Enterprise Technology & Standards Security Standards for teleworking/remote working provided for employees and supervisors to review whenÌýconsidering a teleworking proposal or working remotely.Ìý If an employee isÌýsubmitting a teleworking proposal or working remotelyÌýthey will need to review this information, then sign, along with their supervisor, acknowledging their comprehension andÌýresponsibility to adhere to these recommendations.Ìý
Please read the following procedures to ensure you understand the Â鶹app’s cybersecurity
standards, then sign to indicate that you have read, understand and will adhere to these best practices.
Once completed,Ìýthe signed copy of theÌýstandardsÌýagreement (statements 1-15 below) along with the workplace flexibility proposal is submitted to the designated recipients.
ET& S Security StandardsÌýform forÌýTeleworking/Remote Working
- I will follow good .
- I will use University-issued equipment whenever possible (i.e. University laptops).
- It is my responsibility to ensure that the equipment I use for teleworking meets all ET&S security requirements to include:
- Configure all equipment in accordance with the UNH Computer Prep.
- Encrypt allÌýmedia (i.e. internal hard drives, external hard drives, flash drives).
- Enable all security features on equipment (i.e. passwords, screen locks, remote wipe).
- Enable all automatic operating system, application security and malware protection updates
- IfÌýI am unable to accomplish these security measures independently, ET&S can assist me.
(603) 862-2525. Customary service fees apply. - I will not share University-issued equipment (i.e. with other family members).
- I will protect equipment from theft when not in use.
- I will protect all printed material from unauthorized access.
- I will log into the UNH VPN (Pulse Secure) prior to logging into University systems remotely.
- I will store all University information on University servers whenever possible. ÌýIf not possible, temporary storage of non-restricted data on password protected and encrypted mobile devices (i.e. laptop, jump drive) are permissible with prior supervisor approval. ÌýStorage of on computers, external media and mobile devices must be approved in advance by ET&S Cybersecurity & Networking to ensure appropriate protections will be implemented.
- I will not use public computers to log into University systems that contain restricted information (i.e. Banner) or access these resources over public networks, and will not use passwords used for restricted environments on public machines or for other purposes.
- I will familiarizeÌýmyselfÌýwith phishing and vulnerability alerts provided by and obtain training from CS&N if unclear about these standards.
- I willÌýreview
- I will report all suspected compromises of computers or applications, including suspected breaches, immediately by calling (603) 862-2525.
- I will reviewÌýÌýand this policy at least annually.
- My supervisor and I will verify my equipment’s configuration is secure to current ET&S cybersecurity standards at least annually.Ìý
Additional UNH Information TechnologyÌýresources for teleworking or working from Remote Sites
- Email: UNH Exchange email is accessed using MS Outlook or through the Web using a web browser (i.e. Internet Explorer or Firefox). More information on MS OutlookÌýis availableÌýon UNHÌýIT's website for
- Computer Security: Ìý(VPN) is needed to access information in several systems from a remote site. The VPN should be used for all remote access to the university because it protects the communication between your computer and the campus.
- (i.e. phishing examples and update alerts)