History
- Priority
- must
- 2010
- System users that need to bypass information security policies, procedures or mechanisms for anyreason must seek formal authorisation from an ITSM.
- 2008
- System users that need additional access to bypass security mechanisms for any reason must seek formal authorisation from the information technology security adviser.