Federal agencies are required to ensure that their information and communication technology (ICT) is accessible to individuals with disabilities, as mandated by Section 508 of the Rehabilitation Act (29 U.S.C. § 794d). This applies to all ICT that an agency procures, develops, uses, or maintains. However, the Section 508 Standards allow certain ICT to be exempt from these requirements under specific conditions.
The Section 508 Standards identify six General Exceptions that federal agencies may use to determine whether specific ICT, or components thereof, are exempt from full conformance with the standards; they are:
Except for the Undue Burden or Fundamental Alteration, and Best Meets exceptions, the Section 508 Standards do not specify how federal agencies must process exception requests. While the Standards require that a “responsible agency official” make exception decisions, only the Undue Burden, Fundamental Alteration, and Best Meets exception types require formal documentation.
The Standards do not define who the responsible official is or what their title should be. Each agency has the discretion to designate the responsible official and determine how that role is assigned.
While each agency should develop an exceptions process that aligns with its mission, resources, and business practices, this guidance offers recommendations on documentation, reporting metrics, and roles and responsibilities to help effectively manage Section 508 General Exceptions.
Exceptions Process Models
Because the Section 508 Standards do not specify how agencies must handle exceptions, the sample models in this article illustrate optional approaches agencies can use to meet legal and compliance requirements. Agencies may adapt these examples or develop their own, as long as they establish clear policies and procedures for reviewing exceptions.
All exception requests are submitted to a single "authorizing official" or centralized review board composed of key stakeholders such as legal, IT, Section 508, or Acquisition. Reviews are conducted using standardized evaluation criteria.
Benefits:
Potential Drawbacks:
Best For Agencies:
Authority to review exceptions is delegated to program offices or subcomponents, following a common policy framework established by the central Section 508 Program Office. Periodic oversight helps ensure consistency and alignment with agency-wide standards.
Benefits:
Potential Drawbacks:
Best For Agencies:
Exception processing is integrated into existing acquisition and development workflows, including planning, design, and contract approval checkpoints.
Benefits:
Potential Drawbacks:
Best For Agencies:
Policy and Process Considerations
Whether an agency uses a centralized, federated, or integrated model for Section 508 exception processing, certain core policy elements should be in place to ensure legal compliance, audit readiness, and operational consistency. The following are common elements to consider including in your agency’s exception process.
Process Workflow
Agency procedures should explain how to create and submit a Section 508 exception request, as well as how requests are reviewed, approved, and tracked. The following example can help your agency establish procedures that align with your organization’s goals and workflow efficiency.
-
Initiate Request
- Responsible Party: Requestor such as the program office, acquisition official, or IT team.
- Actions:
- Identify the need for a Section 508 exception.
- Complete the standardized Section 508 Exception Request Form—or an equivalent document—that captures the following information:
- Type of exception
- Requestor's name
- Requestor's contact information
- Agency and component or bureau submitting the request
- Requesting office
- Name of ICT product or service
- Documentation of mitigation strategies, such as alternative access or planned remediation
- Submit the completed form and supporting documents to the designated Authorizing Official (AO).
- Submission may occur via a centralized portal, ticketing system, or official email address.
-
Evaluation and Documentation Determination
- Responsible Party: Authorizing Official
- Actions:
- Evaluate the request using established evaluation criteria or decision questions.
- Consult with stakeholders such as legal, Section 508, or IT Security, as needed.
- Approve or deny the exception request.
- Complete the submitted Exception Request Form—or equivalent document—that includes the following information:
- Final determination or decision
- Conditions, limitations, or extent of the exception granted
- Documentation of mitigation strategies, such as alternative access methods and planned remediation
- Name of the authorizing official
- Signature of the authorizing official
- Date of authorization
- Expiration or renewal date
- Exception tracking number
- Notify the requestor of the outcome and next steps.
-
Archive and Track
- Responsible Party: Section 508 Program Office or AO Support Team
- Actions:
- Log the decision and supporting documents in the Section 508 Exception tracking system.
- Tag entries for:
- Exception type
- Requesting agency and component or bureau
- Requesting office
- Specific product/services covered
- Required mitigations such as alternative means or required remediation
- Expiration date
- Store all documentation for audit readiness.
-
Reporting and Oversight
- Responsible Party: Section 508 Program Office
- Action:
- Generate quarterly or annual reports summarizing:
- The number and types of exceptions
- The status of mitigations
- Any expiring or lapsed exceptions
- Generate quarterly or annual reports summarizing:
- Submit the required information as part of the annual Governmentwide Section 508 Assessment per 29 U.S.C. 794d-1 and in any other situations where it is required.
- Share summary reports with the CIO, CAO, legal, or other oversight bodies as needed.
-
Renewal or Expiration Review
- Responsible Party: Requestor, with AO support
- Actions:
- Before expiration, reassess the need for continued exception.
- If an exception is still needed, complete the standardized Section 508 Exception Request Form from Step 1 with all required data.
Identify Authorizing Officials
Agency policy should clearly define who is responsible for managing Section 508 exception requests. These responsibilities may be assigned to existing roles—such as the Chief Information Officer (CIO), Chief Acquisition Officer (CAO), or Section 508 Program Manager—or to an Exceptions Review Board (ERB) made up of key stakeholders.
Exception Type | Recommended Authorizing Official(s) |
---|---|
E202.2 Legacy System | CIO, Section 508 PM, ERB |
E202.3 National Security | Agency Head, CIO, Section 508 PM, ERB |
E202.4 Federal Contracts | CIO, CAO, Section 508 PM, ERB, Acquisition Official |
E202.5 ICT Functions Located in Maintenance or Monitoring Spaces | CIO, CAO, Section 508 PM, ERB |
E202.6 Undue Burden or Fundamental Alteration | Agency Head, CIO, Section 508 PM, ERB |
E202.7 Best Meets | CIO, CAO, Section 508 PM, ERB |
Exception Review Criteria
Establish agencywide exception decision questions to help AOs systematically determine which ICT exceptions—if any—are applicable, ensuring thorough assessment, compliance, and supporting documentation.
Exception Type | Decision Questions |
---|---|
Legacy ICT (E202.2) |
If the answer to all questions is “yes”, then this exception applies:
|
National Security Systems (E202.3) |
If any of the following apply, your ICT may qualify for this exception:
|
Federal Contracts (E202.4) |
If the answer to all questions is “yes”, then this exception applies:
|
Maintenance/Monitoring Spaces (E202.5) |
If the answer to all questions is “yes”, then this exception applies:
|
Undue Burden/Fundamental Alteration (E202.6) |
If the answer to all questions is “yes”, your ICT may warrant this exception:
|
Best Meets (E202.7) |
If the answer to all questions is “yes”, your ICT item may warrant this exception:
|
Authorization and Expiration
Section 508 exceptions should be applied sparingly and only when Section 508 conformance cannot be achieved without causing undue burden, fundamental alteration, or when no fully conformant solution exists. To maintain accountability, exceptions must be time-bound and regularly reassessed.
All approved exceptions should:
Federal Contracts Exceptions
Section 508 E202.4 Federal Contracts, provides an exception for compliance for “[information and communication technology (ICT)] acquired by a contractor incidental to a contract shall not be required to conform to the Revised 508 Standards.”, where incidental to contract means all ICT that is exclusively owned and used by the contractor to fulfill the work statement does not require conformance with Section 508 Standards.
As contractors are at liberty to acquire ICT incidental to a contract, federal agencies may consider authorizing Federal Contracts Exceptions for all ICT procurements by including the following Section 508 Standards language in all ICT contracts:
E202 General Exceptions
E202.4 Federal Contracts. ICT acquired by a contractor incidental to a contract shall not be required to conform to the Revised 508 Standards.Alternative Means Requirements
Granting a Section 508 exception does not eliminate the agency’s responsibility to ensure that individuals with disabilities can access the information or services with the exception:
- For Undue Burden or Fundamental Alteration and Best Meets exceptions, the Section 508 Standards require that agencies provide alternate means of access to ensure individuals with disabilities receive the same information and services.
- For other exception types, alternative means of access is not explicitly required by the Standards, but it is strongly recommended as a best practice where feasible.
Agencies should establish procedures to ensure that equivalent access is considered, documented, and communicated, as needed, whenever an exception is approved. Implementation considerations should include:
- Develop an internal checklist or template to capture alternate means planning as part of the exception review process.
- Coordinate with communications and help desk teams to ensure messaging and support are in place.
- Review alternative means solutions annually, or when user needs or technologies change.
- Track user requests for alternate access to uncover common accessibility gaps and inform ongoing improvements.
Recordkeeping and Reporting
Agencies should maintain records for all Section 508 exception requests related to ICT that are procured, developed, used, or maintained. These records should be comprehensive enough to provide a clear historical trail, particularly in the event of staff turnover or personnel changes affecting familiarity with the ICT product or service.
At a minimum, exception records should:
Data Collection
Exception records should include standardized metadata fields, such as:
Metadata Label | Description |
---|---|
Exception ID Number |
Assign a unique identifier to each approved exception. For example: Format: Agency-Component-Office-Date-Sequence-Type Example: DHS-FEMA-Recovery-2024-05-08-003-Best-Meets |
Requestor’s Information | Include name and contact details such as email, phone, agency, component, and office of the requestor. |
Exception Type |
Identify the applicable exception type: Legacy ICT, National Security Systems, Federal Contracts, ICT Functions Located in Maintenance or Monitoring Spaces, Undue Burden or Fundamental Alteration, or Best Meets. |
ICT Name | Name or title of the ICT product or service. |
ICT Vendor | Name of the vendor providing the ICT product or service. |
ICT Description | A meaningful description of the ICT, including intended use and user population. |
Scope | Define the scope of the exception, including boundaries, conditions, or limitations such as specific features, modules, or users to which the exception applies. |
ICT Version | Version number or identifier of the ICT product or service. |
Acquisition Reference Number | Provide the unique acquisition number associated with this exception. |
Request Justification |
Provide rationale for the exception request, including:
|
Alternate Means of Access | Plan for providing equivalent access for users with disabilities if the ICT is not fully conformant. |
Authorizing Official (AO) | Name and title of the official responsible for reviewing and approving or denying the request. |
Determination/Status | Final status such as approved or denied, rationale for the decision, and any conditions imposed. |
Expiration/Revalidation Date | Set a date when the exception will expire or be re-evaluated, typically 12–24 months. |
Sample Exception Request Forms
Agencies that currently use business process or workflow automation tools may consider developing a standardized process for submitting, reviewing, approving, and documenting exception requests.
Agencies that do not utilize such systems may opt for a forms-based approach, such as creating an online form or a fillable PDF that can be routed to the appropriate stakeholders for review and approval. For these cases, the following sample forms are provided for consideration:
- E202.2 Legacy ICT Exception Request Form (DOCX)
- E202.3 National Security Exception Request Form (DOCX)
- E202.4 Federal Contracts Exception Request Form (DOCX)
- E202.5 ICT Functions Located in Maintenance/Monitoring Spaces Request Form (DOCX)
- E202.6 Fundamental Alteration Exception Request Form (DOCX)
- E202.6 Undue Burden Exception Request Form (DOCX)
- E202.7 Best Meets Exception Request Form (DOCX)
Related Resources
- Understanding Section 508 Exceptions
- Technology Accessibility Playbook - Play 8: Integrate accessibility needs into market research and acquisition processes
- Track and Report Conformance
- Determine Section 508 Standards
Reviewed/Updated: July 2025