CAES IS-3 Exception Request

 

After submitting the IS-3 Exception Request form, the email address provided during the process will receive a confirmation email that the request was received as well as an email at the end of the approval process.


If approved, prior to the Exception Request expiration date, the email address provided will also receive a reminder email to renew the Exception Request if it is still required.



IMPORTANT: Before completing this form, you must complete a Protection Level Assessment and, depending on the exception, a Vendor Risk Assessment.





 

Requestor Information

 

 

Please enter your first and last name

 

Enter your UC Davis email address.


NOTE: A copy of the request will be sent to this email address.

 

Enter a phone number you can be reached at.

Phone
 

Select your local IT Department from the list.

 





 

Related Records

 

 

What is the Assessment ID (CAES-PLA-#####) for the CAES Protection Level Assessment?


IMPORTANT

BE SURE TO ENTER A FULL PLA ID, INCLUDING "CAES-PLA-"


IF A VALID PLA ID IS NOT PROVIDED, YOUR EXCEPTION REQUEST WILL BE AUTOMATICALLY CANCELLED AND YOU WILL NEED TO RESUBMIT


If you are unsure what to enter here, please contact your local IT Department.

 

Does this Exception Request have a CAES Vendor Risk Assessment associated with it?

 

Is this Exception Request a renewal to an existing/previous Exception Request?

 





 

Exception Request Information

 

 

Provide a brief description of the exception being requested.

 

Provide the business justification for the exception being requested.

 
 

Select an available template that matches your Exception Request needs or choose Custom Exception.

 

Does this CAES Exception Request require additional actions from the Technical UISL?

 

Provide any relevant links related to this request.

 

Provide any deadlines that are dependent on this exception request.

 
mm/dd/yyyy
 

Provide any additional comments that were not captured above.

 
 





 

Risk and Mitigation

 

 

Provide details regarding the risk that would exist if this exception request was approved, as it relates to the data that this involves.


Example(s):

  • If the software/hardware is compromised, the data used with the software, or on the device, could also be compromised.
 
 

Provide details regarding the actions and/or considerations that will be taken to mitigate the Description of Risk provided above if the identified risk(s) occur.

 
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.