Wireless Access Policy
RSS

Wireless Access Policy

Wireless Access Policy
Arkansas Tech University
 
Purpose and Scope

The goal of this policy is to protect Arkansas Tech University’s technology-based resources from unauthorized use and/or malicious attack that could result in loss of information, damage to critical applications, or damage to our public image. All users employing wireless methods of accessing the University’s technology resources must adhere to the University’s defined processes for doing so. Unauthorized access to the wireless network is not allowed.

Wireless networks are not a replacement for a wired network. The University's wireless network is an extension to the existing wired network, wireless access should not be used for work sessions that require the transfer of large amounts of data (e.g., backups or file downloads) or for access to sensitive organizational data.

The following policy is complementary to any previously implemented policies dealing specifically with network access and remote access to the enterprise network.
 
Supported Technology

In order to provide wireless access to authorized users, the Office of Information Systems (OIS) must install "access points" in and around the campus. These access points are generally small, antenna-equipped boxes that connect directly to the local area network (LAN), converting the LAN's digital signals into radio signals. The radio signals are sent to the network interface card (NIC) of the mobile device (e.g. iPad, laptop, etc.), which then converts the radio signal back to a digital format the mobile device can use.


"Rogue" access points are antennas that are installed without the knowledge or permission of Arkansas Tech University, used by individuals to gain illegal access to the University's network.

Arkansas Tech University supports the following devices and equipment for accessing our network and systems wirelessly:
  • Access Points installed by the OIS
  • Cisco and Cisco-compatible client devices
  • Linux Kernel 2.6 or newer
  • Microsoft Windows Vista or newer
  • Mac OS X 10.6 and above
Policy and Appropriate Use

All wireless access points within the University's firewall must be approved and centrally managed by the OIS. The addition of new wireless access points within campus facilities will be managed at the sole discretion of the OIS. Non-sanctioned installations of wireless equipment, or use of unauthorized equipment on campus premises, are strictly forbidden.

The OIS will occasionally conduct sweeps of the wireless network to ensure there are no rogue access points present.

OIS reserves the right to turn off without notice any access point connected to the network that it feels puts the university's systems, data, and users at risk.

All wireless clients and devices shall be required to be fully patched and have installed a recommended and up to date anti-virus software. The user shall update these applications as required, and will not reconfigure them in any way. 802.11 access point broadcast frequencies and channels shall be set and maintained by OIS. Any device or equipment found to be interfering with access point signals may be subject to relocation or removal, including cordless phones, microwave ovens, cameras, light ballasts, etc.

All computer equipment and devices used to connect to the University's network must display reasonable physical security measures. Users are expected to secure their University-connected devices when they are physically at their machines as well as when they step away.

Wireless access users agree to immediately report to the OIS any incident or suspected incidents of unauthorized access point installation.

Use of the wireless network is subject to the same guidelines as the Arkansas Tech University's Acceptable Computer Use Policy.

Any questions relating to this policy should directed to the Director of OIS, at kwester@atu.edu.
 
Policy Non-Compliance

Failure to comply with the Wireless Access Policy may result in the suspension of wireless access privileges and possible disciplinary action.
 
Rating:Rating of 5 Stars3 Votes
Was this answer helpful?YesNo
Topic Information
  • Topic #: 16084-1030
  • Date Created: 10/05/2015
  • Last Modified Since: 10/27/2015
  • Viewed: 418