Non-Standard Device Questionnaire - Information Security Office 2025

Get Form
Non-Standard Device Questionnaire - Information Security Office Preview on Page 1

Here's how it works

01. Edit your form online
Type text, add images, blackout confidential details, add comments, highlights and more.
02. Sign it in a few clicks
Draw your signature, type it, upload its image, or use your mobile device as a signature pad.
03. Share your form with others
Send it via email, link, or fax. You can also download it, export it or print it out.

How to use or fill out Non-Standard Device Questionnaire - Information Security Office

Form edit decoration
9.5
Ease of Setup
DocHub User Ratings on G2
9.0
Ease of Use
DocHub User Ratings on G2
  1. Click ‘Get Form’ to open it in the editor.
  2. Begin by entering your personal information, including your first name, last name, email address, and telephone number. This ensures that the Information Security Office can contact you regarding your request.
  3. Select the type of device you are requesting from the 'Requested Device Type' section. Choose between a computing device or a data storage device and provide the manufacturer and model number.
  4. In the description field, detail the purpose of the device. This helps assess compliance with security protocols.
  5. Indicate what kind of data will be stored on the device by checking all applicable boxes under 'Regulatory Compliance'.
  6. If traveling abroad with the device, answer 'YES' or 'NO' and follow any additional instructions provided for sanctioned countries.
  7. Review and agree to the terms outlined in the agreement section before signing and dating your submission.

Start using our platform today to complete your Non-Standard Device Questionnaire effortlessly!

See more Non-Standard Device Questionnaire - Information Security Office versions

We've got more versions of the Non-Standard Device Questionnaire - Information Security Office form. Select the right Non-Standard Device Questionnaire - Information Security Office version from the list and start editing it straight away!
Versions Form popularity Fillable & printable
2019 4.8 Satisfied (123 Votes)
be ready to get more

Complete this form in 5 minutes or less

Get form

Got questions?

We have answers to the most popular questions from our customers. If you can't find an answer to your question, please contact us.
Contact us
The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.
The Standardized Information Gathering (SIG) Questionnaire was created to help businesses improve the management of their third-party risks across multiple categories, including cybersecurity, operational and data governance, and supply chain risks.
be ready to get more

Complete this form in 5 minutes or less

Get form