Wireless Use Policy
Version 1.3
Purpose
The purpose of this policy is to regulate wireless network access to the University’s IT Resources.
Scope
This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
Policy Statement
- User authentication is required before accessing the Fordham or eduroam wireless networks1.
- The University monitors the wireless network for interfering devices to ensure reliable access.
- The University reserves the right to restrict/remove device access to the wireless network to prevent Users from infecting, degrading, or otherwise negatively impacting IT resources.
- Users must not install a personal wireless access point or any device that interferes with wireless IT Resources.
- Should any such device be detected, the University notifies the User,
- the User is then required to disable and remove the device from the network,
- if the User does not promptly disable the device, the University reserves the right to disconnect the device from the network.
-
1 Consult the web page Access the WiFi Network for detailed instructions on how to connect to the new network on your particular device or operating system.
Definitions
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Wireless access point is a networking device that allows wireless devices to connect to a wired network.
Related Policies and Procedures
- Acceptable Uses of IT Infrastructure and Resources
- Access the WiFi Network
- Internet of Things Policy
- WiFi Network Comparison
Implementation Information
Review Frequency | Annual |
---|---|
Responsible Person | Director, IT Risk and Data Integrity |
Approved By | CISO |
Approval Date | 10/29/2018 |
Revision History
Version
|
Date
|
Description
|
1.0
|
10/29/2018
|
Final
|
1.1
|
11/13/2019
|
Purpose and statement updates
|
1.2
|
11/20/2020
|
Annual review updates
|
1.3
|
01/14/2021
|
Update policy statement
|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Failure to adhere to UISO written policies may be met with University sanctions.