RESOURCE COLLECTION
Exception Requests
DPH workforce members may have business-related reasons to deviate from DPH's standard IT Security protocols. Any request to deviate from standard IT Security and Privacy measures must be approved. Any request must have a legitimate business justification in order to be approved.
On this page you will find resources on:
- Requesting email encryption bypass
- Requesting non-standard software or hardware
- Requesting third party email.