Quick Links

Staff wearing headset

Quick Links to some of our most common information security tasks and related application information.

Common Tasks

Report a Security Incident
How to report Security Incidents such as an intrusion, breach, and computer/network misuse

Report a Stolen or Lost Device ⇢
Steps to take if your laptop, tablet, or phone has been stolen or lost

Report a security vulnerability 
Instructions on reporting real or suspected security vulnerabilities on systems owned or operated by UC Berkeley

Respond to a Security Notice
How to respond if  you have received a security notice from the Information Security Office

Request a Policy Exception
Instructions to request an exception to the campus minimum security standards

Submit an Off-Site Hosting Request
Request to host data services off-campus with a third-party service provider

Report a Phishing or Suspicious Email ⇢
Instructions on how best to report

Applications

Login to Socreg
Socreg is used to manage departmental security contact information and to register devices for campus DHCP service. Additionally, it's used as a registry for systems that handle restricted data, enabling those systems to receive enhanced security services