- Application and Database Services
- Consulting Services
- Desktop and Server Services
- Field IT Equipment Evaluation and Demonstration Program
- Password Reset
- Research Support
- Web Hosting
The LSA.Security group responds to suspected abuse or misuse of LSA computing resources reported to firstname.lastname@example.org. This includes evidence that a computer on a LSA network may be involved with copyright infringement, is infected with a virus, has been compromised, or is being used to abuse other computing resources.
LSA.Security works with local IT support to identify and locate the effected computer(s) to remediate the issue. If it is determined that the incident is serious, LSA.Security will work with Information and Infrastructure Assurance (IIA) to handle the incident. Computer abuse and misuse of University computing resources are reported to the ITS User Advocate.
If LSA.Security contacts you regarding potential abuse or misuse of computer systems, please respond with the information requested as quickly as possible.