Â鶹AV

Working remotely: Checklist of considerations

If you are working from home or outside the office, consider the items on this checklist. If you need additional information or require assistance, please contact the.

  1. What files and applications do you need to access from home?

    • If you do not have home Internet access: Get a mobile device that will enable you to send email, participate in virtual meetings, make phone calls, etc. (requires approval and FOAPAL).
    • If you need to borrow a Â鶹AV laptop:Ìý³§±ð±ð .Ìý
    • Ensure that you can .
    • Use MS OneDrive for secure cloud-based file storage and sharing.
  2. If you are using your personal home computer, it is your responsibility to take appropriate security precautions:

    • Ensure that your operating system is up to date:
    • Delete all Â鶹AV files from your computer and empty the Trash or Recycle bin once you are finished working with them.
    • Access OneDrive and SharePoint files directly from the (Do not sync Â鶹AV data to your personal device).
    • Protect your computer and other devices with
    • It is strongly recommended to purchase an encryption software for your personal devices.
  3. Set up Two-Factor Authentication (2FA) on your devices:

  4. Gather everything you will need for your work:

    • Any necessary paper documents you normally require
    • Additional hardware: (e.g. headphones, power adaptor, mouse)
  5. Security considerations:

    • Â鶹AV Virtual Private Network (VPN) allows you to securely access Â鶹AV services when you are outside the Â鶹AV network. Connect to the VPN when accessing Banner INB, some parts of Workday, and signing into campus computers via Remote Desktop, as well as some other sites.
      It is highly recommended that you use VPN when connecting to Â鶹AV systems from networks that are not necessarily secure, such as "free" WiFi and untrusted networks.
    • If your home computing environment uses a wireless router, make sure that it is password-protected, and that you keep all devices connected to it up to date.Ìý.Ìý
    • Please respect the guidelines for storage of Â鶹AV data outlined in the Â鶹AV Cloud Data Directive and Policy on the Responsible Use of Â鶹AV Information Technology Resources.
    • Secure Your Journey. Find up to date cybersecurity articles and best practices on Â鶹AV's cybersecurity website.

More resources

Back to top