ÇÑ×ÓÊÓÆµ

Policy 14 - Wireless Communication Policy

1.0 Purpose

This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to the ÇÑ×ÓÊÓÆµ network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by Information Systems are approved for connectivity to a ÇÑ×ÓÊÓÆµ network. Any questions or comments about this policy should be directed to Information Systems.

2.0 Scope

All employees, students, contractors, consultants and temporary workers at Murray State University, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of ÇÑ×ÓÊÓÆµ, must adhere to this policy. This policy applies to all wireless infrastructure devices that connect to a ÇÑ×ÓÊÓÆµ network or reside on a ÇÑ×ÓÊÓÆµ site that provides wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data.

3.0 Policy

3.1 General Network Access Requirements

All wireless infrastructure devices that reside at a ÇÑ×ÓÊÓÆµ site or connect to a ÇÑ×ÓÊÓÆµ network must:

  • Be installed, supported and maintained by Information Systems. 
  • Use ÇÑ×ÓÊÓÆµ approved authentication protocols and infrastructure. 
  • Use ÇÑ×ÓÊÓÆµ approved encryption protocols. 
  • Maintain a hardware address (MAC address) that can be registered and tracked. 
  • Not interfere with other wireless access deployments. 

3.2 Lab and Isolated Wireless Device Requirements

Lab and isolated wireless devices must:

  • Be approved by Information Systems. 
  • Not interfere with other wireless access deployments.

4.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action according to personnel policies and procedures. Students may be referred to Student Affairs for discipline. Also any rogue access points found on the ÇÑ×ÓÊÓÆµ property may be confiscated. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with ÇÑ×ÓÊÓÆµ.

5.0 Definitions

Wireless infrastructure devices

Wireless infrastructure devices are devices that provide wireless connectivity. Some examples of these devices are wireless access points, repeaters, bridges, etc.



Policy adopted:  02-25-2011
Revision adopted: 
Policy approval and adoption: ÇÑ×ÓÊÓÆµ President's Office and Information Systems Security

Take the next step

© ÇÑ×ÓÊÓÆµWe are Racers.