Skip to main contentSkip to main navigationSkip to footer content

VPN Use and Request Policy

Policy Purpose

This policy defines the use of the UAFS VPN system and the means for obtaining access to the UAFS VPN system. This policy is required for the University in order to align with UA System security and auditing mandates.

Policy Statement

It shall be the policy of the University of Arkansas-Fort Smith to allow access to campus computing remotely only through VPN software approved by the IT department. All non-approved VPN software access will be denied access to the University network. Non-approved VPN software is considered a security risk.

Applicability

This policy applies to all University employees. This policy applies to students only under special conditions as were seen during the covid lockdown and the subsequent need for students to access specialized computers remotely for their classwork.

Definitions

VPN – Virtual Private Network is a means of securely accessing computing devices remotely through a private network tunnel.

Policy Procedure

1. To gain access to the UAFS VPN system an employee must first submit an incident via TeamDynamix requesting access.
2. Student access must be requested by a Faculty member along with the reason for the access.
3. Once access has been granted the user will need to follow the instructions for installing the VPN client on their personal or UAFS computer in order to login with their UAFS credentials.

Enforcement

The University firewall is configured to block all non-approved VPN software access. The only access allowed is the University approved VPN. 

Policy Management

This policy is managed by the IT department. The IT Director and appointed IT personnel are the primary administrators of this policy. The responsible executive is the VCFA.

Exclusions

Special consideration will be given to Faculty IT instructors who need their students to have access to on campus computers for school work.

Effective and Approved Date

This internal policy was approved by Terry Meadows – Director of IT/CIO on 6/16/2025

Last Updated

10/31/2025 – Reformatted for accessibility by Terry Meadows Director of IT/CIO