Remote Network Access Policy

Photo of It-digital-crystals

Remote Network Access Policy

Policy Name: Remote Network Access Policy
Policy ID Number: 03-05-020
Version Effective Date: June, 2010
Last Reviewed on: January 1, 2019
Policy Applies To: University wide
Responsible Office: Information Technology


INTRODUCTION AND STATEMENT OF PURPOSE
Remote network access is provided for those faculty and staff who find themselves doing university business from a remote location, such as home or when traveling. Remote access to the 野花社区 data network is also provided to consultants and contractors as needed. While the connection is as secure as possible, remote access is inherently a security risk. Consequently, policy and procedures are required to minimize this risk.

野花社区 provides remote network access so that authorized personnel have access to network services from off campus. The policy, procedures, and guidelines provided in this document were developed to minimize risk associated with this activity. It is, therefore, very important that members of the university and contracted workers who are granted remote access privileges follow these regulations.

Definitions
Remote network access involves setting up a virtual private network (VPN) connection between the remote computer using VPN client software and a special gateway router that allows access to the university network over the Internet. This requires a high-speed connection to the Internet via an Internet Service Provider. Access is granted to users by login, using an account name and password combination. When actively connected to the 野花社区 network, all traffic to and from the remotely attached PC is through the VPN tunnel, including Internet browsing.

VPN client software provides an encrypted connection between an individual and a private network, so activity over this connection is secure and private. By utilizing the public Internet for data transport, VPN provides a low cost solution to remote access or connectivity. In effect, this allows members of the University community to access 野花社区 network recourses as if they were on campus.

POLICY
Administrators, IT staff, faculty and authorized contractors are permitted remote network access through VPN client software with the approval of the requester鈥檚 supervisor and/or the head of the Department of Information Technology (IT) or by contractual agreement. VPN is a "user managed" service. This means that the user is responsible for selecting an Internet Service Provider (ISP), coordinating installation, installing any required software, and paying associated connection fees.

Additionally,

  • VPN access is provided through the Department of Information Technology. No other department may implement VPN services.
  • Only the VPN client software distributed by IT may be used.
  • VPN account names and passwords will be assigned by an IT network administrator or authorized delegate.
  • It is the responsibility of employees and third parties with VPN privileges to ensure that unauthorized users are not allowed access the 野花社区 network.
  • All network activity during a VPN session is subject to 野花社区 policies and may be monitored for compliance.
  • Dual (split) tunneling is NOT permitted during VPN sessions to the 野花社区 network.
  • All computers connected to the 野花社区 network via VPN or any other technology must use the most up-to-date anti-virus software that meets or exceeds the corporate standard. Proof of compliance is required prior to the assignment of a VPN account.
  • VPN users will be automatically disconnected from the 野花社区 network after thirty minutes of inactivity. The user must then logon again to reconnect to the network. Pings or other artificial network processes are not to be used to keep the connection open.
  • The VPN gateway is limited to an absolute connection time of 24 hours.
  • Users of computers that are not 野花社区-owned equipment must configure the equipment to comply with 野花社区's VPN and Network policies.
  • By using VPN technology with personal equipment, users must understand that their machines are a de facto extension of the 野花社区 network, and as such are subject to the same rules and regulations that apply to 野花社区-owned equipment.

Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Consultants and contractors will be subject to legal action up to and including the payment of fines and penalties that may be incurred, and immediate termination of all contractual agreements.

Key Performance Indicators (KPIs)
The following success of the policy will be assessed annually using the following quantifiable measures:

  • No security issues over this connection
  • No violations of policy

Procedures
Employees

  • Employees must discuss the viability of remote access with their immediate supervisor.
  • If the supervisor approves, enter a request for VPN services via the Online Remote Access Request Form for Faculty and Staff.
  • Upon request, provide proof of anti-virus compliance to the IT network administrator.
  • The IT network administrator or delegate will provide the software and setup instructions.
  • Install the VPN software on the target computer as instructed.

Consultants and Contractors
Intention of use must be included with bid submissions and in final contracts.

  • The Online Remote Access Request Form for Consultant and Contractors must be completed for each individual who will be utilizing remote access.
  • Each individual must provide proof of anti-virus compliance to the IT network administrator.
  • The IT network administrator or delegate will provide the software and setup instructions.
  • Install the VPN software on the target computer as instructed.

Guidelines
The minimum hardware/software requirements for connectivity are:

  • A computer capable of providing appropriate network connectivity
  • Broadband connection to the Internet via a local Internet Service Provider (ISP)
  • Internet interface device (provided by and connects to the ISP network)
  • Ethernet network interface in computer (connects to ISP interface device)
  • VPN Client Software (provided by IT) and installation instructions

DATE TO INITIATE REVIEW AND UPDATE
As deemed necessary or appropriate by the Policy Coordinator but at a minimum, at least every 5 years from the date of last review.