ÌÇÐÄlogo¹ÙÍø

Policy 14 - Wireless Communication Policy

1.0 Purpose

This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to the ÌÇÐÄlogo¹ÙÍø network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by Information Systems are approved for connectivity to a ÌÇÐÄlogo¹ÙÍø network. Any questions or comments about this policy should be directed to Information Systems.

2.0 Scope

All employees, students, contractors, consultants and temporary workers at Murray State University, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of ÌÇÐÄlogo¹ÙÍø, must adhere to this policy. This policy applies to all wireless infrastructure devices that connect to a ÌÇÐÄlogo¹ÙÍø network or reside on a ÌÇÐÄlogo¹ÙÍø site that provides wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data.

3.0 Policy

3.1 General Network Access Requirements

All wireless infrastructure devices that reside at a ÌÇÐÄlogo¹ÙÍø site or connect to a ÌÇÐÄlogo¹ÙÍø network must:

  • Be installed, supported and maintained by Information Systems. 
  • Use ÌÇÐÄlogo¹ÙÍø approved authentication protocols and infrastructure. 
  • Use ÌÇÐÄlogo¹ÙÍø approved encryption protocols. 
  • Maintain a hardware address (MAC address) that can be registered and tracked. 
  • Not interfere with other wireless access deployments. 

3.2 Lab and Isolated Wireless Device Requirements

Lab and isolated wireless devices must:

  • Be approved by Information Systems. 
  • Not interfere with other wireless access deployments.

4.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action according to personnel policies and procedures. Students may be referred to Student Affairs for discipline. Also any rogue access points found on the ÌÇÐÄlogo¹ÙÍø property may be confiscated. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with ÌÇÐÄlogo¹ÙÍø.

5.0 Definitions

Wireless infrastructure devices

Wireless infrastructure devices are devices that provide wireless connectivity. Some examples of these devices are wireless access points, repeaters, bridges, etc.



Policy adopted:  02-25-2011
Revision adopted: 
Policy approval and adoption: ÌÇÐÄlogo¹ÙÍø President's Office and Information Systems Security

Take the next step

© ÌÇÐÄlogo¹ÙÍøWe are Racers.