• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Collaboration
    • Project Management
    • Organizational Change Management
    • The Texas A&M University System Technology Summit
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • IT Governance Framework
    • Accessibility
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Primary Sidebar

Working Remotely

  • Collaboration and Remote Access Tools
  • Remote Work FAQs
  • Help for Working Remotely and Managing a Virtual Team
  • Checklist for Working Remotely (Laptop Users)
  • Equipment and Tools You Need (Laptop Users)
  • Checklist for Working Remotely (Desktop Users)
  • Equipment and Tools You Need (Desktop Users)
  • TAMUS COVID-19 Page
You are here: Home / System Offices IT Services / Working Remotely / Checklist for Working Remotely (Laptop Users)

Checklist for Working Remotely (Laptop Users)

Complete this checklist before leaving the office and heading to your remote work location.

  Gather your equipment Pack your TAMUS laptop and the power cord.

Check this list of equipment and tools you should consider when moving your TAMUS laptop to a remote work location.

Use reasonable precautions when transporting delicate electronics.

  Know your full computer password Make sure you know your username and full password. You can’t use your PIN on remote applications or on a personal computer.

You will use your computer username and password when using the collaboration and remote access tools.

Log in to each of the collaboration tools before you leave the office to make sure you can log in and your access is configured correctly. Contact helpdesk@tamus.edu with questions.

  Check your electronic files Verify that your computer files are backed-up and synced in Syncplicity.
  Gather your paper files Gather paper files, binders or hard copies of documentation you need. Keep them protected and secure while working remotely.
  Check your office phone voice mail settings Check that your voice mail is going to your Outlook Inbox (this is the default). Call your office phone and leave a message; if it comes to your Inbox you are good to go!

If you want to answer your calls as they come in, forward your calls to your mobile or landline phone (optional).

  • While looking at your office phone, push the Forward All button
  • Enter 9 + the ten-digit phone number you want to receive your calls (your mobile or landline phone)
  • Push the OK button
  • Check it by calling your office phone and making sure it rings your mobile or landline phone

Copyright © 2022 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System
Security Operations Center Governance Board

Purpose

Provides cybersecurity services to enhance the IT security position of A&M System members

 

Responsibilities

Provide financial oversight, guiding principles and strategic direction for the A&M System shared service implementation of the Security Operations Center

 

Members

Chair: SOC Board Member (rotates)
Vice Chair: SOC Board Member (rotates)
Secretary: SOC Board Member (rotates)

11 Representatives nominated and elected by the Information Security Council, consisting of:
– Two University Chief Information Officers
– One Agency Chief Information Officer
– Two University Information Security Officers
– One Agency Information Security Officer
– Five Member Cybersecurity Functional Professionals (IT Manager, Network / Security / System Administrator, Analyst, Engineer, etc.)

 

 

Upcoming Meetings

2021

  • November 4

2022

  • February 28