A security exception is needed when information technology does not meet the security requirements in OU IT Security Policies. Exceptions can exist for devices, applications, systems, and business or technical reasons.
Below are the most common exception requests.
Read the knowledge base articles below before submitting your exception request.
Exceptions must be documented using this form and require the approval of the Chief Information Officer, Chief Information Security Officer, and/or the Data Owner depending upon the level or risk introduced with the exception.
All security exceptions must be reviewed on a regular basis by OU IT Governance, Risk, and Compliance (GRC).
There are no costs associated with this service.
Available to Faculty, Staff, and Students at all campus locations.
Check Alerts Subscribe
Contact Us