Forms
Information Security Office Forms
Information Resources Acceptable Use and Security Policy Agreement
All individuals granted access to or use of System Information Resources must be aware of and agree to abide by the following acceptable use requirements
Security Exception Form
The purpose of the Security Exception is to identify risks associated with policy non-compliance and to verify acceptance, from the appropriate stakeholders, that they agree to accept the risk and to the recommendations for managing risk. Please be aware that all approved Security Exceptions have a finite expiration date and will need to be renewed at least annually and are required to be reported to the President of the University.Technology Assessment
Technology Assessment is a standardized assessment process of software, hardware and service purchases which ensures that technical and security requirements are met, adequate resources are available, all requirements and risks are fully identified, and redundancy of software is avoided.
Use Case for Approved Software
This form is intended for faculty and staff requesting departmental use of software that is already approved, currently in use by another department, and listed in the university’s software directory. Approval of this use case form authorizes the requesting department to use the software; however, it does not provide software licenses. Securing the appropriate licenses remains the sole responsibility of the requestor.
Approval confirms only that the software may be used by the department—it does not grant, guarantee, or supply any licenses associated with the software.
Special Equipment Procurement
This form and process govern requests for non-standard computing equipment used in special projects or when budget constraints necessitate alternatives, ensuring compliance with university, state, and federal policies.