You are writing a report in the category
Violations of IT security (information security)
Concerns incidents or behaviour that compromise the security of IT systems, networks or information. This includes, in particular, actions or omissions that violate internal security guidelines, technical protective measures or legal requirements for information security.

Examples of reportable IT security incidents:
  • The deliberate or negligent installation of unauthorised software (shadow IT)
  • The loss of devices with business data (e.g. laptop, smartphone, USB stick)
  • The use of weak or repeatedly used passwords despite appropriate guidelines
  • Bypassing security measures (e.g. deactivating firewalls or virus protection)
  • Unauthorised access to IT systems or protected information
  • Sharing access data with other people

How would you like to submit your report?

In any case, after submitting your report, you will be shown automatically generated access data to respond to any queries and to view the progress of the processing.

Please describe the incident

Optional: Voice message

As an alternative or supplement to "Your message", you can record a voice message. You can record up to 5 voice messages. Each voice message can be 3 minutes long.
Record voice message

    Attachments

    Please note: Files often contain hidden information about authors or personal data. Office files (XLS, XLSX, DOC, DOCX, PPT, PPTX), all image formats (JPG, JPEG, GIF, etc), and PDF documents are affected in particular. Make sure you remove this information before uploading!

    Send your report