Remote-access Guide

kcc remote access

by Heber Maggio Published 2 years ago Updated 2 years ago
image

Why choose KCC?

KCC costs 1/3 less than 4-year colleges and universities and offers the same great education. Plus, financial aid & scholarships can help. KCC has degree & certificate options to fit your interests. You can transfer after KCC to complete a bachelor’s degree, or enter the workforce.

Where can I find a guide for managers within KCC?

Guides for managers within KCC (non-schools), Cantium Business Solutions, Education People Company, GEN 2, Invicta Law. If you require further support please contact one of the following teams.

How do I get remote access to my account?

All users MUST complete an eRegister request and be approved by their manager to be granted remote access. If you have any questions or require assistance, please contact the IT Service Desk at (716) 859-7777.

How do I get remote access to Kaleida Health Network?

Please see the below instructions. You will need a valid Kaleida Health Network Account. All users MUST complete an eRegister request and be approved by their manager to be granted remote access.

image

When is a KCTCS link encrypted?

Whenever a computer network connection is established between a computer and another computer at a location outside a KCTCS facility, and whenever this connection transmits or is likely to transmit Confidential KCTCS information, the link should be encrypted.

Can a third party access KCTCS?

In strictly controlled situations, a third party vendor may be authorized to access KCTCS's sensitive data environment. Both the owner of the information to which the third party will be given access and the project manager in charge of the third-party work should agree in writing to such access before it will be established. Remote-access for vendors and business partners may be activated only when needed for business purposes and must be approved by the Information Technology Manager. Vendor remote access should be deactivated after use.

image

User ID Responsibility

  • All Employees, including third parties, are responsible for the activity performed with their personal user IDs, whether or not the connection is through either internal or external network facilities. User IDs should never be shared with associates, friends, family members, or others and must never be accessed by anyone other than the individuals to whom they have been issued. E…
See more on kctcs.edu

Vpn/Direct Access

  • All connections to the sensitive data environment that originates from a location outside a KCTCS facility should be added into the approved VPN or Direct Access trusted group. The System Support Specialist can then approve or deny requests to this type of access and determine which mode of access fits the need of the user.
See more on kctcs.edu

Third-Party Access to Internal Networks

  • In strictly controlled situations, a third party vendor may be authorized to access KCTCS's sensitive data environment. Both the owner of the information to which the third party will be given access and the project manager in charge of the third-party work should agree in writing to such access before it will be established. Remote-access for vend...
See more on kctcs.edu

Encrypted Links

  • Whenever a computer network connection is established between a computer and another computer at a location outside a KCTCS facility, and whenever this connection transmits or is likely to transmit Confidential KCTCS information, the link should be encrypted.
See more on kctcs.edu

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9