Remote Access to Computing Systems
Information and Information Technology
- Policy Statement
- Background and Purpose
- Roles and Responsibilities
- Enforcement and Reporting
- Policy History
- Related Information
The purpose of this policy is to ensure that remote connections to Metropolitan State University of Denver computing systems are appropriately secured.
Access to MSU Denver administrative computing Virtual Private Networking services may be requested for any faculty or staff member of the University. Vendors, contractors, students, and other non-staff users requiring VPN access must contact IT Services to establish justification and appropriate access controls.
Users must complete Security Awareness Training before being granted VPN access and must complete refresher training on an annual basis. Sharing of VPN access credentials is strictly prohibited.
Regardless of the ownership of devices used for VPN access, these devices must be appropriately secured and must never be used to store confidential information.
Background: MSU Denver's information security policies were created by the IT Strategic Oversight Committee (ITSOC) Information and Instructional Technology Policies Subcommittee and reviewed by the University’s Policy Advisory Committee. Review of these policies will be made on an annual basis, with any changes or additions being submitted through the University’s policy review and approval process.
Purpose: MSU Denver’s information security policies are focused on protecting critical data and information systems of Metropolitan State University of Denver from loss, damage, or inappropriate modification or disclosure. The policies contained in this document are designed to ensure that the University adheres to security standards commensurate with the data and systems referenced, while maintaining appropriate functional access for students, faculty, and staff.
Scope: These policies apply to all individuals, including students, faculty, and staff, provided access to University data and information technology systems. Contractors and otherwise affiliated individuals must agree to abide by the information security policies before accessing university systems and data. Role-based policies and procedures that apply to specific groups of users will be provided when applicable, in accordance with functional requirements and data classification.
Approval Authority: President
Responsible Executive: Chief Information Officer
Responsible Administrator: Chief Information Security Officer
Responsible Office: Information Technology Services
Policy Contact: IT Services, msudenver.edu/technology, 303-352-7548
Adherence to Information Security Policies is mandatory and may be based on State or Federal statute, contract language, or information security standards. These policies are not intended to unreasonably interfere with system utilization. Individuals should contact the IT Services Help Desk to report security risks, violations of policy, or to make requests for exceptions or amendments to the policies. The Chief Information Security Officer (CISO) and other IT Services staff will respond to all reported security issues and will work with the policy subcommittee to allow for development of appropriate updates to policies. Violations of these policies may result in fitting administrative action up to and including revocation of system privileges, employee termination, or student expulsion.
Information about the Information and Instructional Technology Policy subcommittee is available on the IT Governance website.
Effective: July 1, 2017
- Acceptable Use of Computing Systems Policy
- Information Security Awareness Policy
- Intellectual Property Policy
- VPN Request Form
- Information and Instructional Technology Policy Subcommittee