This process is to describe how the College of Computing will adhere to USG and OIT Vulnerability management policies and standards. It is not intended to replace any policies or processes from USG and OIT. Any conflicts with these policies or any other should be reported to the College of Computing Information Security Engineer Lead or TSO management.