Sign up

Policy Exception Policy

Purpose #

The purpose of this policy is to ensure that exceptions to security policies are documented and approved through a formal exception process.

Scope: This policy applies to all published Nested Knowledge information security policies. Employees and contractors must abide by this exception process.

Policy #

An exception to an information security policy may be granted in the following cases:

  • The implicated system does not have the capacity to comply with the relevant security standard.
  • Immediate compliance would disrupt critical business
  • A more secure or superior solution exists
  • Compliance would adversely affect business operations
  • A lawsuit or investigation requires exception to the relevant security policy.
  • Compliance would cause a major adverse financial loss
  • An emergency situation requires violation of the relevant security policy.

To Request an Exception:

Email or slack the information security team to request an exception. You request must contain the following information:

  • Your name
  • The implicated policy.
  • The device or application affected by the request.
  • Data classification category of the associated systems.
  • The rationale for non-compliance with the policy.
  • Duration of non-compliance expected.
  • Assessment of risks.
  • Controls in place to mitigate risks.

Compliance #

Policy exception requests will be reviewed monthly or as they occur.

Revision History #

AuthorDate of Revision/ReviewComments/Description
K. Cowie10/31/2024Revised
K. Cowie02/07/2023Draft Completed
Updated on October 31, 2024
Did this article help?

Have a question?

Send us an email and we’ll get back to you as quickly as we can!