Policy 14 - Wireless Communication Policy
1.0 Purpose
This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to the °ÄÃÅ¿ª½±½á¹û network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by Information Systems are approved for connectivity to a °ÄÃÅ¿ª½±½á¹û network. Any questions or comments about this policy should be directed to Information Systems.
2.0 Scope
All employees, students, contractors, consultants and temporary workers at Murray State University, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of °ÄÃÅ¿ª½±½á¹û, must adhere to this policy. This policy applies to all wireless infrastructure devices that connect to a °ÄÃÅ¿ª½±½á¹û network or reside on a °ÄÃÅ¿ª½±½á¹û site that provides wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data.
3.0 Policy
3.1 General Network Access Requirements
All wireless infrastructure devices that reside at a °ÄÃÅ¿ª½±½á¹û site or connect to a °ÄÃÅ¿ª½±½á¹û network must:
- Be installed, supported and maintained by Information Systems.
- Use °ÄÃÅ¿ª½±½á¹û approved authentication protocols and infrastructure.
- Use °ÄÃÅ¿ª½±½á¹û approved encryption protocols.
- Maintain a hardware address (MAC address) that can be registered and tracked.
- Not interfere with other wireless access deployments.
3.2 Lab and Isolated Wireless Device Requirements
Lab and isolated wireless devices must:
- Be approved by Information Systems.
- Not interfere with other wireless access deployments.
4.0 Enforcement
Anyone found to have violated this policy may be subject to disciplinary action according to personnel policies and procedures. Students may be referred to Student Affairs for discipline. Also any rogue access points found on the Murray State property may be confiscated. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with °ÄÃÅ¿ª½±½á¹û.
5.0 Definitions
Wireless infrastructure devices
Wireless infrastructure devices are devices that provide wireless connectivity. Some examples of these devices are wireless access points, repeaters, bridges, etc.
Policy adopted: 02-25-2011
Revision adopted:
Policy approval and adoption: °ÄÃÅ¿ª½±½á¹û President's Office and Information
Systems Security