ISM-0406

History

Priority
must
2010
System users that need to bypass information security policies, procedures or mechanisms for anyreason must seek formal authorisation from an ITSM.
2008
System users that need additional access to bypass security mechanisms for any reason must seek formal authorisation from the information technology security adviser.