WIRELESS NETWORKING POLICY
Information Technology Services (iTech) for the University of Southern Mississippi is responsible for providing a reliable and secure network service to all campus constituents. This wireless policy has been established to govern all implementations of wireless networks and the general use of wireless technology at Southern Miss and to alert members of the campus community to the potential problems that could result from devices using the same radio frequencies.
Reason for Policy/Purpose
The purpose of the Wireless Policy is to set guidelines for the use of wireless technology by the University of Southern Mississippi’s campus community so that optimum network capabilities for all wireless and wired facilities can be secured and maintained.
This policy should also alert members of the campus community to the potential problems that could result from wireless devices using the same radio frequency.
Who Needs to Know This Policy
All users accessing wireless technology at The University of Southern Mississippi.
Website Address for this Policy
iTech is charged with the responsibility for managing the infrastructure of the Southern Miss Network, this includes the installation, operation, and security of the University’s wireless network.
2.0 Governing Guidelines
2.1 iTech Security and Network Administration and all appropriate local network administrators must approve all wireless network access points prior to installation. Wireless access points may not be installed without prior approval. Unapproved wireless access points are subject to removal.
2.2 Production wireless network access will be provided by iTech in conjunction with appropriate local network support staff. Production wireless access includes all access other than those access points specifically installed to support University sanctioned research into wireless technologies.
2.3 Production wireless network access will require authentication. iTech will design, implement, and manage security authentication schemes.
2.4 Individuals and groups that are pursuing sanctioned research into wireless technologies will be provided specific radio frequency spectra for their wireless access points by iTech. These access points can be attached to the Southern Miss network only in coordination with the iTech.
2.5 iTech will work to accommodate research needs and attempt to eliminate situations of interference between research and production implementations. However, iTech has full authority to deactivate or require modification in the research wireless network to prevent such interference.
2.6 Any effort to circumvent the security systems designed to prevent unauthorized access to any Southern Miss wireless network may result in the suspension of all access to Southern Miss networks and an appearance before the appropriate disciplinary board.
2.7 The Information Technology Services (iTech) is charged with providing a stable and secure campus network to support the mission of the University and therefore has the authority and responsibility to specify technical requirements for devices connecting to it. This includes providing leadership in the management of shared network resources, such as setting security standards and disconnecting noncompliant wireless devices when they have the potential for interfering with the proper operation of the campus-wide network.
2.8 If our current wireless network doesn’t meet specific departmental needs, iTech can be contacted by submitting a work order to assess the needs.
3.1 Faculty, Staff, and Students
Any student, faculty, or staff member found to have violated this policy may be subject to disciplinary action, up to and including suspension, expulsion and/or termination of employment in accordance with procedures defined by USM administrative policies stated in the handbook governing that individual.
Any external entity, contractor, consultant, or temporary worker found to have violated this policy may be held in breach of contract, and as such, may be subject to grievances or penalties allowed by such contract.
The Chief Information Officer is responsible for the review of this policy every four years (or whenever circumstances require immediate review).
Amendments: Month, Day, Year – summary of changes