Skip to main content

Guideline for Remote Access

I. Purpose

The purpose of this document is to provide guidance for protecting university information resources from unauthorized access or disclosure when connecting remotely to university networks, systems, and devices that are otherwise not publicly available.

II. Scope

This guideline is applicable to UNC Charlotte faculty, staff, students and all authorized users granted access to university information resources via remote access. Every authorized user of university information resources has a responsibility to take appropriate measures to safeguard that information.

III. Contacts

Direct any general questions about this guideline to your unit’s Information Security Liaison. If you have specific questions, please contact OneIT Information Security Compliance at ISCompliance-group@charlotte.edu.

IV. Guidelines

When authorized individuals have a business need to remotely access an on-campus desktop computer, or who need wider access to campus resources that contain confidential, sensitive and/or highly restricted information and may be accessible only via the campus network, they may be provided with access to the university’s VPN solution. The university’s VPN solution provides a mechanism for secure remote access and utilizes the university’s multi-factor authentication solution. Use of the university’s VPN solution may be combined with an approved remote access technology such as Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC).

A. General Guidelines

Faculty/Staff and students granted remote access to university networks, systems, and devices should follow these security guidelines:

B. VPN Access

C. Vendors and Contractors Remote Access

EXCEPTIONS: In order for Faculty/Staff to use a non-university owned or an unmanaged device, a Remote Access exception request must be submitted to the Office of OneIT for authorization.

Related Resources

ISO/IEC 27002 was adopted by The University of North Carolina at Charlotte in 2012. All standards and guidelines are based on this code of practice for Information Security Management.

Revision History

Initially approved by Information Assurance Committee 9/23/16
Updated and approved by Information Assurance Committee 3/1/23