Permitted Actions Without Identification or Authentication | AC-14

Description

  • Publicly accessible information resources such as public websites, information kiosks and other situations where risk analysis demonstrates no need for individual accountability are exempt from the requirement to identify specific users.
  • Exceptions must be approved by the Cybersecurity Manager or their designee and documented.

Last updated: 5/8/2026

Contact Hours or Questions?