Anglia Ruskin University Information Security Policy 104 – Staff Remote Access A member of staff seeking access from a remote workstation or laptop via a virtual private network (VPN) connection to University applications on which corporate data is stored must be subject to all security checks applied to other internal users. This policy is not intended to cover the use of web-based connections (such as Outlook Web Access (OWA) and the like). Only remote access methods provided by ISMS should be used to access University facilities. It is acceptable to connect a University issued laptop to a third party network (such as in a home broadband, hotel, airport, or hotspot) in order to access the University network remotely. Where staff members are supplied with a workstation or laptop computer for off-site use by the University, it is their personal responsibility for taking due care and consideration to ensure that it is kept secure. Users of wireless mobile e-mail devices such as PDAs must only use Universityprovided equipment and services if they wish to have support or any level of service agreement, and must comply with all University requirements in their use. Otherwise it is the owner’s personal responsibility for such services. If a wireless e-mail device is lost or stolen, the user must immediately notify ISMS so the device can be deactivated and the user’s mail file protected. Additionally, users should not attempt to change the security settings that are in place on the device. PDAs that will be used to store, transmit, process, or access University systems, files, data, and/or e-mail systems should have security controls in place designed to prevent compromise of the information. These controls must include a power-on password and virus protection software Security mechanisms designed to protect remote work stations and laptops, as well as the data contained on them, should be used where possible. These security mechanisms may include (but are not limited to): disk and/or file encryption personal firewall software (such as Windows or Apple Mac) virus protection software (such as AVG; McAfee; Sophos; Norton) operating system passwords, password protected screen savers physical security controls locking cables (which can be obtained as part of the initial purchase) It is permissible for personnel (contractors, employees or vendors) to connect their own work stations, laptops, or other computer equipment to the University network, and a visitor access mechanism has been implemented to facilitate this. However, as use of the University network and services should only be for work purposes, the appropriate approach for University employees should be the supply of a University-purchased work station for the purpose. This practice applies both to in-office connections as well as remote connections. ARU - Version 0.3 - March 2009 1 In the event that connection of a non-University device to the private network is unavoidable, the following restrictions apply: Appropriate investigation and testing should be undertaken prior to connection to ensure that the machine’s hardware and software will not be detrimental to the performance of the University’s network. This can be facilitated by ISMS. Anti-virus software, configured appropriately and regularly updated, should be installed on the machine. (such as AVG; McAfee; Sophos; Norton) The machine must be running a supported operating system and be confirmed to be patched (with relevant security and functionality patches) to the current level of University workstations. (i.e. Windows XP to SP3; Mac OS10) For contract staff, contract terms must include a provision for cessation of use and de-installation of any University software - whether in-house or purchased when the contract is terminated. Arrangements should be made to ensure that the University’s software - whether in-house or purchased – is de-installed when the requirement for the connection ceases, or beforehand, if employment or contract term ceases. (Responsibility for this action rests with the person who, or business unit which, made the arrangements.) A software based personal firewall such as Windows or Mac Firewall must be installed and active on the system to be connected to the University network. Users are discouraged from using their own personally owned work stations to undertake University-related work as those systems are not generally configured with the same degree of protection mechanisms as a University system. When doing this, the data, and in some cases applications, are transferred to the non-University work stations via a variety of routes such as: diskettes CD, DVDs tapes and cartridges via e-mail attachments via USB memory devices Appropriate steps must be taken, in advance (including encryption where appropriate), to ensure that any potential risks to the University’s information and interests are identified and effectively addressed. ARU - Version 0.3 - March 2009 2