What to do if...
This section provides you with information regarding what you should do if certain situations arise. Please select the appropriate situation from the list below. For cases that are not covered, please contact the OIT Help Desk at 258-HELP.
If you receive harrassing or abusive communications
From a member of the University community
If you receive harassing, abusive or offensive communications from a member of the University community, you should report the matter to the most appropriate of the following contacts:
- Office of Human Resources (258-3300)
- Office of Dean of the Faculty (258-3020)
- Office of Graduate Student Life (258-3035)
- Office of the Dean of Undergraduate Students (258-5750)
- Counseling Services Share Program (258-3310 / 258-3139)
- Department of Public Safety (258-3134)
- Ombuds Office (258-1775)
- General Counsel (258-2500)
From someone outside the University
If you receive harassing, abusive or offensive communications, "spam" or "chain letters" from outside of the University community, you usually can report the incidents to the appropriate authorities, as most schools, corporations, and Internet service providers do not intend their electronic resources to be used for such purposes.
If you are uncertain about who to call
If you do not feel that following your usual reporting path would be appropriate or you are not sure of the appropriate division to handle the matter on your behalf, OIT Help Desk staff (258-HELP) can help you make the appropriate referral.
If you become a phishing victim
If you suspect that you may have exposed your personal information to an unauthorized individual, you should:
- Reset your exposed passwords.
- Contact the support team of the institutions where your passwords were exposed.
- If you received the e-mail message through your Princeton email address, contact Princeton University's Department of Public Safety.
- If the information provided can be used to access other institutions, contact them as well. For example, if your credit card number was exposed, contact your credit card company as well. If any piece of information was exposed that could be used to open financial accounts (e.g., your Social Security Number, date of birth, place of birth, mother's maiden name, bank account numbers, credit card numbers), contact your credit card company or any of the three major credit bureaus and sign up for their credit monitoring service, a fee-based service that will automatically notify you whenever your credit record is accessed. Here are the websites for the three major credit bureaus:
- Contact national agencies dealing with Internet fraud:
If your computer, mobile device, or storage medium is lost or stolen
If your computer, mobile device (e.g., iPhone, iPad, Android device) or storage medium (e.g. flash drive, DVD) is lost or stolen, you should:
- Contact the OIT Help Desk at (609) 258-HELP immediately so that we can assign the appropriate individuals to address any confidentiality issues that may arise from the loss or theft.
- If any device was stolen on-campus or if a University purchased device was stolen on- or off-campus, contact Public Safety at (609) 258-1000.
- If the device was stolen and the theft occurred off-campus, contact the appropriate law enforcement agency.
Click here for additional information regarding your responsibilities in cases where your computer has been lost or stolen.
If you suspect that your computer has been compromised
If your computer begins to exhibit:
- A sudden reduction in the computers' performance.
- Unusual behaviors, such as windows briefly popping up and closing down.
- Application programs terminating and restarting again.Sporadic failed logins, even though you are certain you entered the password accurately.
Your computer may have had malicious software installed by a hacker that can capture sensitive information (including passwords), alter data or disrupt your service. In many cases, the behaviors may be simply software or key entry errors, but erring on the side of caution is always advised.
If any such suspicious activity is detected, it is important to determine whether or not malicious activity has occurred as soon as possible to prevent the loss or exposure of data, so you should take the following steps:
- If you know your department's IT support person, please contact him or her to check you system. They will involve the necessary parties in case further follow-up is needed.
- If you do not know your support person, please call the OIT Help Desk at 258-HELP, and they will ensure that the appropriate individuals are involved.
Click here for additional information regarding your responsibilities in cases where you suspect that your system may be compromised.
If you suspect that University data may have been exposed to unauthorized individuals
If you suspect that University information has been exposed to unauthorized individuals, either through a lost or stolen computer or storage media, or through a computer compromise, a few things must be addressed. We need to determine:
- the type of confidential or sensitive information that was exposed,
- whether criminal activity was involved and/or a lack of compliance with University policy
- what our obligations are to any individuals affected by the exposure.
To ensure that the University data breach response plan is executed in a timely manner, your prompt reporting of the incident to the OIT Help Desk at 258-HELP is critical, so that we can assign the appropriate individuals to investigate the incident and address any confidentiality issues that may arise.
Click here for additional information regarding your responsibilities in cases where you suspect that sensitive information may be compromised.