Overview
This service enables users to report misuse, suspicious behavior, or unauthorized activity involving JMU accounts, networks, or technology resources. Security teams review and investigate the activity to determine impact and enforce appropriate corrective actions. Reports may include account compromise, policy violations, or inappropriate access attempts. The service helps maintain a safe, compliant, and secure computing environment.
How can I get this Service?