PURPOSE
Remote access to ºÚÁϳԹÏÍøUniversity networks and/or IT resources is often necessary to maintain employee and/or student productivity, but in most cases, remote access will originate from external networks that operate at a significantly lower security posture than ºÚÁϳԹÏÍøUniversity’s campus network. Everyone needs to take an equal part in helping to minimize and mitigate external risks.
The purpose of this guideline is to define rules and requirements for connecting to ºÚÁϳԹÏÍøUniversity’s network from any external host; from off-campus; or, outside of the campus network. These rules and requirements are designed to minimize the potential exposure to ºÚÁϳԹÏÍøUniversity from damages which may result from unauthorized use of ºÚÁϳԹÏÍøUniversity IT resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical ºÚÁϳԹÏÍøUniversity internal systems, and fines or other financial liabilities incurred as a result of those losses.
This guideline applies to all ºÚÁϳԹÏÍøUniversity users, including students faculty, staff, and agents operating on behalf of ºÚÁϳԹÏÍøUniversity on a university owned device or a personally owned computing devices used to connect to the ºÚÁϳԹÏÍøUniversity network or internet resources. This guideline applies to remote access connections used to do work on behalf of ºÚÁϳԹÏÍøUniversity, including reading/sending email, accessing core network and/or data systems, use of the virtual desktop infrastructure (i.e. Citrix), and viewing of any ºÚÁϳԹÏÍøUniversity IT resources from home. This guideline covers all technical implementations of remote access used to connect to ºÚÁϳԹÏÍøUniversity networks.
GUIDELINES
It is the responsibility of all ºÚÁϳԹÏÍøUniversity users, including students faculty, staff, and agents operating on behalf of ºÚÁϳԹÏÍøUniversity, with remote access privileges to ºÚÁϳԹÏÍøUniversity’s campus infrastructure network, to ensure that their remote access connection is given the same consideration as the user’s on-site connection at ºÚÁϳԹÏÍøUniversity.
When accessing the ºÚÁϳԹÏÍøUniversity network from a personally owned computing device, all users are responsible for preventing access to any ºÚÁϳԹÏÍøUniversity IT resources, including data, by non-Authorized Users. Performance of illegal activities through the ºÚÁϳԹÏÍøUniversity network by any user (Authorized or otherwise) is prohibited, as outlined in BOG Policy #35 as well as the Acceptable Use Policy. Users assume the responsibility for and any affiliated consequences of misuse of the campus network by usage of remote access. For further information and definitions, see the Acceptable Use Policy.
Employees who have not been issued a ºÚÁϳԹÏÍøUniversity owned computer are responsible for ensuring that they have the proper IT approved software/hardware technology to perform their job duties from a remote location on a personally owned computing device. These devices may include, but are not limited to, computer, tablet, telephone, and peripherals (e.g. monitor, docking station, keyboard, mouse, headset, etc.). Equipment supplied by the employee, will be maintained by the employee. ºÚÁϳԹÏÍøUniversity accepts no responsibility for damage or repairs to employee-owned equipment. ºÚÁϳԹÏÍøUniversity reserves the right to make alterations to standards and/or determinations as to what quantifies as appropriate equipment, subject to change at any time. Equipment supplied by ºÚÁϳԹÏÍøUniversity is to be used for university purposes only. Upon termination of employment, all ºÚÁϳԹÏÍøUniversity property will be returned to ºÚÁϳԹÏÍøUniversity, unless other arrangements have been made in writing and approved by the employee’s Executive sponsor.
All employees will establish an appropriate work environment that is to be utilized at home or remote for school/work purposes. ºÚÁϳԹÏÍøUniversity will not be responsible for costs associated with the setup of employee’s home office and/or modifications to the employee home office space, network connectivity, or affiliated non-ºÚÁϳԹÏÍøapproved/utilized software.
For additional information regarding ºÚÁϳԹÏÍøUniversity’s remote access connection options, including how to obtain a remote access login, anti-virus software, troubleshooting, etc., please visit the ºÚÁϳԹÏÍøUniversity IT Services website.
REQUIREMENTS
- Secure, remote access must be strictly controlled with strong, data-encryption (i.e. Virtual Private Networks) and strong passwords/phrases.
- Users shall protect their username and passwords, even from family members, and will not share their login credentials with any other authorized or unauthorized user.
- While using a ºÚÁϳԹÏÍøUniversity’s owned computer to remotely connect to ºÚÁϳԹÏÍøUniversity’s network, users shall ensure the remote host is not connected to any other network at the same time, with the exception of personal networks that are under their complete control or under the complete control of an Authorized User or Third Party.
- Use of external resources to conduct ºÚÁϳԹÏÍøUniversity’s operational, scholarship, research or other university business must be approved in advance.
- All hosts that are connected to ºÚÁϳԹÏÍøUniversity’s internal networks via remote access technologies must use up-to-date anti-virus software, exhibit regular software patches to vendor supported operating systems, and ensure secure connections whenever possible.
- Other personally owned equipment used to connect to ºÚÁϳԹÏÍøUniversity’s networks must meet the requirements of ºÚÁϳԹÏÍøUniversity’s owned equipment for remote access.
- Users shall enable a password-protected screen saver with a short timeout period to ensure that workstations that were left unsecured will be protected.
- Lost or stolen ºÚÁϳԹÏÍøUniversity computing devices must be reported immediately by using the Incident Management reporting process.
- Store all ºÚÁϳԹÏÍøUniversity resources, data, and documents in an approved ºÚÁϳԹÏÍøUniversity location (ex: network shared drives, Microsoft OneDrive, or personal M drives on the ºÚÁϳԹÏÍøUniversity network), as outlined in the Acceptable Use Policy.
- Storing any ºÚÁϳԹÏÍøUniversity data and/or sensitive information, including protected, private, and nonpublic information on a local, personal computing device, storage array, personal cloud service is strictly prohibited, as outlined in BOG Policy #35 and the Acceptable Use Policy.
- Users need to consider securing ºÚÁϳԹÏÍøUniversity owned laptops with the use of cable locks or locking laptops in drawers or cabinets when not in use.
- Users are encouraged to leverage the use of adequate surge protection.
- Wireless infrastructure devices that provide direct access to the ºÚÁϳԹÏÍøUniversity network, must enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST, PEAP, or EAP-TLS.
- When enabling WPA-PSK, configure a complex shared secret key (at least 20 characters) on the wireless client and the wireless access point.
SCOPE of AFFECTED PARTIES
These guidelines apply to all users, such as students, faculty, and staff of ºÚÁϳԹÏÍøUniversity and to other persons accessing ºÚÁϳԹÏÍøUniversity information assets and/or IT resources including but not limited to authorized agents or community members, regardless of whether such information asset or IT resource is accessed from on-campus or off-campus.
ROLES & RESPONSIBILITIES
All ºÚÁϳԹÏÍøUniversity students, faculty, staff, and other parties with access to ºÚÁϳԹÏÍøUniversity information assets and IT resources shall be responsible for:
USERS
- Adhere to these guidelines, as well as operate in compliance with all applicable laws and ºÚÁϳԹÏÍøUniversity policies, standards, guidelines, regulations, and procedures.
- Physically secure and safeguard ºÚÁϳԹÏÍøUniversity IT resources and/or affiliated data within the user’s possession and control, including abiding with the safe handling of data.
- Report promptly to itworkorder@shepherd.edu any issue with a user’s account, IT resource, or to report a lost/stolen ºÚÁϳԹÏÍøUniversity owned computing device.
CIO/CISO – INFORMATION PRIVACY OFFICER
- Ensure compliance with the utilization of tools, reports, inspections, audits, to confirm users are abiding to these guidelines.
- Provide authorization and direction to IT Services staff in accordance with these guidelines.
- Develop awareness and necessary training materials as it pertains to these guidelines.
IT SERVICES STAFF
- With appropriate authorization, take directed action in accordance with these guidelines to preserve, secure, and protect the interests of ºÚÁϳԹÏÍøUniversity.
- Ensure all associated procedures are followed and documented accordingly when taking any actions outlined in these guidelines.
RELATED TOOLS
RELATED POLICIES
BOG#35: Information Technology Security
Acceptable Use Policy
E-Mail
IT Information Security & Privacy Policy
Social Security Number Guidelines
GUIDELINE: Remote Access Guidelines
IMPACT: Data, Technology, and IT Resources
RESPONSIBLE OFFICE: IT Services
CREATED: August 18, 2021
REVISED: November 28, 2022
APPROVED BY: CIO/CISO – Information Privacy Officer
VERSION: 23.1