More Information

Related Policies
PDF Downloads


To establish usage and documentation requirements for remote access methods used at the University of Florida.


  1. Firewalls and other technology will be used to restrict Remote Access to only approved Remote Access mechanisms.
  2. To be approved, Remote Access mechanisms must include the following technical capabilities:
    1. Allow only identified, authenticated and authorized users to connect.
    2. Provide for strong encryption of traffic.
    3. Audit logs contain sufficient information to establish the following:
      1. Event type (authentication, connection or disconnection)
      2. Date and time
      3. User associated with the event
      4. Remote and local IP addresses
      5. Event success or failure
  3. Interconnections to the UF Network require interconnection agreements. Access must be restricted to the minimum necessary to achieve the goals of the interconnection.
  4. Documentation of remote access mechanisms includes:
    1. Local and remote end points, and mechanisms intended to enforce connection only by intended end points.
    2. Intended users (based upon role or group) and mechanisms to enforce those restrictions.
    3. What university information systems and data remote users may access, and methods to enforce those restrictions.
    4. Guidance provided to users of appropriate uses of the remote access method.
  5. Remote access methods must be monitored for unauthorized use, and signs of unauthorized use promptly reported.
  6. The following remote access methods have been approved:

Effective Date

January 25, 2017