Skip to main content

Wireless Use Policy

Version 1.0.1

Purpose

The purpose of this policy is to regulate wireless network access (i.e., Fordham-P, Fordham-S) on the University’s IT Resources.

Scope

This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • User authentication is required before accessing the Fordham-S wireless1 network.
  • The University monitors the wireless network for interfering devices to ensure reliable access.
  • The University reserves the right to restrict/remove device access to the wireless network to prevent Users from infecting, degrading, or otherwise negatively impacting IT resources.
  • Users must not install a personal wireless access point or any other device that interferes with wireless IT Resources.
  • Should any such device be detected, the University notifies the User,
  • the User is then required to shut down and remove the device,
  • if the User does not shut down the device promptly, the University reserves the right to shut down the device.

1 ​​​​ the WiFi network comparison to determine if Fordham-S or Fordham-P is the correct connection for your use.

Definitions

Fordham-P is a public wireless network.

Fordham-S is a secured wireless network.

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Wireless access point is a networking device that allows wireless devices to connect to a wired network.

Related Policies and Procedures

Implementation Information

Review Frequency Annual
Responsible Person Director, IT Risk and Data Integrity
Approved By CISO
Approval Date 10/29/2018

Revision History

Version Date Description
1.0 10/29/2018 Final
1.0.1 11/13/2019 Updates to policy statement

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.