Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Office/Contact: Division of Technology and Security

Source: SDBOR Policies 7:1, 7:4, and 7:6


Link: https://www.sdbor.edu/policy/documents/7-1.pdf; https://www.sdbor.edu/policy/documents/7-
4.pdf; https://www.sdbor.edu/policy/documents/7-6.pdf
Associated Forms: VPN Request Form; Third Party Agreement Form

SOUTH DAKOTA STATE UNIVERSITY


Policy and Procedure Manual

SUBJECT: Remote Access and Authentication


NUMBER: 7:8

1. Purpose

This policy and its procedures set forth the guidelines for the University to provide remote access
to its network users in a secure manner.

2. Policy

a. The University’s Division of Technology and Security provides a remote connection to


the University’s network using Virtual Private Network (“VPN”) software.

b. The Vice President for Technology and Security, or designee, is responsible for
reviewing, processing, and approving or denying requests for remote access to the
University’s network in conformity with all applicable SDBOR and University policies
and state and federal law.

c. University employees wanting VPN access are required to complete and submit a VPN
Request Form.

d. Vendors accessing the University’s network from outside the University are required to
complete and submit a Third Party Agreement Form.

e. This policy applies to any connection to the University’s internal network using an
external connection.

3. Procedures

a. VPN access is available to employees by completing the VPN Request Form on


InsideState. The form is then submitted to and approved by the individual’s supervisor
and, if necessary, the Vice President for Technology and Security, or designee.

i. Full-Time Salaried Employees are granted access with their supervisor’s


approval.

ii. Full-Time Hourly Employees are granted access with their supervisor’s and the
Vice President for Technology and Security, or designee’s approval.

Remote Access and Authentication Page 1 of 2


iii. Graduate Assistants are granted access on a case-by-case basis.

b. Vendors requesting access to the University’s network from outside the University must
contact the Division of Technology and Security for the Third Party Agreement Form
and receive approval from the Vice President for Technology and Security, or designee.

4. Responsible Administrator

The Vice President for Technology & Security, or designee, is responsible for the annual and ad
hoc review of this policy and its procedures. The University President is responsible for formal
policy approval.

SOURCE: Approved by President on 11/17/2015.

Remote Access and Authentication Page 2 of 2

You might also like