Loading
Get It Security Standard 5003s Exception Request
How it works
-
Open form follow the instructions
-
Easily sign the form with your finger
-
Send filled & signed form or save
How to fill out the IT Security Standard 5003s Exception Request online
Filling out the IT Security Standard 5003s Exception Request online is an important process for university departments seeking exceptions to IT security requirements. This guide provides a clear and comprehensive overview to assist users in completing the form accurately and efficiently.
Follow the steps to successfully complete your exception request
- Press the ‘Get Form’ button to access the IT Security Standard 5003s Exception Request and open it in your document editor.
- Begin by entering the 'Department Name' in the designated field to identify the department making the exception request.
- Fill in the 'Contact Name' field with the name of the person submitting the request to ensure there is a point of contact for any inquiries.
- Enter the 'Contact Phone #' so that the Information Security Officer can reach out if further information is required.
- In the 'Requested Exception' section, clearly describe the specific requirement of the IT Security Standard 5003s from which you are seeking an exception.
- Provide a comprehensive 'Justification of the Exception' that explains why the exception is necessary and any relevant circumstances.
- Outline the 'Scope and Duration of the Exception,' specifying how long the exception will be needed and the contexts in which it will apply.
- Discuss the 'Risks Related to the Exception' outlining any potential security issues that may arise from granting this exception.
- Identify the 'Controls in Place to Reduce the Risk of the Exception,' including measures taken to mitigate the outlined risks.
- Summarize the 'Remaining Risk of the Exception with Controls in Place,' demonstrating your assessment of risk after controls are implemented.
- Ensure that the Dean/Director reviews and approves the request by providing their name and signature in the specified fields.
- Next, obtain the necessary approval from the Area Vice President, including their name and signature, thereby acknowledging the associated risks.
- Finally, submit for approval from the Division of Information Technology by ensuring the Vice President of IT & CIO and the Information Security Officer sign the document.
- Once all signatures are in place, you can save any changes, download, print, or share the completed form as required.
Take the next step towards submitting your IT Security Standard 5003s Exception Request online today.
Industry-leading security and compliance
US Legal Forms protects your data by complying with industry-specific security standards.
-
In businnes since 199725+ years providing professional legal documents.
-
Accredited businessGuarantees that a business meets BBB accreditation standards in the US and Canada.
-
Secured by BraintreeValidated Level 1 PCI DSS compliant payment gateway that accepts most major credit and debit card brands from across the globe.