Skip to main content Skip to main content

Remote Access to Computing Systems

Information and Technology


Policy Statement

The purpose of this policy is to ensure that remote connections to Metropolitan State University of Denver computing systems are appropriately secured.

VPN Access

Access to MSU Denver administrative computing Virtual Private Networking services may be requested for any faculty or staff member of the University. Vendors, contractors, students, and other non-staff users requiring VPN access must contact IT Services to establish justification and appropriate access controls.

Users must complete Security Awareness Training before being granted VPN access and must complete refresher training on an annual basis. Sharing of VPN access credentials is strictly prohibited.


Regardless of the ownership of devices used for VPN access, these devices must be appropriately secured and must never be used to store confidential information.

Background and Purpose

Background: MSU Denver's information security policies were created by the IT Strategic Oversight Committee (ITSOC) Information and Instructional Technology Policies Subcommittee and reviewed by the University’s Policy Advisory Committee. Review of these policies will be made on an annual basis, with any changes or additions being submitted through the University’s policy review and approval process.

Purpose: MSU Denver’s information security policies are focused on protecting critical data and information systems of Metropolitan State University of Denver from loss, damage, or inappropriate modification or disclosure. The policies contained in this document are designed to ensure that the University adheres to security standards commensurate with the data and systems referenced, while maintaining appropriate functional access for students, faculty, and staff.

Scope: These policies apply to all individuals, including students, faculty, and staff, provided access to University data and information technology systems. Contractors and otherwise affiliated individuals must agree to abide by the information security policies before accessing university systems and data. Role-based policies and procedures that apply to specific groups of users will be provided when applicable, in accordance with functional requirements and data classification.

Roles and Responsibilities

Responsible Executive: Chief Information Officer

Responsible Administrator: Chief Information Security Officer

Responsible Office: Information Technology Services

Policy Contact: IT Services,, 303-352-7548

Enforcement and Reporting

Adherence to Information Security Policies is mandatory and may be based on State or Federal statute, contract language, or information security standards. These policies are not intended to unreasonably interfere with system utilization. Individuals should contact the IT Services Help Desk to report security risks, violations of policy, or to make requests for exceptions or amendments to the policies. The Chief Information Security Officer (CISO) and other IT Services staff will respond to all reported security issues and will work with the policy subcommittee to allow for development of appropriate updates to policies. Violations of these policies may result in fitting administrative action up to and including revocation of system privileges, employee termination, or student expulsion.

Information about the Information and Instructional Technology Policy subcommittee is available on the IT Governance website.

Policy History

Effective: July 1, 2017

Approved by: President

Related Information

Edit this page