Remote Access Policy

The Remote Access Policy states the company's position on accessing the corporate network remotely.  This policy covers such topics as: permitted use of the network from remote sources, use of VPN/encryption software, and accessing the network from non-company-owned computers.

This policy seeks to define standards for accessing corporate information technology resources from outside the network.  This includes access for any reason from the employee's home, remote working locations, while traveling, etc.  The purpose is to define how to protect information assets when using an insecure transmission medium.

A Remote Access Policy developed with the application will include the following detailed sections:

1. Overview
2. Purpose
3. Scope
4. Policy
    4.1. Prohibited Actions
    4.2. Use of non-company-provided Machines
    4.3. Client Software
    4.4. Network Access
    4.5. Idle Connections
    4.6. Applicability of Other Policies
5. Enforcement
6. Definitions
7. Revision History

Available in the Silver and Gold Packages, this is a policy that is intended to be used by technical staff and management as well as distributed to end users.

Your custom Remote Access Policy will be delivered immediately upon completion of the wizard via email, as both a PDF and an RTF file.  RTF files are editable in all major word processing programs, including Microsoft Word.

Our security policies were written based on a cohesive and integrated approach using security best practices stemming from the C-I-A triad of confidentiality, integrity, and availability.  This approach aligns with both real-world and industry standard-based objectives, resulting in an invaluable resource for your security policy management.  A Remote Access Policy developed with the wizard will provide the foundation for a realistic, practical implementation of your IT security policy program.

Please contact us if you have any questions about this policy. has delivered thousands of IT Security Policies to companies from 5 to 50,000 employees.  The management of has over 20 years of successful experience in the field of information security.

Buy Now