A. Rowan University provides secure remote access technologies that enable authorized users to remotely access the university network and its internal resources.
B. The purpose of this policy is to define standards for connecting to the Rowan University network from any remote host. These standards are designed to minimize the potential exposure to the University from damages which may result from unauthorized use of university resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc.
Under the direction of the President, the Chief Information Officer and the Director of Information Security shall implement and ensure compliance with this policy.
A. This policy applies to all University employees, students, and affiliates including vendors and agents with a university owned or personally-owned computer or workstation used to connect to Rowan University network. This policy applies to remote access connections used to do work on behalf Rowan University or for personal business, including reading or sending email and viewing intranet web resources.
B. Remote access implementations that are covered by this policy include, but are not limited to, dial-up modems, DSL, FIOS, VPN, SSH, WiFi and cable modems, etc.
A. Cable Modem - Cable companies such as Comcast provide Internet access over Cable TV coaxial cable. A cable modem accepts this coaxial cable and can receive data from the Internet at over 1.5 Mbps.
B. Dial-up Modem - A peripheral device that connects computers to each other for sending communications via the telephone lines.
C. Digital Subscriber Line (DSL) - Is a form of high-speed Internet access used over standard phone lines.
D. Fiber Optic Service (FIOS) - Is a data communications service provided by Verizon that uses fiber optic cables to transfer data.
E. Remote Access - Connection to a data-processing system from a remote location, for example through a virtual private network.
F. Secure Shell (SSH) - Is a secure network protocol for secure network communication services between two networked computers.
G. Virtual Private Network (VPN) - Extends a private network across a public network, such as the Internet using secure communication.
H. Wi-Fi - Wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A Wi-Fi enabled device such as a PC, mobile phone, or PDA can connect to the Internet when within range of a wireless network.
A. Information Security Policy
A. Remote access is provided for university related activity only. All devices that are used to connect to the university network through an approved remote access technology are considered to be extensions of the university network and are subject to all applicable university policies, standards and rules.
Students will not be granted remote access privileges.
Affiliates (personnel that are not faculty or staff at the University) who require remote access privileges will be granted access on a case by case basis. Affiliations may be requested by faculty and staff and are subject to an annual approval process.
The purpose of this policy is to define standards for connecting to the Rowan University network from any remote host. These standards are designed to minimize the potential exposure to the University from damages which may result from unauthorized use of university resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc.
B. Technology Configuration and Management
C. Authorization
D. Requirements:
A. Violation of this policy may result in disciplinary action up to and including termination for employees and temporaries; a termination of employment relations in the case of contractors or consultants; dismissal for interns and volunteers.
By Direction of the CIO:
__________________________________
Mira Lalovic-Hand,
VP and Chief Information Officer