Equipment and Technology
Home Office Equipment
- determine equipment provided to those with remote (flexible) work arrangements based on the work being performed.
- coordinate remote technology equipment purchases with Purdue IT.
- plan for servicing, repair, and replacement of university-owned equipment.
- Webcam
- Monitor
- Wireless Mouse
- Keyboard
- Audio Headset
When Equipment Must be Returned
Unit leaders should work with the employee to make arrangements for the University property to be returned. The unit will pay for any costs associated with the return of university equipment upon the separation of the remote employee.
Voice Calls
Microsoft Teams and WebEx are the preferred internal communication tools.
- Microsoft Teams provides calling and collaboration (Teams sites, OneDrive, Office Online, etc.) across the Purdue system
- WebEx provides large-scale conference capabilities, integrated meeting room support, and capabilities for making and receiving phone calls via a campus-provided phone number.
- If you have previously utilized the soft-phone client Cisco Jabber, it cannot run simultaneously with WebEx. Please sign out and close Jabber and then install or launch WebEx.
Securing Devices
Individuals are responsible for the security of computing devices under their control that interact with Purdue’s IT resources. All users must follow the measures outlined in the Authentication, Authorization and Access Controls (S-13) Standard and End User Security Guidelines.
Users must also adhere to any supplemental policies issued by departmental IT units and/or the owners of the IT resource(s) to be remotely accessed. Collectively, these policies identify the basic principles for protecting the confidentiality, integrity, and availability of University IT resources. A few of the guidelines are included below:
- Utilize Purdue’s VPN service to access IT Resources that are only available on campus.
- Utilize Purdue Career Account and Multi-factor Authentication service.
- Ensure the Remote Host meets the security expectations specified in the End User Security Guidelines.
- Take reasonable precautions to ensure Remote Access connections are secured from interceptions, eavesdropping or misuse including, but not limited to, shielding their screen from view in a public area when accessing sensitive or restricted data and not sharing the Remote Host with another party for use while it is remotely connected.
- Follow University Data Handling Procedures and any departmental requirements including, but not limited to, those associated with federal, state or local laws, such as HIPAA, FERPA, etc.