This security risk assessment document collects information about a project to determine if a security assessment is required. It asks questions about the project's business need, whether it involves restricted or sensitive data, who will access the system, and what known security risks exist. The project manager is responsible for gathering this information by meeting with relevant individuals. Signatures from the project manager, director of technical planning and security, client, and associate vice chancellor or director of ITS are required to certify the accuracy of the information provided.