Compromised Account or Device

Requests must be completed by the person who is compromised. Once submitted, the IT Security Incident Response Team will respond with the next steps.

Following links or downloading files from phishing emails and visiting suspicious websites can lead to a compromised account or UTC-issued device. The IT Security Incident Response Team provides assistance in recovering your account or device and will work with the University Police when necessary.