Skip to main content


This web page provides links to a number of forms that are required for compliance purposes. Unless indicated otherwise, all of the forms are available directly on the University HOP Forms/Exhibits Index page.

General Instructions

  1. Always verify that you're filling the latest version of a form. Utilizing an outdated form may cause it to be rejected.

  2. Please make sure that the information provided in the forms is accurate and complete. In order to avoid delays, you may send a preview of the form to the Information Security Office before you obtain signatures.

  3. In order to avoid any misinterpretation, please fill the forms electronically. Handwritten forms will not be accepted.

  4. Always obtain the appropriate authorizing signature.

List of Forms

Form Number Name Purpose
18-1 Computing Device Encryption Exception Request Request an encryption exception for an University owned device (Laptop, Desktop, Mobile Device, etc).
18-2 Information Resource Vulnerability Risk Acceptance Form Risk acceptance for vulnerabilities that are discovered on a computing device.
18-4 Server Management Policy (HOP ADM 5-602)Exception Form Request information security approval to maintain a server outside the direct control and management of the Office of Information Technology. The CIO provides final approval for exceptions.
Information_Security_Sponsoring_Department Procurement_Questionnaire Provide the Information Security Office basic information about a project or purchase