- Academic Affairs
- Accountability and Compliance
- Administration and Finance
- Center for Health and Homeland Security
- Center for Information Technology Services
- Communications and Public Affairs
- Community Engagement
- Government Affairs
- Human Resource Services
- Office of Philanthropy
- Operations and Planning
- UMB Police Department
- President's Office
- Research and Development
- University Counsel
Information Technology Policies
UMB IT Remote Access Policy
Applies to Faculty, Staff, Students
Members of the campus community and others may require access to networked resources to conduct enterprise mission-related work from home, hotel rooms or off-campus offices. Providing secure remote access makes enterprise computing and information resources available well beyond the physical borders of campus. This greatly expands the universe of threats and risks to which network resources are exposed. Certain extra measures are required to protect enterprises resources under these conditions.
The purpose of this policy is to set standards for connecting to the campus network from remotely situated workstations or devices. These standards are intended to minimize the risk of network disruption and loss or disclosure of sensitive information such as intellectual property, personnel data or patient information.
This policy applies to the enterprise workforce (i.e., faculty, staff and students) as well as to vendors, contractors and others who seek access to enterprise or individual computer resources.
Remote access is a privilege granted to certain individuals who have a demonstrated need to perform mission-specific activities using enterprise resources while situated off campus. It may not be possible for everyone to receive the privilege of remote access. A person’s request for remote access to information systems that contain sensitive data must be documented in writing and authorized by his or her supervisor.
Remote access is a de facto extension of the enterprise network. Remote workstations and devices must provide as much security for the enterprise and its information resources as is provided through on-campus workstations and devices. All enterprise acceptable use and security policies that apply to access from on-campus workstations also apply to remotely connecting workstations. In particular,
Remote access must be strictly controlled through the same on-campus authentication and authorization measures. Logon information may not be shared with others. Unauthorized people (including family and friends) are not allowed to use enterprise resources.
Workstations owned by workforce members, contractors or other affiliates of the enterprise must comply with the Campus Patch Management and Anti Virus policies.
Data transmitted between remotely situated workstations and the network must be encrypted (128-bit minimum length). Acceptable mechanisms of encryption include either institutionally approved VPN or browser-based SSL connections.
Points for remote access entry into enterprise networks must be configured to drop inactive connections after 30 minutes whenever possible. Using contrivances to circumvent this requirement is prohibited.
Third-party products or services (e.g., PCAnywhere, VNC, GoToMyPC, etc.) that establish remote access or that bypass institutionally approved VPN or browser-based SSL connections may not be used unless explicitly approved by local network administrators. Third-party product access will be controlled by blocking known ports at local firewalls.
PC modems or PC fax connections to telephone equipment are not permitted without the explicit knowledge and approval of the departmental IT manager.
Because they permit unregulated interconnections between two or more networks, split tunneling and dual homing should not be used. Remote users should log off from their remote connection when they leave the computer to prevent inadvertent network access by others. Whenever it is feasible, remote access workstations should employ a personal firewall (software- or hardware-based).
Auditing and Monitoring
Information technology staff will routinely monitor logs of remote access activity and inspect network traffic for evidence of compliance with this policy. Access may be revoked at any time without notice.
Failure to follow these principles is a violation of this policy.
It is the responsibility of each departmental IT manager to make sure that they are keeping their departmental systems in compliance with the above stated policy. Failure to do so constitutes a violation of policy.