Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

File Services (storage)

Exception Process

Form: https://security.utexas.edu/exception/ AnchorexceptionexceptionYou should consider structuring your exceptions around the following:
http://security.utexas.edu/policies/irusp.html#section_5_19

Anchor
exceptionconsiderations
exceptionconsiderations

...

According to the Information Security Office (ISO), logical security controls would consist of implementing permissions, logging, and auditing mechanisms for access to unattended systems.  For example, physical access of the "server room" should have an Access Control System in place to track who has access to a particular area, and logs when an individual has entered the controlled area. 

Form: https://security.utexas.edu/exception/

Anchor
exception
exception

In the last field of the exception form,

University Affiliates
Anchor
affiliates
affiliates

...