Work From Home Guidance

General Description

A temporary work from home arrangement allowing work off-site for a period of time while social distancing measures are in place due to the COVID-19 pandemic. The purpose of these guidelines is to provide the fundamental elements required for this kind of temporary work arrangement to be successful and the processes to follow during this arrangement.  For all the up-to-date information on the Universities response to the Coronavirus, visit the COVID-19 website.

Tech Tips for Accessing Trinity Services from Anywhere

ITS is here to help with the technology you need to continue your academic and work endeavors no matter where you are. Below is information on how to prep and maintain your computer, which tools allow you to collaborate remotely, and how to organize your files so you can be part of the Trinity community from anywhere.

Social engineering is the largest concern at this juncture. Social engineering is a collection of psychological attacks designed to trick you into clicking bad links or accessing nefarious websites. The bad guys capitalize on fear to upload malware or to steal your credentials/accounts.

Common Clues of a Social Engineering Attack

Fortunately, common sense is your best defense. If something seems suspicious or does not feel right, it may be an attack. The most common clues include:

A tremendous sense of urgency or crisis. The attackers are attempting to rush you into making a mistake. The greater the sense of urgency, the more likely it is an attack.    

  • The pressure to bypass or ignore security policies or procedures you are expected to follow at work
  • Requests for sensitive information they should not have access to or should already know, such as your account numbers
  • An email or message from a friend or co-worker that you know, but the message does not sound like them - perhaps the wording is odd, or the signature is not right.
  • An email that appears to be from a co-worker or legitimate company, but the email is sent using a personal email address such as
  • Playing on your curiosity or something too good to be true. For example, you are notified your package was delayed, even though you never ordered a package or that you’ve won a prize in a contest that you never entered.

In times of crises, such as natural disasters and pandemics, the likelihood of charity fraud grows. You may also see an increase in “work from home” job offer scams. The bulk of these attempts are delivered through phishing emails (link is external). Attempts can also occur via social media, texting, or phone calls. Using your best judgment is key. If something smells “phishy,” better to hang up, delete the text, or report the email to Help Desk at

 Zoom is the University's preferred web conference tool. For more information on Zoom, please see our Service Catalog page for Zoom.

When Remote Access is needed to access Trinity resources, there are two methods, Virtual Desktop Infrastructure (VDI) and Virtual Private Network (VPN). Please see our Remote Access web page for more details on when and how to use these types of access.

If you require access to a laptop for a Trinity University approved work functionality, please contact your supervisor and have them place a request on your behalf by email to the Helpdesk.

Trinity University offers wireless access to the Internet and the TU Network while on campus. You will be able to access 802.11n wireless speeds across campus and on all three of the WiFi networks offered.

The following are recommendations when accessing Wi-Fi from other areas.


  • Change the router’s default administrative password (the exact steps differ by router model)

  • Use the strongest available encryption (WPA/WPA2)

  • Use anti-virus, anti-spyware, and a firewall.

  • Enable MAC Address filtering on your router (the exact steps will differ by router model)

Public Hotspots:

  • Make sure the safety features of your laptop are turned on.

  • Check that the firewall of your system is running and the file sharing service is disabled.

  • Never transmit confidential or sensitive data through a public Wi-Fi network (such as a café, bookstore, etc.)

  • Never use a public hotspot or kiosk computer to access your work computer remotely.

  • Please turn off your wireless network when you are not using it.

Set up an email auto-reply or out of office message to let people know your status and how often they can expect a response.

Provide people with information regarding how or if they can reach you and consider setting a schedule to check your voicemail messages.

Enable Two Factor Authentication on your T-mail account.

When accessing Trinity University data, follow the Information Security Policy that includes information on Protected and Restricted data. If the files you are working with are Protected or Restricted data, DO NOT save them on a personal computer.

Educate yourself on protecting yourself, your work, and your family (link is external).

Free Software is available to you or to purchase at substantial discounts.

Employees must understand the importance of system security and agree to inform their supervisor when/if security matters arise promptly. Security incidents, including loss or theft of equipment, must also be reported accordingly. Sensitive information in hard copy form must be returned to the department or shredded.

All personal computers must have Anti-malware and firewall software installed and configured to update automatically.  The operating system and all installed software must be kept updated by software vendors on a timely basis.  

To update your Windows computer, review these Steps (link is external).

To update your Apple computer follow these Steps (link is external).

To update your iPhone, iPad, or iPod touch, review these Steps (link is external).  

To update your Android device follow these Steps (link is external).

Day-to-day activities conducted on personal computers must be done using a non-privileged account. (i.e., not a member of the local admin or domain admin group)    


Article ID: 137078
Mon 3/14/22 4:01 PM
Mon 3/14/22 4:01 PM