Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Tuesday, February 20, 2018

  New Resources
Security Logging Service
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical Component compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

Reporting Problems to Penn Information Security

Penn's Office of Information Security is available to respond to computing security incidents on a 24-hour a day, 365-day a year basis. You can reach us in either of the following ways:

IMPORTANT! If you believe that the computer security issue you wish to report involves a possible threat to the personal safety of yourself or any other person, or if you believe that it involves criminal activity (including identity theft), we strongly urge you to report it directly to Penn Public Safety by calling them at 511 (on-campus) or 215-573-3333 (off-campus/cell phone). Although Penn Information Security is not a law enforcement agency, we will consult with Public Safety on criminal investigations involving computing security.

If you're unsure about what you should report, or how you should report it, here are a few suggestions:

  • If you are reporting an attack against a computer belonging to you, and the attack appears to be coming from or involve a computer that is part of Penn's network, it is very helpful if you can forward any logs you have that detail the attack to us at to assist in the investigation.
  • If you are a Penn computer user, and you have reason to believe that one or more of your computers has been compromised (especially if the computer is covered by the Critical Host Policy ), then report it to us along with any logs or other evidence you have detailing the compromise. It's also a good idea to unplug the affected machine(s) from the network until the matter is resolved.
  • If you are reporting what you believe is a violation of copyright law involving a computer that is part of Penn's network, please read this page before making your report.
  • If you are contacting us about a forgotten PennKey password, lost or expired Setup Codes, or anything related to your PennKey, please note: University policy and security guidelines do not permit Setup Codes to be issued by telephone or email, nor can anyone in Information Security set or reset your PennKey password. You will need to visit one of the PennKey Administration Offices to be issued a PIN, or request one be (postal) mailed to you using the automated system. For more general information on PennKey, please visit or write to
  • If you have received an email (usually from Nigeria or other African country) that seems to involve a scheme offering you millions of dollars to help launder "trapped" funds, please don't report it to us. Read this instead:

The above does not cover all situations, of course, so if you think there's any possibility that your problem concerns computing security, it's better to ask us and find out that everything's OK than to let it ride and risk it becoming a much more serious problem.

Last updated: Thursday, March 4, 2010

Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania