ºÚÁϳԹÏÍø

Main Menu

Work from Home & Remote Access Guidelines

PURPOSE

Remote access to ºÚÁϳԹÏÍøUniversity networks and/or IT resources is often necessary to maintain employee and/or student productivity, but in most cases, remote access will originate from external networks that operate at a significantly lower security posture than ºÚÁϳԹÏÍøUniversity’s campus network. Everyone needs to take an equal part in helping to minimize and mitigate external risks.

The purpose of this guideline is to define rules and requirements for connecting to ºÚÁϳԹÏÍøUniversity’s network from any external host; from off-campus; or, outside of the campus network. These rules and requirements are designed to minimize the potential exposure to ºÚÁϳԹÏÍøUniversity from damages which may result from unauthorized use of ºÚÁϳԹÏÍøUniversity IT resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical ºÚÁϳԹÏÍøUniversity internal systems, and fines or other financial liabilities incurred as a result of those losses.

This guideline applies to all ºÚÁϳԹÏÍøUniversity users, including students faculty, staff, and agents operating on behalf of ºÚÁϳԹÏÍøUniversity on a university owned device or a personally owned computing devices used to connect to the ºÚÁϳԹÏÍøUniversity network or internet resources. This guideline applies to remote access connections used to do work on behalf of ºÚÁϳԹÏÍøUniversity, including reading/sending email, accessing core network and/or data systems, use of the virtual desktop infrastructure (i.e. Citrix), and viewing of any ºÚÁϳԹÏÍøUniversity IT resources from home. This guideline covers all technical implementations of remote access used to connect to ºÚÁϳԹÏÍøUniversity networks.

GUIDELINES

It is the responsibility of all ºÚÁϳԹÏÍøUniversity users, including students faculty, staff, and agents operating on behalf of ºÚÁϳԹÏÍøUniversity, with remote access privileges to ºÚÁϳԹÏÍøUniversity’s campus infrastructure network, to ensure that their remote access connection is given the same consideration as the user’s on-site connection at ºÚÁϳԹÏÍøUniversity.

When accessing the ºÚÁϳԹÏÍøUniversity network from a personally owned computing device, all users are responsible for preventing access to any ºÚÁϳԹÏÍøUniversity IT resources, including data, by non-Authorized Users. Performance of illegal activities through the ºÚÁϳԹÏÍøUniversity network by any user (Authorized or otherwise) is prohibited, as outlined in BOG Policy #35 as well as the Acceptable Use Policy. Users assume the responsibility for and any affiliated consequences of misuse of the campus network by usage of remote access. For further information and definitions, see the Acceptable Use Policy.

Employees who have not been issued a ºÚÁϳԹÏÍøUniversity owned computer are responsible for ensuring that they have the proper IT approved software/hardware technology to perform their job duties from a remote location on a personally owned computing device. These devices may include, but are not limited to, computer, tablet, telephone, and peripherals (e.g. monitor, docking station, keyboard, mouse, headset, etc.). Equipment supplied by the employee, will be maintained by the employee. ºÚÁϳԹÏÍøUniversity accepts no responsibility for damage or repairs to employee-owned equipment. ºÚÁϳԹÏÍøUniversity reserves the right to make alterations to standards and/or determinations as to what quantifies as appropriate equipment, subject to change at any time. Equipment supplied by ºÚÁϳԹÏÍøUniversity is to be used for university purposes only. Upon termination of employment, all ºÚÁϳԹÏÍøUniversity property will be returned to ºÚÁϳԹÏÍøUniversity, unless other arrangements have been made in writing and approved by the employee’s Executive sponsor.

All employees will establish an appropriate work environment that is to be utilized at home or remote for school/work purposes. ºÚÁϳԹÏÍøUniversity will not be responsible for costs associated with the setup of employee’s home office and/or modifications to the employee home office space, network connectivity, or affiliated non-ºÚÁϳԹÏÍøapproved/utilized software.

For additional information regarding ºÚÁϳԹÏÍøUniversity’s remote access connection options, including how to obtain a remote access login, anti-virus software, troubleshooting, etc., please visit the ºÚÁϳԹÏÍøUniversity IT Services website.

REQUIREMENTS

SCOPE of AFFECTED PARTIES

These guidelines apply to all users, such as students, faculty, and staff of ºÚÁϳԹÏÍøUniversity and to other persons accessing ºÚÁϳԹÏÍøUniversity information assets and/or IT resources including but not limited to authorized agents or community members, regardless of whether such information asset or IT resource is accessed from on-campus or off-campus.

ROLES & RESPONSIBILITIES

All ºÚÁϳԹÏÍøUniversity students, faculty, staff, and other parties with access to ºÚÁϳԹÏÍøUniversity information assets and IT resources shall be responsible for:

USERS


CIO/CISO – INFORMATION PRIVACY OFFICER


IT SERVICES STAFF


RELATED TOOLS

RELATED POLICIES

BOG#35: Information Technology Security
Acceptable Use Policy
E-Mail
IT Information Security & Privacy Policy
Social Security Number Guidelines


GUIDELINE: Remote Access Guidelines
IMPACT: Data, Technology, and IT Resources
RESPONSIBLE OFFICE: IT Services
CREATED: August 18, 2021
REVISED: November 28, 2022
APPROVED BY: CIO/CISO – Information Privacy Officer
VERSION: 23.1