connect. communicate. collaborate.

IT Security Incident Survey

Technical Liaison Information

(if you received one)

System Information


Incident Description 

Risk location examples: Low risk location - an example would include the browser web cache High risk location - examples would include Windows system folders, profile folders, or USB drives

System Content Information

Indicate which types of sensitive data this system has access to.

KU IT on Twitter  KU IT on Facebook  KU IT on Google Plus

Technology Help

Call KU IT Customer Support

Phone support

Email KU IT Customer Support
Support via Email

KU IT Knowledge Base

Knowledge Base
FAQs & More

Virtual Service Desk

Virtual Service Desk
Online Help

Comments or ideas on how we can serve you better? Send us your feedback!

One of 34 U.S. public institutions in the prestigious Association of American Universities
26 prestigious Rhodes Scholars — more than all other Kansas colleges combined
Nearly $290 million in financial aid annually
46 nationally ranked graduate programs.
—U.S. News & World Report
Top 50 nationwide for size of library collection.
23rd nationwide for service to veterans —"Best for Vets," Military Times