Forms
This web page provides links to a number of forms that are required for compliance purposes. Unless indicated otherwise, all of the forms are available directly on the University HOP Forms/Exhibits Index page.
General Instructions
- Always verify that you're filling the latest version of a form. Utilizing an outdated form may cause it to be rejected.
- Please make sure that the information provided in the forms is accurate and complete. In order to avoid delays, you may send a preview of the form to the Information Security Office before you obtain signatures.
- In order to avoid any misinterpretation, please fill the forms electronically. Handwritten forms will not be accepted.
- Always obtain the appropriate authorizing signature.
List of Forms
Form Number | Name | Purpose |
---|---|---|
18-1 | Computing Device Encryption Exception Request | Request an encryption exception for an University owned device (Laptop, Desktop, Mobile Device, etc). |
18-2 | Information Resource Vulnerability Risk Acceptance Form | Risk acceptance for vulnerabilities that are discovered on a computing device. |
18-4 | Server Management Policy (HOP ADM 5-602)Exception Form | Request information security approval to maintain a server outside the direct control and management of the Office of Information Technology. The CIO provides final approval for exceptions. |
Information Security Project Questionnaire | Provide the Information Security Office basic information about a project or purchase |