Last Reviewed: July 12, 2024
Approval Date: March 24, 2026
Privacy and/or information technology (IT) security incidents can occur at any time and of varying magnitude. Identifying and resolving incidents in an organized, systematic way is a vital component of WCM’s compliance program.
This policy provides a framework for identifying, assessing, reacting to, communicating about, and documenting Significant Incidents, along with corresponding remediation plans.
This policy is specifically intended to govern high-impact privacy incidents and IT security incidents that may require coordinated institutional response, including activation of the Security & Privacy Incident Response Team (SPIRT). Routine privacy incidents are managed in accordance with the Office of Compliance (OOC) policies and procedures and do not require SPIRT activation unless escalation criteria are met.
This policy applies to all WCM Workforce Members who utilize WCM information technology resources as well as those responsible for managing and safeguarding WCM data.
All WCM Workforce Members are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by WCM, irrespective of the medium on which the data resides and regardless of format.
In the event the confidentiality, integrity, or availability of data is compromised, ora suspected incident has occurred, the incident must be reported immediately to the Information Technologies & Services Department (ITS) and/or the OOC, as appropriate.
All suspected incidents must be reported; however, only incidents meeting defined severity and impact thresholds (e.g., large-scale data exposure, system compromise, ransomware, regulatory reporting triggers, or significant reputational risk) will be escalated for formal declaration and potential SPIRT activation.
Reporting incidents quickly—regardless of certainty or magnitude—is critical to ensure the appropriate teams can respond and contain the incident as soon as possible.
Protected Health Information (PHI): Under HIPAA, PHI is "individually identifiable health information” held, created, or transmitted by a covered entity, or its business associate, in any form or media, whether electronic, paper, or verbal.
A. PHI is information, including demographic data, related to:
a. The provision of health care to an individual; or
b. An individual’s past, present, or future:
B. The information identifies the individual or there is a reasonable basis to believe the information can be used to identify the individual by the presence of one or more (depending on the context) of the following 18 individual identifiers:
Significant Incidents: An event involving the actual or suspected compromise of data confidentiality, integrity, or availability that meets one or more of the following criteria:
Routine Privacy Incident: Lower-risk incidents (e.g., misdirected fax/email, limited disclosure, minor documentation errors) that are investigated and managed by the OOC and do not require SPIRT activation unless escalation criteria are met.
Security and privacy incidents should be (1) reported, (2) identified, (3) assessed, (4) escalated (5) responded to, (6) remediated, and (7) resolved with adequate record-keeping. Detailed requirements for each of these steps are below.

If you know or suspect any unusual or suspicious behavior, immediately report the incident to ITS Support or the OCC. Even if you are not certain or cannot confirm the incident, it’s imperative that the incident is reported timely so the right personnel can investigate as soon as possible, however, reporting does not automatically trigger SPIRT activation.
To report an incident, notify ITS Support:
ITS Support
ITS Security
ITS Support (Qatar)
Office of Compliance
Cornell University Hotline (Anonymous)
Compliance Office (Qatar)
ITS (Qatar) Anonymous
Filing or reporting an incident can be done without fear of retaliation.
Examples of reportable incidents include, but are not limited to the following:
System or individual is a victim of malware, phishing, or ransomware events
Note: Not all incidents listed above constitute a “Significant Incident.” Many may be managed as routine privacy or operational incidents unless escalation criteria are met.
Each reported incident must be investigated. Confirmed incidents may be categorized as follows:
A. Routine Privacy Incident (managed by the OOC)
B. IT Security Incident (managed by ITS Security)
C. Significant Incident (requires escalation and potential SPIRT activation, Managed by ITS/OOC depending on the nature of the incident)
As quickly as possible, reasonable effort must be made to identify the type of data affected by the incident upon discovery and/or declaration. Various regulatory reporting and/or notification requirements, including deadlines, must be adhered to in accordance with applicable state, federal, or regulatory agencies. Such requirements include, but are not limited to, New York State Information Security Breach and Notification Act (ISBANA), Department of Health and Human Services Office of Civil Rights (HHS OCR), Office of Management and Budget Memorandum 07-16 (OMB M-07-16), and the Payment Card Industry Data Security Standard (PCI DSS), including any payment processors for WCM. This also includes the evaluation of the state of residence for affected individuals and any applicable reporting authorities. For Significant Incidents, regulatory reporting requirements must be evaluated and managed in coordination with SPIRT and the Office of General Counsel.
Refer to WCM Policy OOC-410.05 – HIPAA and State Privacy Breach Notifications for additional requirements related to breach notification and reporting.
The Chief Information Officer, the Chief Information Security Officer, the Chief Compliance and Privacy Officer, or their designees may declare a significant privacy and/or IT security incident. These individuals are responsible for evaluating the reported concern using the tools and risk assessment guides to determine the concern’s authenticity and severity. Severity judgments will be based on ongoing persistent threats, the volume of data involved, and the potential for reputational or financial harm to the institution or affected individuals.
Low-Scale Security Incidents and Routine Privacy Incidents should be handled by the appropriate ITS team or the OOC. Routine privacy incidents will not be declared under this policy and will instead follow established workflows in the OOC.
Only incidents, determined to be “Significant Incidents” will be formally declared and considered for SPIRT activation These include, but are not limited to:
The primary purpose of SPIRT is to determine and guide the WCM’s response to Significant Incident, up to and including the need to satisfy existing data breach notification requirements or processes as well as an institutional decision to notify individuals of a breach of their information.
The SPIRT core team members include:
As warranted by the type and scale of the incident, any of the SPIRT virtual team members may be convened by a core team member based on the type and scope of incident. Virtual team members provide assistance, advisement, and expertise from their representative areas. The SPIRT virtual team members include:
Other individuals not on the SPIRT core or virtual teams may be convened by a core team member based on the incident. Such individuals may include, but are not limited to, department administrators or subject matter experts.
These procedures apply to Significant Incidents requiring SPIRT activation.
Once an incident has been reported and declared, the incident should be contained to prevent further harm. By means of example, the following containment steps may be taken:
Effective containment stops damage from being done and allows assessment of the scope of the incident and the initiation of remediation activities.
Upon declaring the incident, the SPIRT core team members may convene the appropriate virtual team members—including any additional resources necessary, such as storage facilities, out-of-band communication channels, or additional staff—and assign roles pertaining to the incident assessment and response:
The incident commander is responsible for coordinating all stages of the incident response process and specifically acts as the leader of the investigation. In addition, the incident commander has the following duties:
The incident coordinator is responsible for the oversight of the incident response, including, but not limited to, the following duties:
The IT forensics investigator is responsible for the electronic discovery of data from in-scope systems, applications, or logs. Other duties may include:
The data analysis investigator is responsible for reviewing all aggregated documents, forms, transcripts, and other relevant materials. In addition, the data analysis investigator is responsible for the following duties:
The communications coordinator must be prepared to respond to any authorized/approved party at any time throughout the incident. Responsibilities include:
In order to limit exposure and maintain confidentiality about the incident, limited information pertaining to the incident should be disclosed upon initial notification (e.g., type/category of incident, date occurred, reported by, etc.). An “informed parties” log may be kept documenting the degree and reason to which all parties have been informed about the incident.
Throughout all communications, the incident responders should be maintained throughout the confidentiality of the incident, and that information must not be shared outside the response team unless warranted.
The initial incident report must be presented and reviewed at the convening of the SPIRT core team. The SPIRT data analysis investigator is responsible for compiling the data elements below as part of the incident response procedures. Appropriate templates are available based on the type of incident. Distribution and review of the working draft is restricted and must be conducted under privilege with a member of the Office of General Counsel included on any distribution list or at the review sessions. The incident report must contain the following attributes:
Throughout the incident response process, all items should be completed, when known, before the report can be finalized.
1 The action log should include all actions taken in chronological order, along with communications made - and the indexing of any potential threats found, pertinent discoveries made, or potential data involved throughout the process.
2 The remediation plan should eliminate, mitigate, or document acceptance of the threats discovered in the incident and any actions to address these items going forward.
3 The communications plan should include the timing, preparation, revision, acceptance, and delivery of internal communications (e.g., shared governance bodies, faculty, staff, students, affiliate institutions, etc.) and external communications (e.g., media, website, letters to affected individuals, etc.).
4 Regulatory reporting and/or notification requirements, including deadlines, shall be adhered to in accordance with applicable state, federal, or regulatory agencies (as described in 2.01 Identifying Affected Data and WCM Policy OOC-410.05 - HIPAA and State Privacy Breach Notifications).
Closing an incident indicates that the incident has been completely contained, remediated, and properly reported. In order to close an incident, all attributes in the incident report must be completed, as defined in 5.02 Incident Report.
Only SPIRT-managed Significant Incidents require formal closure by the SPIRT core team.
Routine incidents are closed in accordance with the OOC procedures.
All documentation and evidence and the incident report pertaining to the incident must be stored in a secure location by the Chief Information Security Officer. A paper copy of the incident report should be provided to the Office of General Counsel. The data analysis investigator should ensure that all documentation is organized in a clear, cohesive manner. It is important to note that additional activities may occur after the incident has been closed, such as responding to requests for additional information from regulatory agencies. These activities need to be memorialized and added to the documentation repository. Additionally, the SPIRT core team should be notified of any new developments, including regulatory inquiries, to closed incidents.
A post-mortem meeting should be held within ten business days for Significant Incidents to review the incident and adherence to this policy for any future modifications. An independent reviewer may be engaged to provide additional feedback on the incident handling procedures and records.
All WCM Workforce Members are responsible for adhering to this policy. Failure to comply will be evaluated on a case-by-case basis and could lead to corrective action, up to and including termination, consistent with other relevant WCM and University Policies. Instances of non-compliance that potentially involve a lapse of professionalism may lead to engagement of the Office of Professionalism for evaluation and intervention.
Contact Information
Direct any questions about this policy, 500.05 – Security and Privacy Incident Response Plan, to the Chief Information Security Officer, using one of the methods below:
• WCM Policy OOC-410.05 - HIPAA and State Privacy Breach Notifications
This policy was reviewed and approved by: