Remote access to our corporate network is essential to maintain our team’s productivity, but in many cases this remote access originates from networks that may already be compromised or are at a significantly lower security posture than our corporate network. While these remote networks are beyond the control of CrowdFiber policy, we must mitigate these external risks to the best of our ability.

The purpose of this policy is to define rules and requirements for connecting to CrowdFiber's network from any host. These rules and requirements are designed to minimize the potential exposure to CrowdFiber from damages which may result from unauthorized use of CrowdFiber resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical CrowdFiber internal systems, and fines or other financial liabilities incurred as a result of those losses.

Remote Access

  • It is the responsibility of CrowdFiber employees, contractors, vendors and agents with remote access privileges to CrowdFiber's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to CrowdFiber.
  • General access to the Internet for recreational use through the CrowdFiber network is strictly limited to CrowdFiber employees, contractors, vendors and agents (hereafter referred to as “Authorized Users”). When accessing the CrowdFiber network from a personal computer, Authorized Users are responsible for preventing access to any CrowdFiber computer resources or data by non-Authorized Users. Performance of illegal activities through the CrowdFiber network by any user (Authorized or otherwise) is prohibited. The Authorized User bears responsibility for and consequences of misuse of the Authorized User’s access. For further information and definitions, see the Acceptable Use Policy.
  • Authorized Users will not use CrowdFiber networks to access the Internet for outside business interests.
  • For additional information regarding CrowdFiber's remote access connection options, including how to obtain a remote access login, free antivirus software, troubleshooting, etc., go to the Remote Access Services wiki entry.

Recipient Responsibilities

  1. Secure remote access must be strictly controlled with encryption (i.e., Virtual Private Networks [VPNs]) and strong pass-phrases. For further information see the Acceptable Encryption Policy and the Password Policy.
  2. Authorized Users shall protect their login and password, even from family members.
  3. While using a CrowdFiber-owned computer to remotely connect to CrowdFiber's corporate network, Authorized Users shall ensure the remote host is not connected to any other network at the same time, with the exception of personal networks that are under their complete control or under the complete control of an Authorized User or third party.
  4. Use of external resources to conduct CrowdFiber business must be approved in advance by InfoSec and the appropriate business unit manager.
  5. All hosts that are connected to CrowdFiber internal networks via remote access technologies must use the most up-to-date anti-virus software, this includes personal computers. Third party connections must comply with requirements as stated in the Third Party Agreement.
  6. Personal equipment used to connect to CrowdFiber's networks must meet the requirements of CrowdFiber-owned equipment for remote access as stated in the Hardware and Software Configuration Standards for Remote Access to CrowdFiber Networks.