Wireless Communications Policy
Purpose and Scope
This policy describes how wireless technologies are to be deployed, administered, and supported at Southern Adventist University. The policy assures that wireless communication network users receive an acceptable baseline level of service in respect to reliability, integrity, availability, and security. This policy defines these rules and augments the existing university policies for computers and users.
Information Technology manages the campus-wide wireless network. This network implements the 802.11b, g, and n wireless network standards and covers all buildings and common areas on campus.
Southern’s wireless network uses 2.4 GHz and 5 GHz bands. Other wireless devices in the marketplace employ the same frequencies and may cause interference for Southern users These devices include, but are not limited to, other wireless network devices, cordless telephones, cameras, and audio speakers.
To ensure the highest level of service, the university restricts the use of all other 2.4 GHz or 5 GHz devices. If, during the normal course of operating and troubleshooting the network, Information Technology discovers unauthorized wireless devices, those devices will be disabled immediately.
Southern’s wireless network is a private network and may be accessed only by authorized users.
Information Technology is responsible for maintaining Southern’s wireless network. These responsibilities include:
- Developing and maintaining wireless communication policies and standards
- Informing users of wireless communication policies and procedures
- Deploying wireless communications systems on campus
- Resolving problems with wireless interference
- Monitoring the performance and security of the wireless network
- Monitoring the development of wireless communications technologies and, when appropriate, incorporating new technologies into the campus network.
Users are responsible for using the wireless network in accordance with this policy as well as the Network Usage Policy.
Data transmitted over the wireless network has a higher probability of being intercepted. Because of this, the network is inherently less secure. Users are responsible for the security of their own computers. The following guidelines can be used:
- Employees of the university must use a Virtual Private Network when accessing private financial or student information
- Always use secure web connections (https) when accessing private information residing on or off campus. Computers connected to the wireless network should have some sort of personal firewall installed. Most modern operating systems include personal firewall software.
- The Network Usage Policy expressly forbids multiple network cards within a single workstation. However, users are allowed to have a wireless card as well as a wired card if the following conditions are met: a) Internet Connection Sharing is turned off, b) no other bridging software is installed or configured, c) the wireless card is disabled when the computer is plugged into the wired network.
Policy evaluation and review
This policy will be reviewed periodically to ensure that it is relevant, serves the needs and priorities of the institution, and is consistent with current trends in information technology. The following evaluation process will be followed:
- Information Technology professionals review the policy and determine if changes are needed.
- The President’s Cabinet reviews the changed document.
- The Administrative Council discusses and votes final approval for policy editions.