Remote access policy

Last revision on February 10, 2023

1. Policy Statement

  • Remote access to our corporate network is essential to maintain Random Team’s productivity, but in many cases this remote access originates from networks that may already be compromised or are at a significantly lower security posture than our corporate network.

  • While these remote networks are beyond the control of Random Team, we must mitigate these external risks the best of our ability.

2. Purpose

  • The purpose of this policy is to define rules and requirements for connecting to Random Team network from any host.

  • These rules and requirements are designed to minimize the potential exposure to Random Team from damages which may result from unauthorized use of Random Team resources.

  • Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Random Team internal systems, and fines or other financial liabilities incurred as a result of those losses.

3. Scope

  • This policy applies to all employees of Random Team, and all contractors, consultants, temporary employees and business partners with a Random Team-owned or personally-owned computer or mobile phone used to connect to Random Team network.

4. Policy

  • It is the responsibility of Random Team employees, contractors, consultants, temporary employees and business partners with remote access privileges to Random Team’s corporate network to ensure that their remote access connection is given the same consideration as the user’s on-site connection to Random Team.

  • General access to the Internet for recreational use through Random Team network is strictly limited to Random Team employees, contractors, consultants, temporary employees and business partners (hereafter referred to as “Authorized Users”). When accessing Random Team network from a personal computer, Authorized Users are responsible for preventing access to any Random Team computer resources or data by non-Authorized Users. Performance of illegal activities through Random Team network by any user (Authorized or otherwise) is prohibited. The Authorized User bears responsibility for and consequences of misuse of the Authorized User’s access. For further information and definitions, see the Acceptable Use Policy.

  • Authorized Users will not use Random Team networks to access the Internet for outside business interests.

Requirements:

  • Secure remote access must be strictly controlled with encryption (i.e., Virtual Private Networks (VPNs)) and strong passwords. For further information see the Security Policy.

  • Authorized Users shall protect their login and password, even from family members.

  • While using a Random Team-owned computer to remotely connect to Random Team’s corporate network, Authorized Users shall ensure the remote host is not connected to any other network at the same time, with the exception of personal networks that are under their complete control or under the complete control of an Authorized User or Third Party.

  • All hosts that are connected to Random Team internal networks via remote access technologies must use the most up-to-date anti-virus software.

  • Personal equipment used to connect to Random Team networks must meet the requirements stated in the Security Policy.

Last updated