Cybersecurity Breach Intake

Please complete the Cybersecurity Breach Intake Form.

Cybersecurity Breach Intake Form

All fields marked with an asterisk (*) are required.
Suspected or Known
Number and type of records, etc.
Hack, accidental disclosure, etc.

Information Security Program Point of Contact

Remediation Status (Select one)
(as needed)