1,707
edits
No edit summary |
(→Access) |
||
Line 132: | Line 132: | ||
Remote access to systems which contain confidential information will be accomplished through a strong authentication method with the appropriate approval processes. (See ITS Security Procedure: Workforce Member Remote Access). Individuals requiring remote access to UNMC’s e‑mail system will purchase an internet service provider and utilize the | Remote access to systems which contain confidential information will be accomplished through a strong authentication method with the appropriate approval processes. (See ITS Security Procedure: Workforce Member Remote Access). Individuals requiring remote access to UNMC’s e‑mail system will purchase an internet service provider and utilize the web based e‑mail product. | ||
Line 139: | Line 139: | ||
<br /> | <br /> | ||
<br /> | <br /> | ||
==== Misuse of UNMC information resources ==== | ==== Misuse of UNMC information resources ==== |