Related links
Access Request Form
A Manager or Supervisor must complete this form to request access for their employee. For those systems containing PHI data, this request form must be provided
Learn more
User Access Request Form
Enter the form that the user has requested to access. Authorizing Official for the system, the Information Security Office and the State Computer Security
Learn more
Sample Asset Identification and Classification Policy: - HORSE
Oct 16, 2009 The Information Security Program will protect information assets by establishing policies to identify, classify, define protection and
Learn more