Skip to main content

Internet of Things Procedure for Public Networks

Version 1.0

Purpose

This procedure outlines how Users must request a connection of an Internet of Things (IoT) device to the University’s public networks.

Scope

This IT document and policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Procedure Statement

Conditions

  • Access restrictions are implemented to ensure security for IoT devices and the University network.
  • All IoT devices are subject to audit as part of a vetting and ongoing monitoring process. 
  • The University Information Security Office (UISO) and Network Engineering and Operations (NEO) reserves the right to restrict access to any device if deemed a security threat, which impacts network performance or violates the University’s Acceptable Uses of IT Infrastructure and Resources.
  • Registered devices are only active for one year.
  • Although Users may be able to register devices, there is no guarantee that the device will function on the University’s Public Network.
  • Not all devices are allowed to connect to the network. Devices which are IT-supported and confirmed to work correctly include:
    • Game consoles,
    • Some streaming devices, and
    • Smart TVs.
  • Smart speakers and smart home devices are not supported by Fordham IT.

Definitions

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

The Internet of Things are physical objects (e.g., vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators) that communicate, sense or interact with their internal states or the external environment via network connectivity.

Related Policies and Procedures

Implementation Information

Review Frequency Annual
Responsible Person Director, IT Risk and Data Integrity (e.g.)
Approved By CISO
Approval Date 09/12/2018

Revision History

Version Date Description
1.0 09/12/2018 Final