​We engage in the design, implementation and maintenance of security systems that protect our data against unauthorized use, disclosure, modification, damage and loss and risk assessment of technology deployed throughout the organization.

Features: Information Security is committed to our user community by establishing appropriate Information Security governance structure that enables collaboration and support for new information security initiatives. We proactively protect the confidentiality of data, preserve the integrity of data and promote authorized use of data only. We accomplish this by promoting security awareness, internal risk assessments, threat detection and monitoring, malware detection and much more.

Service Owner: Ken Wottge, Director

Request Process: If you notice any computer behavior that is off-key or have accidentally clicked on a suspicious link, immediately contact your Service Desk at x34357. You may also wish to review our Security Policies at https://policy.ucop.edu/doc/7000543/BFB-IS-3 as well as our Information Security Awareness reminders at https://security.ucop.edu/resources/security-awareness/. 

How do I user the service?
If you notice any computer behavior that is off key or have accidentally clicked on a suspicious link, immediately contact your Service Desk at x34357. You may also wish to review our Security Policies at https://policy.ucop.edu/doc/7000543/BFB-IS-3 as well as our Information Security Awareness reminders at https://security.ucop.edu/resources/security-awareness/. 

Get Help

Call for Helo

Call for Help

(619) 543-4357

Available 24/7/365

Best option for immediate support.

 

Email Support

Email Support

[email protected]

Available 24/7/365

24 hour response turnover time

It is recommended that you do not use this option for immediate support needs. Remember to include a current direct contact in case we need clarification.

Inbox Ticketing

Self-Service Ticketing

Visit our on-line portal at 3help.ucsd.edu to submit:

Requests
Differs from Incidents in that these are asks. e.g. "I need a printer," "I need a Group Email," "I need a consult for purchasing a device".

Incidents
Differs from Requests in that these are brake-fix scenarios. e.g. "My computer crashed," "I can't login to my computer," "I have no network connection". 

It is recommended that you do not use this option for immediate support needs. Remember to include a current direct contact in case we need clarification.