This web page provides links to a number of forms that are required for compliance purposes. Unless indicated otherwise, all of the forms are available directly on the University HOP Forms/Exhibits Index page.
- Always verify that you're filling the latest version of a form. Utilizing an outdated form may cause it to be rejected.
- Please make sure that the information provided in the forms is accurate and complete. In order to avoid delays, you may send a preview of the form to the Information Security Office before you obtain signatures.
- In order to avoid any misinterpretation, please fill the forms electronically. Handwritten forms will not be accepted.
- Always obtain the appropriate authorizing signature.
List of Forms
|18-1||Computing Device Encryption Exception Request||Request an encryption exception for an University owned device (Laptop, Desktop, Mobile Device, etc).|
|18-2||Information Resource Vulnerability Risk Acceptance Form||Risk acceptance for vulnerabilities that are discovered on a computing device.|
|18-4||Server Management Policy (HOP ADM 5-602)Exception Form||Request information security approval to maintain a server outside the direct control and management of the Office of Information Technology. The CIO provides final approval for exceptions.|