{"version":"1.0","provider_name":"Library &amp; Information Technology Services","provider_url":"https:\/\/www.trincoll.edu\/lits","author_name":"Inghilterra, John M.","author_url":"https:\/\/www.trincoll.edu\/lits\/author\/jinghilt\/","title":"Incident Response &amp; Reporting","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"H55lGwYykK\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/\">Incident Response &amp; Reporting<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/reporting-an-information-security-incident\/embed\/#?secret=H55lGwYykK\" width=\"600\" height=\"338\" title=\"&#8220;Incident Response &amp; Reporting&#8221; &#8212; Library &amp; Information Technology Services\" data-secret=\"H55lGwYykK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"What is an incident? A cybersecurity incident is an event that poses a threat to the confidentiality, integrity, or availability of information systems and data that the university system processes, stores, or transmits. Incidents may also violate security policies, procedures, or acceptable use policies. Always report the following: Compromised college accounts or devices Theft of [&hellip;]"}