Getting Started (revise this..)
To prepare for teleworking, Transportation and Public Works staff must submit paperwork, complete a training, and determine what software best meets their needs.
Last updated
To prepare for teleworking, Transportation and Public Works staff must submit paperwork, complete a training, and determine what software best meets their needs.
Last updated
Review the Telework Personnel Procedure (pg 1-5) and complete attached Telework Self-certification Safety Checklist for Alternate Work Site to affirm that you have a work site suitable for teleworking.
Complete the Telework Request Form
There are several tools available to staff for remote work.
These options will enable you to remote into your city computer from your personal computer. This means you will have the same applications, configuration, etc. available to you at home as you do in the office, even if you do not have a city-owned laptop.
Other Alternative?
You need to be on the City of Austin network to access various resources such as shared network drives, the HR Portal, the original CitySpace, and many City of Austin SharePoint sites.
When working remotely without an Ethernet connection, you can use a VPN to access these resources and securely send and receive data. A VPN allows you to use a laptop computer or mobile device as if it were directly connected to a private network.
NetMotion - NetMotion is the simplest VPN option. If you have a city-owned laptop, it most likely has NetMotion installed already.
Cisco AnyConnect - If you are working from a personal computer or a City-owned laptop without NetMotion, you will want to use Cisco AnyConnect. It requires a more extensive set up.
The client we use to remotely connect to the City network from a Mac.
Citrix Access Request Form (Default Service Request form)
If you use your personal computer for work at the any CoA office be advised that you should never directly connect to the CoA Ethernet network. You can connect to the CoA internal network via VPN when necessary. CTM runs occasional security scans for devices that shouldn't be on the network and if they discover your personal computer, they reserve the right to take your computer, run scans, and review files.