Quick Links

Staff wearing headset

Quick Links to some of our most common information security tasks and related application information.

Common Tasks

Report a Security Incident
How to report Security Incidents such as an intrusion, breach, and computer/network misuse

Report a Stolen or Lost Device ⇢
Steps to take if your laptop, tablet, or phone has been stolen or lost

Report a security vulnerability 
Instructions on reporting real or suspected security vulnerabilities on systems owned or operated by UC Berkeley

Respond to a Security Notice
How to respond if  you have received a security notice from the Information Security Office

Request a Policy Exception
Instructions to request an exception to the campus minimum security standards

Submit an Off-Site Hosting Request
Request to host data services off-campus with a third-party service provider

Report a Phishing or Suspicious Email ⇢
Instructions on how best to report


Login to Socreg
Socreg is used to manage departmental security contact information and to register devices for campus DHCP service. Additionally, it's used as a registry for systems that handle restricted data, enabling those systems to receive enhanced security services