Forms
![Default image](https://informationsecurity.wustl.edu/wp-content/plugins/washu-people-places-items//assets/images/default-items.jpg)
DUO Exception Request Form
To enhance our information security, WashU IT will require an approved exception request form for both the Call Me and Passcode authentication methods of WashU Two-Factor Authentication (2FA).
![Default image](https://informationsecurity.wustl.edu/wp-content/plugins/washu-people-places-items//assets/images/default-items.jpg)
Exception Form
In the policy exception request review process, our team works with the requestor to evaluate the risks that may arise because of the exception.
![Default image](https://informationsecurity.wustl.edu/wp-content/plugins/washu-people-places-items//assets/images/default-items.jpg)
Incident Report
Departments and schools should use this form when reporting a computer security incident that involves sensitive university information.
![Default image](https://informationsecurity.wustl.edu/wp-content/plugins/washu-people-places-items//assets/images/default-items.jpg)
IRB Security Review
In the IRB Security Review process, our team works with research coordinators to evaluate security risks involved in the research process.
![Default image](https://informationsecurity.wustl.edu/wp-content/plugins/washu-people-places-items//assets/images/default-items.jpg)
IT Procurement Vendor Intake Form
We use the IT Procurement Vendor Intake Form to collect pertinent information about prospective vendors and software platforms.
![Default image](https://informationsecurity.wustl.edu/wp-content/plugins/washu-people-places-items//assets/images/default-items.jpg)
Web Application Risk Assessment
The objective of a Web Application Risk Assessment is to identify potential risks to WashU websites, web applications, or the hosting infrastructure.