Main Content Region


Procedures and tools for reporting network and information security incidents

Spam and Phishing

Most spam is automatically blocked by campus spam filters. However, about 15% of spam email can not be identified enough confidence to block. Instead, "spammy" (but possibly legitimate) emails are tagged with [Spam] in the subject. For more information, please see the support article on setting up a inbox filter for spam.

If you receive an legitimate email that is mistakenly tagged as spam (a "false positive"), please contact the Technology Support Center so that we may better configure our spam filters.

Abuse or Malicious Activity

As per RFC 2142 several email addresses are available for those wishing to report abusive or malicious activity involving a CSUSB computer:

  • in the or or 2607:f380:a61::/48 or 2607:f380:a62::/48 IP address ranges
  • assigned a name (resource record) under the DNS zone
In most cases, a reporter will use one of the following common mailboxes:
Email Report Subject Computer crime, unauthorized access, virus/worm propagation 

Be sure to include log information. At a minimum this should include time zone information, timestamps, IP addresses, and protocol information.
See an example email to Inappropriate use of resources, especially email.  This includes reports of spam email, phishing email, or network resources (i.e. bandwidth). 

If reporting spam or phishing, be sure to use the Forward as Attachment option.  Forward as Attachment includes additional details needed to properly tune the email filtering for the campus.
See an example email to Web pages and HTTP Operational issues with Email and SMTP.  Though, in most cases, is more appropriate.


Copyright infringement and piracy

If in doubt, send your report to