Information Security
Security Exemption Process
Last modified 1/28/2021
Security exemptions are documented exceptions to following published processes, procedures, or standards.
This process should be followed for requesting and maintaining security exemptions.
Process
- A department requires an exemption for a published Process, Procedure, or Standard.
- A department representative or system owner requests an exemption.
- The Information Security Office validates the request and publishes the exemption request to a department-viewable resource.
- The Information Security Office requests approval from the Chief Information Security Officer for a finite period of time.
- If not approved, the process ends here.
- The Information Security Office requests exemption approval from the head of department.
- If not approved, the process ends here.
- The Information Security Office publishes the approved exemption to a department-viewable resource.
- The Information Security Office receives a ticket when the exemption has expired.
- The Information Security Office will verify the original issue has been resolved with the system owner or department representative.
- Alternatively, a new exemption can be requested to restart the process.
- The Information Security Office closes the ticket after resolution.