security is not a law enforcement agency, we will consult with Public Safety on criminal investigations involving computing security.

If you're unsure about what you should report, or how you should report it, here are a few suggestions:

  • If you are reporting an attack against a computer belonging to you, and the attack appears to be coming from or involve a computer that is part of Penn's network, it is very helpful if you can forward any logs you have that detail the attack to us at security@isc.upenn.edu to assist in the investigation.
  • If you are a Penn computer user, and you have reason to believe that one or more of your computers has been compromised, then report it to us along with any logs or other evidence you have detailing the compromise. It's also a good idea to unplug the affected machine(s) from the network until the matter is resolved.
  • If you are reporting what you believe is a violation of copyright law involving a computer that is part of Penn's network, please check the information on Copyright and File Sharing webpage before making your report.
  • If you are contacting us about a forgotten PennKey password, lost or expired Setup Codes, or anything related to your PennKey, please note: University policy and security guidelines do not permit Setup Codes to be issued by telephone or email, nor can anyone in Information Security set or reset your PennKey password. You will need to visit one of the PennKey Administration Offices to be issued a PIN, or request one be (postal) mailed to you using the automated system. For more general information on PennKey, please visit http://www.upenn.edu/computing/pennkey/setreset or write to pennkey@isc.upenn.edu.
  • If you have received an email (usually from Nigeria or other African countries) that seems to involve a scheme offering you millions of dollars to help launder "trapped" funds, please read information on Phishing and Spear Phishing before you contact us. 

The above does not cover all situations, therefore, if you suspect a computing security issue it is better to contact the Office of Information Security to mitigate any risk.

Share:
Print
InfoSec Home
Resources
  • Incident Handling
  • Copyright and File Sharing
  • Chain of Custody Form
  • Information Security Hotline
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn
System Status

© 2018 THE UNIVERSITY OF PENNSYLVANIA — | 3401 Walnut Street | Philadelphia, PA 19104 - For ISC Staff