ÌìÃÀ´«Ã½

Policy 14 - Wireless Communication Policy

1.0 Purpose

This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to the ÌìÃÀ´«Ã½ network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by Information Systems are approved for connectivity to a ÌìÃÀ´«Ã½ network. Any questions or comments about this policy should be directed to Information Systems.

2.0 Scope

All employees, students, contractors, consultants and temporary workers at Murray State University, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of ÌìÃÀ´«Ã½, must adhere to this policy. This policy applies to all wireless infrastructure devices that connect to a ÌìÃÀ´«Ã½ network or reside on a ÌìÃÀ´«Ã½ site that provides wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data.

3.0 Policy

3.1 General Network Access Requirements

All wireless infrastructure devices that reside at a ÌìÃÀ´«Ã½ site or connect to a ÌìÃÀ´«Ã½ network must:

  • Be installed, supported and maintained by Information Systems. 
  • Use ÌìÃÀ´«Ã½ approved authentication protocols and infrastructure. 
  • Use ÌìÃÀ´«Ã½ approved encryption protocols. 
  • Maintain a hardware address (MAC address) that can be registered and tracked. 
  • Not interfere with other wireless access deployments. 

3.2 Lab and Isolated Wireless Device Requirements

Lab and isolated wireless devices must:

  • Be approved by Information Systems. 
  • Not interfere with other wireless access deployments.

4.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action according to personnel policies and procedures. Students may be referred to Student Affairs for discipline. Also any rogue access points found on the ÌìÃÀ´«Ã½ property may be confiscated. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with ÌìÃÀ´«Ã½.

5.0 Definitions

Wireless infrastructure devices

Wireless infrastructure devices are devices that provide wireless connectivity. Some examples of these devices are wireless access points, repeaters, bridges, etc.



Policy adopted:  02-25-2011
Revision adopted: 
Policy approval and adoption: ÌìÃÀ´«Ã½ President's Office and Information Systems Security

Take the next step

© ÌìÃÀ´«Ã½We are Racers.