...
Please note, in general, that ITS does not track intimate details of what individual users are doing. Rather, we log and track normal activity in aggregate, and respond to things like exceptional activity spikes, indications of compromise, and malware. We look in detail at individual activity only to the extent needed to respond appropriately. For example, we may respond to an alert that a user has logged in simultaneously from two different countries by gathering a list of login locations and eyeballing it to be sure it's not a false alarm. We may also take actions like notifying the user and, rarely, locking their account temporarily, to try to limit damage to the user's information and resources, if we think the account has been compromised.
Table of Contents | ||||
---|---|---|---|---|
|
...