Quick Links to some of our most common information security tasks and related application information.
Common Tasks
Report a Security Incident ⇢
How to report Security Incidents such as an intrusion, breach, and computer/network misuse
Report a Stolen or Lost Device ⇢
Steps to take if your laptop, tablet, or phone has been stolen or lost
Report a security vulnerability ⇢
Instructions on reporting real or suspected security vulnerabilities on systems owned or operated by UC Berkeley
Respond to a Security Notice ⇢
How to respond if you have received a security notice from the Information Security Office
Request a Policy Exception ⇢
Instructions to request an exception to the campus minimum security standards
Submit an Off-Site Hosting Request ⇢
Request to host data services off-campus with a third-party service provider
Report a Phishing or Suspicious Email ⇢
Instructions on how best to report
Applications
Login to Socreg ⇢
Socreg is used to manage departmental security contact information and to register devices for campus DHCP service. Additionally, it's used as a registry for systems that handle restricted data, enabling those systems to receive enhanced security services