Remote-access Guide

kscs remote access

by Miss Lorena Gulgowski Published 2 years ago Updated 1 year ago
image

When is a KCTCS link encrypted?

Whenever a computer network connection is established between a computer and another computer at a location outside a KCTCS facility, and whenever this connection transmits or is likely to transmit Confidential KCTCS information, the link should be encrypted.

Can a third party access KCTCS?

In strictly controlled situations, a third party vendor may be authorized to access KCTCS's sensitive data environment. Both the owner of the information to which the third party will be given access and the project manager in charge of the third-party work should agree in writing to such access before it will be established. Remote-access for vendors and business partners may be activated only when needed for business purposes and must be approved by the Information Technology Manager. Vendor remote access should be deactivated after use.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9