- During the course of their employment, many UBC employees need to work remotely (including outside of Canada) with UBC Electronic Information, such as research, financial and Personal Information. UBC Electronic Information is generally more at risk of being compromised, corrupted or lost when accessed remotely than when accessed from internal systems, due to:
- the vulnerability of laptops or other Mobile Devices to theft or loss;
- the risk of unauthorized persons (e.g. family members, commercial service providers) viewing information;
- lower standards of physical and electronic security than on UBC premises; and
- retention of information on mobile or remote systems without some Users being aware (e.g. cached webpages and email attachments).
- This standard defines requirements for UBC employees working remotely with UBC Electronic Information on all Devices. Working remotely includes but is not limited to:
- working from home;
- working from a coffee shop or conference;
- working from a location using the Eduroam wireless network; and
- working within a health authority facility where the network is not under the control of UBC.
- This standard must be read in conjunction with the Encryption Requirements and Securing Computing and Data Storage Devices/Media standards. These standards apply to all Devices used for University Business—no matter whether they are owned by the University, by the User, or by a third party.
- The Chief Information Officer has issued this standard under the authority of Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems. Questions about this standard may be referred to firstname.lastname@example.org.
Secure Access Methods
- Wherever possible, UBC Electronic Information should be remotely accessed through a UBC System, rather than downloaded onto a Device, as this will significantly reduce the risk of loss or theft. The following are the preferred secure methods for Remote Access:
- The recommended methods to access information are to use a Virtual Private Network (VPN) or SSH interface.
- When connecting via VPN, use remote desktop (RDP) where possible, as this presents the lowest risk for Remote Access by keeping data at the university. Important points to note:
- RDP must not be used without a VPN connection;
- don't map remote drives to your local Workstation; and
- for information on using RDP, contact your University IT Support Staff.
- Alternatively, a Virtual Desktop Interface (VDI) can be used, only accessing the information inside the VDI session. VDI is a service available through UBC IT, which creates a "virtual" computer that can be accessed from home computers, laptops, desktops, tablets and even smartphones.
- Microsoft Remote Desktop Services (RDS, previously Terminal Services) is also an acceptable secure access method.
- For access methods other than the above, confirm with University IT Support Staff that the method and configuration are secure.
- Remote Access must be in compliance with the Network Protocol Requirements section of the Internet-facing Systems and Services standard.
- Do not use a network connection if a ‘certificate error’ window or other alert appears when trying to connect to a UBC System via a secure access method (as outlined in section 2.1), or if the User is otherwise uncertain about the safety of the network.
Supplemental Guidance for Personally-owned Equipment
- If a personally-owned desktop or laptop computer is accessing UBC Electronic Information and Systems using VPN with RDP, VDI or RDS then device-level encryption is not required, but is recommended.
- Ensure personally-owned routers and home networks (including IoT Devices) are properly secured (see Securing your Home Router guideline).
- Reasonable measures must be taken to prevent or reduce the possibility of loss or theft of Devices (including Multi‑Factor Authentication Devices) that are used to access or protect UBC Electronic Information such as:
- being aware of others looking over one’s shoulder at the Device when working in public locations such as coffee shops, aircraft and other public transport;
- not leaving Devices unattended in a public place, especially well-travelled areas such as airport lounges and coffee shops; and
- keeping Devices secured when working from home, e.g. storing them in a physically secured area and ensuring UBC Electronic Information cannot be accessed by family members.
Third Party Devices and Networks
- Do not access Medium, High or Very High Risk Information using third party Devices, such as kiosks in public libraries, hotels, airports, and cyber cafes, unless the Device is owned by another higher education institution or health authority in partnership with UBC (e.g. a collaborator).
- When accessing public Wi-Fi networks, such as those in airports and coffee shops, do not use the connection if a ‘certificate error’ window or other alert appears when trying to connect to a UBC System via a secure access method (as outlined in section 2), or if the User is otherwise uncertain about the safety of the network.
Related Documents and Resources
- Encryption Requirements standard
- Securing Computing and Mobile Storage Devices/Media standard
- Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems
- UBC IT myVPN Service
- UBC IT Virtual Desktop Interface (VDI)
- Internet-facing Systems and Services standard
- Securing your Home Router guideline
- UBC IT Guide to Working off Campus
Standard Last Revised: 2023-10