Onboarding

Remote Access Policy

1.0 Purpose The purpose of this policy is to define standards for connecting to CUSTOMER’s network from any host. These standards are designed to minimize the potential exposure to the CUSTOMER and MANAGED SERVICE PROVIDER from damages which may result from unauthorized use of company resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical internal systems, etc.

2.0 Scope This policy applies to all CUSTOMER employees, contractors, vendors and agents with a company owned or personally owned computer or workstation used to connect to the CUSTOMER network. This policy applies to remote access connections used to do work on behalf of CUSTOMER, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems.

3.0 Policy CUSTOMER will follow this policy as outlined by the MANAGED SERVICE PROVIDER.

3.1 General

  1.  It is the responsibility of CUSTOMER employees, contractors, vendors, and agents with remote access privileges to CUSTOMER's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection.
  2.  General access to the Internet for recreational use by immediate household family on personal computers that have access to the CUSTOMER network is permitted. The employee is responsible to ensure the family member does not violate any policies, does not perform illegal activities, and does not access the CUSTOMER network while using the device for recreational activities. The CUSTOMER employee bears responsibility for the consequences should the access be misused.
  3.  Please review all CUSTOMER technology policies provided by CUSTOMER for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of CUSTOMER's network.

3.2 Requirements

  1.  Secure remote access must be strictly controlled. Control will be enforced via strong passwords and one-time password authentication (otherwise known as two-factor authentication) via email, text message, or Google Authenticator.
  2.  Strong passwords are defined as, for this purpose, 16-character passwords with at least 1 uppercase letter, 1 lowercase letter, 1 symbol, and 1 number.
  3. At no time should any CUSTOMER employee provide their login or email password to anyone, not even family members.
  4. CUSTOMER employees and contractors with remote access privileges must ensure that their company-owned or personal computer or workstation, which is remotely connected to CUSTOMER's corporate network, is not connected to any other network at the same time, with the exception of personal networks that are under the complete control of the user.
  5. CUSTOMER employees and contractors with remote access privileges to CUSTOMER's corporate network must not use non-company email accounts (i.e., Outlook, Yahoo, Gmail), or other external resources to conduct company business, thereby ensuring that official business is never confused with personal business.
  6. Reconfiguration of a home user's equipment for the purpose of split-tunneling or dual homing is not permitted at any time.
  7. Non-standard hardware configurations must be approved by MANAGED SERVICE PROVIDER and CUSTOMER; and the CTO of CUSTOMER must approve security configurations for access to hardware.
  8. All hosts that are connected to CUSTOMER’s internal networks via remote access technologies must use the most up-to-date anti-virus software, this includes personal computers. Third party connections must comply with requirements as stated in their agreement.
  9. Personal equipment that is used to connect to CUSTOMER's networks must meet the requirements of company-owned equipment for remote access.

4.0 Enforcement CUSTOMER agrees to take responsibility upon enforcing the Remote Access Policy upon all CUSTOMER employees, contractors, vendors, and agents with remote access privileges to CUSTOMER's corporate network.

4.1 Compliance Any CUSTOMER found to have violated this policy may have their remote access connections suspended and/or terminated by MANAGED SERVICE PROVIDER without notice.

5.0 Release of Liability The CUSTOMER accepts the risks of remote access to CUSTOMER internal network and its systems and releases the MANAGED SERVICE PROVIDER from any responsibility resulting from incidents related to such risks. The CUSTOMER agrees that the MANAGED SERVICE PROVIDER shall not be held responsible or legally liable for the decision or any future consequences of the CUSTOMER’s decision(s) in regards to remote access for CUSTOMER’s employees, contractors, vendors, and agents with remote access privileges to CUSTOMER's corporate network.

6.0 Definitions

Term Definition Cable Modem Cable companies such as Comcast provide Internet access over Cable TV coaxial cable. A cable modem accepts this coaxial cable and can receive data from the Internet at over 1.5 Mbps. Cable is currently available only in certain communities.

Dual Homing Having concurrent connectivity to more than one network from a computer or network device. Examples include: Being logged into the Corporate network via a local Ethernet connection, and connecting into another Internet service provider (ISP). Being on a Company-provided Remote Access home network, and connecting to another network, such as a spouse's remote access. Configuring an ISDN router to dial into CUSTOMER and an ISP, depending on packet destination. DSL Digital Subscriber Line (DSL) is a form of high-speed Internet access competing with cable modems. DSL works over standard phone lines and supports data speeds of over 2 Mbps downstream (to the user) and slower speeds upstream (to the Internet).

ISDN There are two flavors of Integrated Services Digital Network or ISDN: BRIand PRI. BRI is used for home office/remote access. BRI has two "Bearer" channels at 64kbit (aggregate 128kb) and 1 D channel for signaling info.

Remote Access Any access to CUSTOMER's corporate network through a non- CUSTOMER controlled network, device, or medium. Split-tunneling Simultaneous direct access to a non-CUSTOMER network (such as the Internet, or a home network) from a remote device (PC, PDA, WAP phone, etc.) while connected into CUSTOMER's corporate network via a VPN tunnel. VPN Virtual Private Network (VPN) is a method for accessing a remote network via "tunneling" through the Internet.

7.0 Acknowledgement

By signing below the CUSTOMER acknowledges that it has read this information and has elected to accept all risks related to remote access of corporate systems.

The signature below indicates that the CUSTOMER signee has the authority to accept this policy on behalf of CUSTOMER’s company.

We’re committed to your privacy. SADOS may use the information you provide to us to contact you about our relevant content, products, and services. We do not provide your information to third-parties. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Ready to upgrade your IT?

Book a meeting now and you'll be on your way to faster, better IT.