Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

When to apply for a Security Exception

If a process, procedure, or solution you need to implement is not compliant with current security policies or standards you will need to apply for a temporary exception with ITS Information Security.

How to apply for a Security Exception

Fill out the Security Exception Request form in the ITS Self-Service Portal

Considerations:

  • All Security Exceptions — if approved — are only valid for up to 6 months.

  • Once the specified expiration date has passed, you are required to immediately cease implementation of the process, procedure, or solution referenced in your request.

  • If approved, you must abide by any additional conditions imposed by Information Security that were communicated to you in order to retain the active status for an approved exception.

  • ITS or Information Security may revoke the active status for an approved Security Exception at any time.

  • After the expiration date, a Security Exception request cannot be reinstated. A new Security Exception Request form must be submitted again.

Need additional help? Submit a ticket in our new portal here: IT Service Desk Help Center

Filter by label

There are no items with the selected labels at this time.

  • No labels