Accessing TSTC Resources Remotely

TSTC Remote Access Standard and Procedures

1. Purpose

This standard establishes guidelines for Texas State Technical College (TSTC) faculty, staff, and authorized personnel regarding secure remote access to TSTC resources. The goal is to protect sensitive data, ensure network integrity, and prevent unauthorized access to internal systems.

2. Scope

This standard applies to all faculty, staff, contractors, and authorized users who access TSTC resources remotely, including but not limited to email, applications, databases, and network systems.

3. Remote Access Methods

TSTC provides two primary methods for access:

  1. Direct Access – Certain resources are available remotely without additional configurations such as certain Software as a Service applications. (Web based applications) 

  2.  Remote Access via VPN or Remote Access Clients – Required for access to internal systems that are restricted to the TSTC network.

4. Authorized Resources for Remote Access

 

SaaS (web) applications used throughout the organization may be accessible from personal or non-TSTC devices due to their cloud-based nature.

Certain On Premise applications may be available for remote access by employees if they are away from campus. Access to these applications are based on need and permission levels. If access is needed to one of these resources, please contact the OIT Help Desk. 

5. Remote Access Security Requirements

To maintain network security and compliance, all users accessing TSTC systems remotely must:

  • Use College-Issued Devices (when possible) – Personal devices must meet TSTC security standards outlined in SOS GA 5.1.4 Acceptable Use of Information Technology Resources

  • Enable Multi-Factor Authentication (MFA) – Required for all VPN and system logins.

  • Maintain Software Updates – Devices connecting to TSTC systems must have up-to-date security patches and antivirus software.

  • Use Secure Connections – Public Wi-Fi or unprotected networks should be avoided when accessing sensitive resources.

  • Report Security Incidents Immediately – Any suspicious activity must be reported to the IT Help Desk.

6. Police Department Computers (statewide) 

Under no circumstances shall any support staff or outside vendor remote into police department computers. These machines contain highly sensitive law enforcement data and must remain accessible only from designated on-site locations.

7. Student Use of Remote Access Software  

Students may not utilize remote access software to access any TSTC resources. 

For questions or concerns regarding this standard or remote access, please, contact the IT Help Desk at 1-800-592-8784 or via email at tstchelpdesk@tstc.edu.

100% helpful - 1 review