Work From Home Policy

Work From Home Policy

Introduction

A Virtual Private Network (VPN) is a secured private network that provides a secure encrypted connection or tunnel over the Internet between an individual computer/device and a private network such as the Belmont University Campus Network. Use of a VPN allows members of the Belmont community to securely access campus network resources from off campus as if they were on campus. For the purpose of this document, remote access is defined as any remote connection to a Belmont University network.

Purpose

The purpose of this policy is to state the requirements for remote access to computing resources and data hosted at the university using VPN technology.

Scope

This policy applies to all VPN users of computer and network resources owned or managed by Belmont University. Resources include all university owned, licensed, or managed hardware and licensed software. They also include the university network regardless of the ownership of the device connected to the network, the means of connecting, or the locale from which the connection is made.

Policy

This policy provides the security requirements for all Belmont University employees who are manipulating and/or accessing university data classified by the Data Classification Policy as level 1 or 2 confidential information from remote locations using VPN technology.

This policy does not apply to authorized and authenticated access to email, MyBelmont, Blackboard, and/or any university publicly accessible websites.

Requirements and Practices For All Remote Users

Belmont employees and authorized third parties using the VPN must ensure that unauthorized users are not allowed access to internal university networks and associated information or data. All individuals and machines connecting remotely to university networks are subject to the university's Acceptable Use Policy.

All individuals connecting remotely shall only connect to or have access to machines and resources for which they have received permission and rights to use by the appropriate authorized university representative. All devices connecting remotely should be current on anti-virus software, operating system patches, and all application updates. Firewalls should be enabled at all times.

Additional Requirements for Remote Work

The machine/device must be trusted. This means that the machine/device must be built and maintained in a manner that creates confidence in the security of the machine. Home machines used for remote work should be used with caution when running applications prone to malware infections, such as peer-to-peer, gaming, and free (untrusted) software downloads.

Users are advised to avoid using their MyBelmont account and password or other university- related credentials on public or semi-public machines like Web kiosks.

The use of mobile devices to access email and other campus resources remotely should also be used with caution. Many of the same risks found with laptop and desktop computers apply to mobile devices. All mobile devices should employ a passcode at all times to protect access to the device.

All reasonable efforts must be made to protect university data keeping it in-house on secured servers and devices wherever possible. Users who connect remotely to university systems that contain confidential/restricted data are required by university policy to use the campus VPN to maintain security of university data.

Users needing remote access must use the VPN in conjunction with an approved remote access technology product. Users requiring VPN access must contact the Service Desk. The user’s remote access must be approved by the head of the unit/department approving them to work remotely.

Compliance

Violations of this policy will be handled according to normal disciplinary procedures. However, a user’s IT use privileges may be temporarily suspended by the Library and Information Technology Services (LITS) department prior to the initiation or completion of these procedures when there is a reasonable basis to believe that an individual is in violation of this policy.

Systems and accounts that are found to be in violation of this policy may be removed from the Belmont network, disabled, etc. as appropriate until the systems or accounts are in compliance with this policy.

Related Standards, Policies and Procedures

The Remote Access Policy is administered through a collection of Belmont standards. The Remote Access Policy and its standards are in effect at all times. LITS works in concert with the Dean of Students Office, Senior Leadership, and Human Resources to ensure fair and appropriate investigation, consideration, and consequences where appropriate. Users are expected to familiarize themselves with Belmont standards and comply with them.

  • Password Policy
  • Acceptable User Policy
  • Wireless Communication Policy
  • Technology Purchasing Policy
  • Data Classification Policy
  • Belmont Bruin Guide
  • 2020 Faculty Handbook
  • 2020 Employee Handbook
  • FERPA, HIPAA, GLBA Policies

Definition of terms

USER: Any person using any of the university’s computer or information resources including but not limited to:

  • Students, Staff, Faculty, and Alumni
  • Contractors and Consultants
  • Visiting Staff
  • Community Members and Guests
  • Other users authorized by the university
  • Third Parties (ex. Vendors, contractors, etc.)
  • Anyone connecting non-Belmont equipment (e.g. laptop computers) to the university network

LITS: Library and Information Technology Services. Belmont division that supports library and technology services for the campus.

Date of Change Responsible Summary of Change
May 19, 2016 Randall Reynolds
Director of Information Security
New Policy
Oct 20, 2016 Randall Reynolds
Director of Information Security
Policy Update
May 12, 2017 Randall Reynolds
Director of Information Security
Policy Update
March 17, 2020 William Ingram
Chief Information Officer
Policy Update