Institutionally Owned Computers

Computers owned or managed by or on behalf of Drexel must operate with all required software and in the required manner described within ISR-2 or within the requirements of individually approved Exception Requests granted by the office of the Chief Information Security Officer.

Requests are to be submitted via InformationSecurity@drexel.edu.