IT Security Exception

A security exception is needed when information technology does not meet the security requirements in OU IT Security Policies.  Exceptions can exist for devices, applications, systems, and business or technical reasons.   

Below are the most common exception requests.  

Read the knowledge base articles below before submitting your exception request. 

Exceptions must be documented using this form and require the approval of the Chief Information Officer, Chief Information Security Officer, and/or the Data Owner depending upon the level or risk introduced with the exception. 

All security exceptions must be reviewed on a regular basis by OU IT Governance, Risk, and Compliance (GRC).

Cost

There are no costs associated with this service.

Availability

Available to Faculty, Staff, and Students at all campus locations.

Service Alerts

Check Alerts Subscribe

Can't find what you're looking for?

Contact Us

 
 
Request Exception

Related Articles (2)

The purpose of this Policy is to outline the acceptable use of Information Systems at all University of Oklahoma campuses. University of Oklahoma campuses include the University of Oklahoma-Norman, the OU Health Science Center, and the University of Oklahoma-Tulsa. These rules are in place to protect each campus’ information against loss or theft, unauthorized access, disclosure, copying, use, modification, or destruction (each an “Information Security Incident”). Information Security Incidents