Wireless Use Policy

Version 2

For Students, Faculty, Staff, Guests, Alumni


The purpose of this policy is to regulate wireless network access to the University’s IT Resources.


This IT policy, and all policies referenced herein, shall apply to all members of the University community, including faculty, students, administrators, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • User authentication is required before accessing the 'Fordham' or eduroam wireless networks1.
  • The FordhamGuest (non-authenticated wireless service) provides visitors with unprotected and insecure access to the Internet for basic web browsing and is limited to Internet-available services.
    • Users must not use the network to exchange sensitive or personal information.
  • The University monitors the wireless networks for interfering devices to ensure reliable access.
  • The University reserves the right to restrict/remove device access to the wireless networks to prevent Users from infecting, degrading, or otherwise negatively impacting IT Resources.
  • Users must not install a personal Wireless Access Point or any device that interferes with wireless IT Resources.
    • Should any such device be detected, the University notifies the User, and the User is then required to disable and remove the device from the network. If the User does not promptly disable the device, the University reserves the right to disconnect the device from the network.

  • 1 Consult the web page Campus Wifi for detailed instructions on connecting to the new network on your particular device or operating system.


eduroam is a network where users can connect to the eduroam wireless network on any of Fordham’s campuses.

Fordham is a secure network for all members of the Fordham community with a Fordham username and password.

IT Resources include computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and related materials and services.

Wireless Access Point is a networking device that allows wireless devices to connect to a wired network.

Related Policies and Procedures

Implementation Information

Review Frequency Triennial
Responsible Person Senior Director of Information Security and Assurance
Approved By CISO
Approval Date 10/29/2018

Revision History

Version Date Description
Original document
Purpose and statement updates
Annual review updates
Update policy statement
Updated scope, policy statement, director's title, and formatting
Updated policy statement and links

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by Information Security and Assurance (ISA) will only be considered cooperatively between ISA and the requesting entity with sufficient notice to allow for conducting appropriate risk analysis, documentation, review, and notification to authorized University representatives where necessary. Failure to adhere to ISA written policies may be met with University sanctions up to and including dismissal.

Need Help?

Walk-In Centers

McShane Center 266 | RH
Leon Lowenstein SL18 | LC

View Our Walk-In Hours