Âé¶¹´«Ã½ÍøÕ¾

Working remotely: Checklist of considerations

If you are working from home or outside the office, consider the items on this checklist. If you need additional information or require assistance, please contact the.

  1. What files and applications do you need to access from home?

    • If you do not have home Internet access: Get a mobile device that will enable you to send email, participate in virtual meetings, make phone calls, etc. (requires approval and FOAPAL).
    • If you need to borrow a Âé¶¹´«Ã½ÍøÕ¾ laptop:Ìý³§±ð±ð .Ìý
    • Ensure that you can .
    • Use for secure cloud-based file storage and sharing.
  2. If you are using your personal home computer, it is your responsibility to take appropriate security precautions:

    • Ensure that your operating system is up to date:
    • Delete all Âé¶¹´«Ã½ÍøÕ¾ files from your computer and empty the Trash or Recycle bin once you are finished working with them.
    • Access OneDrive and SharePoint files directly from the (Do not sync Âé¶¹´«Ã½ÍøÕ¾ data to your personal device).
    • Protect your computer and other devices with
    • It is strongly recommended to purchase an encryption software for your personal devices.
  3. Set up Two-Factor Authentication (2FA) on your devices:

  4. Gather everything you will need for your work:

    • Any necessary paper documents you normally require
    • Additional hardware: (e.g. headphones, power adaptor, mouse)
  5. Security considerations:

    •  allows you to securely access Âé¶¹´«Ã½ÍøÕ¾ services when you are outside the Âé¶¹´«Ã½ÍøÕ¾ network. Connect to the VPN when accessing Banner INB, some parts of Workday, and signing into campus computers via Remote Desktop, as well as some other sites.
      It is highly recommended that you use VPN when connecting to Âé¶¹´«Ã½ÍøÕ¾ systems from networks that are not necessarily secure, such as "free" WiFi and untrusted networks.
    • If your home computing environment uses a wireless router, make sure that it is password-protected, and that you keep all devices connected to it up to date.Ìý.Ìý
    • Please respect the guidelines for storage of Âé¶¹´«Ã½ÍøÕ¾ data outlined in the Âé¶¹´«Ã½ÍøÕ¾ Cloud Data Directive and Policy on the Responsible Use of Âé¶¹´«Ã½ÍøÕ¾ Information Technology Resources.
    • Secure Your Journey. Find up to date cybersecurity articles and best practices on Âé¶¹´«Ã½ÍøÕ¾'s cybersecurity website.

More resources

Back to top