AutoLit® User Guide
Examining Results in Synthesis
Administrative Tools
Support and FAQs
How to Perform Systematic Review
How to Perform a Meta-Analysis
Best Practices for Writing Your Manuscript
Additional Tips for Making a Nest
AutoLit® User Guide
Examining Results in Synthesis
Administrative Tools
Support and FAQs
How to Perform Systematic Review
How to Perform a Meta-Analysis
Best Practices for Writing Your Manuscript
Additional Tips for Making a Nest
The purpose of this policy is to ensure that exceptions to security policies are documented and approved through an exception process.
This policy applies to all published Nested Knowledge information security policies. Employees and contractors must abide by this exception process.
An exception to an information security policy may be granted in the following cases:
Email or slack the information security team to request an exception. You request must contain the following information:
Steve would like to share Carl's Pizza Planet Account to order Pies for after-hour work events. This violates our access control policy, which Steve is well-acquainted with, as he pays close attention during annual trainings. Steve's request might look like the following:
Policy exception requests will be reviewed monthly or as they occur.
Author | Date of Revision/Review | Comments/Description |
---|---|---|
K. Cowie | 02/07/2023 | Draft Completed |