• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
    • Jan Yeomans
    • Rich
  • Structure
    • Jan’s Syllabus
    • Rich’s Syllabus
  • Schedule
    • First Half of Semester
      • Week 1: IT Governance
      • Week 2: IT’s Role and the Control Environment
      • Week 3: IT Administrative Controls
      • Week 4: Enterprise Architecture
      • Week 5: IT Strategy
      • Week 6: Project Portfolio Management
      • Week 7: Policy
    • Second Half of Semeter
      • Week 8: IT Services and Quality
      • Week 9: IT Outsourcing & Cloud Computing
      • Week 10: Monitoring & Evaluating IT
      • Week 11: IT Risk
      • Week 12: IT Security
      • Week 13: Disaster Recovery & Business Continuity
  • Assignments
    • Policy Project
    • Audit Plan Project
  • Webex
    • Sessions 8/30, 9/6, 9/27, 10/11, 11/1, 11/29
  • HBR Coursepack
  • Gradebook

MIS 5202 IT Governance

Temple University

Remote Consulting Group – Team 2

October 17, 2016 by Loi Van Tran 8 Comments

Team Members: Loi Tran, Sean Walsh, Ahmed Alkaysi, & Jaspreet Marad

Policy: Remote Access Policy

PowerPoint: Remote Consulting Group.pptx

Presentation: Video

Filed Under: Week 07: Policy Documents & Video Tagged With:

Reader Interactions

Comments

  1. Nathan A. Van Cleave says

    October 18, 2016 at 2:01 pm

    Team 2,

    Your policy is concise, succinct and well written. Visually, it is a very clean read and the use of white space really helps. The manner in which you refer and point to other policies and sites (xyz.com/RAS) was sensible and appropriate. Overall, you had the key elements needed for a remote access policy with the temperate amount of granular detail. My only suggestion would be to specify the frequency that your policy is reviewed.

    Your video and pptx. are nice complements to the policy. It clearly calls out what the policy covers, who is responsible, why it is important and the consequences if it is not appropriately handled. The demo of how to log into the VPN was a great addition as well. Really well done!

    Reply
    • Andres Galarza says

      October 22, 2016 at 11:25 am

      I agree completely. The video especially felt like a “true” training video.

      One suggestion that I’ve seen made for other groups, that I think would also work well here, is to think about a “training completion certificate”. This artifact will likely help for the Audit Project that’s coming up.

      Great job.

      Reply
  2. Ivy M. McCottry says

    October 19, 2016 at 2:40 am

    Good job on the policy! Your policy really helps someone see the layered nature of security. At the end of the policy, the list of related policies and procedures is comprehensive and shows how different information and resources are both applicable and necessary for adhering to the remote access policy.

    The definitions section was a good addition for clarifying to readers the different elements of remote access such as intranet, extranet, and VPN.

    You clarify key questions in your presentation and video which users will appreciate having answers to.

    Reply
  3. Andrew P. Sardaro says

    October 19, 2016 at 9:22 pm

    Team 2, I found your Remote Access Policy to be written with great detail, particularly the policy requirements. The video does a great job with complimenting/enforcing the written portion of the policy, and the two VPN demos are great visuals. This policy would be beneficial for any employee to reference. Great Job.

    Reply
  4. Joseph Henofer says

    October 20, 2016 at 10:16 pm

    I thought the policy was well written and formatted very well. The video was really good especially at the end where it shows you the procedures for accessing the RCG remotely. Besides reading the policy I believe some people are visual learners and seeing that video would be a big help. I do have a question; how could you detect if somebody was violating the RCG remote access policy by doing a walkthrough?

    Reply
  5. Alexander B Olubajo says

    October 21, 2016 at 7:34 pm

    Team 2,

    I thought your company presented a very good amount of information on your Remote Access policy. I thought with this level of information new employees or other external users (i.e vendors, contractors etc.) without any prior knowledge on remote access will be perfectly brought up to speed. Your presentation/training video, I thought in particular was very informative and demonstrative on remote access/VPN – this way employees can know exactly what is expected of them. The only thing I found slightly odd was that your Remote Consulting Group company allows “personally owned computers” and “personally owned computing devices” to remotely access it’s corporate networks. I understand that such devices must meet the standards/requirements of “RCG-owned equipment for remote access” before being used, however I would imagine most companies that aim to reduce the risk of sensitive information/data leaks shouldn’t allow any non-corporate (non-RCG) device to remotely access their corporate network, period. Reading through the compliance section of your policy, I also thought it will be extremely difficult to implement (or at least accurately implement) some of the control measures listed on your policy to personally owned computers/computing devices. The fact that your company mandates using a two-factor authentication mechanism to remotely access its networks should be a reason not to allow personally owned computers in my opinion.

    Reply
  6. Xiaodi Ji says

    October 24, 2016 at 4:17 pm

    I like the demo which is useful for the company and training. First of all, not all employees know computer well. Thus, giving a demo can help them learn it as soon as possible, which save much time. Then, it can reduce the risk. If we do not give demo to tell employees how to do this, they will try any methods to run it. They may make mistakes or use in a wrong way which make a hidden risk. However, In the video, there are a long time that we just watch the desktop without any action. Maybe you can add some explanatory texts or somethings to full it.

    For the document, I like the seventh part of the document and mention them in the policy, which give employees some information about what policy they should should look to help them understand this policy. It is real helpful because this policy have a lot to connect with other document. If we do not tell employees where they can find these document, they may spend much time in searching them or give up finding it. However, I have a question, for the “time-out” system, is this system set by the users or by the program?

    Reply
  7. Sachin Shah says

    October 26, 2016 at 2:59 am

    A detailed and nicely written policy and video\ppt to accompany it. I like the video had a demo of accessing RCG via VPN. The policy in a way became a user guide which I think is beneficial. There were lots of requirements which were clearly stated and explained. And section 6 was a good index of definitions, this with the demo video is a “how to start” guide in understanding the policy and principles behind them. Great job!

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Weekly Discussions

  • Uncategorized (4)
  • Week 01: IT Governance (6)
  • Week 02: IT's Role & the Control Environment (3)
  • Week 03: IT Administrative Controls (2)
  • Week 04: Enterprise Architecture (2)
  • Week 05:IT Strategy (4)
  • Week 06: Project Portfolio Management (2)
  • Week 07: Policy Documents & Video (7)
  • Week 08: IT Services & Quality (2)
  • Week 09: IT Outsourcing & Cloud Computing (2)
  • Week 10: Monitoring & Evaluating IT (3)
  • Week 11: IT Risk (3)
  • Week 12: IT Security (2)
  • Week 13: Disaster Recovery & Business Continuity (1)
  • Week 14: Maturity Models (8)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in