Purpose and Scope
This policy describes how wireless technologies are to be deployed, administered, and supported at Southern Adventist University. The policy assures that wireless communication network users receive an acceptable baseline level of service in respect to reliability, integrity, availability, and security. This policy supplements the Southern Adventist University Network Usage Policy, Policy 1330.
Wireless Network
Information Technology manages the campus-wide wireless network. This network implements the 8021 1b, g, and n wireless network standards and covers all buildings and common areas on campus.
Airspace Management
Southern’s wireless network uses 2.4 GHz and 5 GHz bands. Other wireless devices in the marketplace employ the same frequencies and may cause interference for Southern users. These devices include, but are not limited to, other wireless network devices, cordless telephones, cameras, and audio speakers.
To ensure the highest level of service, the university restricts the use of all other 2.4 GHz or 5 GHz devices. If, during the normal course of operating and troubleshooting the network, Information Technology discovers unauthorized wireless devices, those devices will be disabled immediately.
Authorized Users
Southern’s wireless network is a private network and may be accessed only by authorized users.
Responsibilities - Information Technology
Information Technology is responsible for maintaining Southern’s wireless network. These responsibilities include:
Users
Users are responsible for using the wireless network in accordance with this policy as well as the Network Usage Policy.
Data transmitted over the wireless network has a higher probability of being intercepted. Because of this, the network is inherently less secure. Users are responsible for the security of their own computers. The following guidelines can be used:
Policy evaluation and review
This policy will be reviewed periodically to ensure that it is relevant, serves the needs and priorities of the institution, and is consistent with current trends in information technology. The following evaluation process will be followed: