In an effort to keep sensitive data secure, while also understanding that our changing culture requires work to be performed remotely, Bentley employs Virtual Private Network (VPN) software to enable faculty, staff and a limited number of contractors to access certain technology resources remotely with appropriate approval. VPN access is for applications or servers only. For security purposes, Bentley does not allow VPN access to personal computers.
Faculty M or N Drive Access
Faculty may request VPN access to allow for remote access to files stored on M and N network drives. To request this access, please e-mail the Executive Director of Academic Technology, Library and On-Line Learning. The Executive Director will review the request and forward it to Bentley's Senior Network Analyst for processing.
Faculty Access To Research Servers
At times, Faculty may require temporary access to specific research servers to support their scholarly endeavors. In these cases, the faculy member must complete a "Faculty Remote Access Request Form." This form should be approved by the Dean for that area, the Executive Director of Academic Technology, Library and On-Line Learning and the COO.
Staff Access to Applications or Shared Drives
Administrative staff may request remote access to secured administrative servers and applications by completing the "Administrative Staff Remote Access Request Form", which must be approved by the employee's supervisor, the Divisional Vice President and the COO.
Third party software vendors may request temporary access to their application software to perform maintenance and upgrades and/or to resolve software bugs. In these cases, the Key User responsible for supporting the application should complete the "Contractor Remote Access Request Form" and provide the following information:
- Written approval from the Bentley sponsor for the request (the employee at Bentley with whom the contractor has the primary business relationship).
- A formal letter, signed by the contractor on company letterhead, specifying the server and/or application to which access is needed, the employee(s) who will be accessing it, the start and stop date for such access, and agreement that access will be used solely for the purpose stated.
- A copy of the confidentiality agreement that is on file or a new signed confidentiality agreement if one is not already on file.