Wireless Networking (D-49)

Original Implementation: February 3, 2005
Last Revision: April 17, 2012


Purpose

Stephen F. Austin State University’s (SFA’s) wireless local area network (LAN) enables wireless computing and provides reliable and secure network services in many locations on campus. It is a complementary system to the campus wired network.

Scope

This policy applies to all uses of wireless LAN technologies at all physical locations of SFA, both inside buildings and in outdoor areas. It does not apply to cellular wireless technology.

All SFA wireless LAN policies shall comply with university, federal, state, and local laws and regulations.

Responsibilities

Information Technology Services is responsible for implementing wireless LAN technology in compliance with campus network standards and also for resolving frequency interference issues. These responsibilities include, but are not limited to:


Departments and individual students are responsible for all costs associated with the purchase of wireless network devices. Individuals may not install or operate wireless access points on university-owned property, including residence halls and apartments.

Access

All SFA faculty, staff, and students are required to have a valid user identification and password to use the wireless LAN. Any employee at the university can sponsor a guest on the wireless network using the self-service application in mySFA.

Security

All wireless access points and wireless client adapters shall use a Service Set Identification provided by Information Technology Services to access any wireless LAN provided by SFA. SFA shall encrypt all data.

Standards

SFA has adopted the Institute of Electrical and Electronics Engineers, Inc., standards for wireless networking for the wireless LAN. Only the Internet Protocol standard shall be supported on the wireless LAN.

Sanctions for Policy Violations

Applicable university discipline and/or discharge policies will be followed in imposing sanctions related to a violation of this policy, including limiting a user’s access. In the event of an imposed restriction or termination of access to some or all university computers and systems, a user enrolled in courses or involved in computer-related work activities may be required to use alternative facilities. If such facilities are unavailable, the user bears the responsibility for failure to complete requirements for course work and/or job responsibilities.

 


Cross Reference: Computer & Network Security (D-8.1); Use of Electronic Information Resources (F-40); Computing Software Copyright (D-43); Digital Millennium Copyright (D-42); Texas Information Resources Management Act; Tex. Gov’t Code § 2054; 1 Tex. Admin. Code §§ 202.70-.78; Tex. Penal Code Ch. 33.

Responsible for Implementation: Provost and Vice President for Academic Affairs

Contact for Revision: Director of Information Technology Services

Forms: None

Board Committee Assignment: Academic and Student Affairs