Remote work and information security


Remote work includes all work that is done outside of those places dedicated for work by the University of Jyväskylä. Remote workers are required to comply not only with the same information security obligations as a regular worker does, but also with those obligations that arise when working remotely. Remote work should not cause unnecessary information security risks.

Use the services and applications provided and instructed by the employer when working remotely.In this way, you take responsibility for digital security and help your organisation comply with the requirements of data protection legislation.

Be aware of the normal operation of the services you use in a remote work environment.Learn how to log in to different services in the workplace environment and how logging in works from a remote workstation.If the service asks for a username and password in a situation where it normally doesn't, stop and think.Is the situation due to remote work?Or are you entering your credentials into a scam site?

Install security updates on time.The importance of updates to the operating system, applications and information security software becomes even more important when you move away from the workplace network.

Remember to take breaks, as your brain also needs rest. When rested, your working memory functions better and you make mistakes less often.

Remember at least the following:

  • Remote work should not endanger the university’s information systems or the information contained within. While working remotely, comply with the university’s information security guidelines and instructions.
  • Use primarily devices offered to you by the university, and use these only for work.
  • Pay special attention to the handling of sensitive and confidential material if your work takes place in common spaces and/or in a shared study at home or elsewhere in so-calledcommon/public areas.
  • Use a VPN connection on open wireless networks or when on other public networks (e.g. shopping malls, hotels).
  • Check that your home Wi-Fi connections and router are protected and updated. A strong password is the first step to secure your connection. You can also change the network name (SSID) if you want.
  • In exceptional cases, you may use other devices. You are responsible for the secure use of these. Classified information can be processed only on devices provided by the university. The processing of classified information via a remote connection is prohibited.
  • If you temporarily use your home computer for work, ensure that each family member has their own user ID. Work-related material and software should only be available to university employees. Do not store the employer's material permanently on your home computer.
  • Ensure the safety of the physical environment. Make sure that only persons with access rights have access to the devices or classified information.
  • Follow the instructions provided by Digital Services when using video conferencing software.
  • Take backups of your data regularly, and safely dispose of them as well.
  • The same principles must be followed when processing documents, regardless of the place of work.Confidential material must be stored in such a way that outsiders cannot access it.
  • Cover your computer camera with, for example, a protective cover when the camera is not in use. In addition, blur the background in video calls if such a feature is available in the video application being used.

For a separate guide on remote work, go here.