Institutionally Owned Computers
Computers owned or managed by or on behalf of Drexel must operate with all required software and in the required manner described within ISR-2 or within the requirements of individually approved Exception Requests granted by the office of the Chief Information Security Officer.
Requests are to be submitted via InformationSecurity@drexel.edu.