For UWM faculty and staff members, this webpage highlights useful resources for telecommuting and remote work. You are encouraged to communicate with your units (schools, colleges, divisions, departments) about any unit-specific “best practices” or guidelines.

Returning to campus? Check out the Campus Technology Readiness page for guidance and best practices.

Using a UWM-issued laptop

If you have a UWM-issued laptop, that is the recommended option for working remotely and accessing UWM resources. When logging into your device each day, also be sure to connect to the Virtual Private Network (VPN), GlobalProtect VPN.

The VPN affords several benefits to UWM employees that are working remotely. Using UWM’s VPN allows you to remotely access your on-campus device, gives off-campus access to UWM’s network drives, and ensures that you continue to receive regular updates to your computer.

Remote Desktop with VPN to a University Computer

You may be able to use a personal computer to connect remotely to your UWM computer that is physically located on-campus. Using Remote Desktop allows you to access your files and software just like when you are on campus. You will need to stay connected to the Virtual Private Network (VPN), GlobalProtect VPN to use Remote Desktop.

Using a personal computer

If you lack access to a UWM-issued laptop, you can use a personal computer to perform many work-related tasks. Tasks you can perform include:

Please note: UWM files should not be stored on personal computing devices.

Best Practices

To help work remotely in a secure manner, please keep these best practices in mind:

  • Microsoft Teams offers many features, including instant messaging, videoconferencing, conference calling, and file sharing. These tools allow you to collaborate with colleagues from anywhere you have an internet connection.
  • Password and account credential sharing is strictly prohibited, including sharing with other members of your household. All passwords and login information for devices and system logins are required to be kept private.  
  • Lock device screens when not in use and keep devices secure from theft by not leaving them unattended in public areas.  
  • Be aware of phishing emails. Many online threats come from phishing or online scams, urging you to click a button or follow a link and reveal sensitive information. Always double check who the request is from and look for indicators such as spelling errors and language of extreme urgency. 
  • Report any loss of device, suspected compromised account or other suspicious activity with UWM’s Cybersecurity Incident Report.

Getting Help

If you need support to help you work remotely, please contact the UWM Help Desk.