This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

Similar documents
Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

UC Santa Cruz Wireless Access Policy

Wireless Network Standard

Department of Public Health O F S A N F R A N C I S C O

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

Subject: University Information Technology Resource Security Policy: OUTDATED

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

POLICY 8200 NETWORK SECURITY

UTAH VALLEY UNIVERSITY Policies and Procedures

Apex Information Security Policy

Marshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE

Responsible Officer Approved by

Standard For IIUM Wireless Networking

Information Security Incident Response and Reporting

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

Cyber Security Program

Policies & Regulations

Acceptable Use Policy

Virginia Commonwealth University School of Medicine Information Security Standard

2 University International Medical University

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

RMU-IT-SEC-01 Acceptable Use Policy

Number: USF System Emergency Management Responsible Office: Administrative Services

Access to University Data Policy

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

Ohio Supercomputer Center

Red Flags Program. Purpose

Guest Wireless Policy

Cellular Site Simulator Usage and Privacy

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Standard for Security of Information Technology Resources

Bring Your Own Device Policy

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

Checklist: Credit Union Information Security and Privacy Policies

IDENTITY THEFT PREVENTION Policy Statement

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

University Policies and Procedures ELECTRONIC MAIL POLICY

Internal Audit Report DATA CENTER LOGICAL SECURITY

ISSP Network Security Plan

SPRING-FORD AREA SCHOOL DISTRICT

Red Flags/Identity Theft Prevention Policy: Purpose

IT ACCEPTABLE USE POLICY

Information technology security and system integrity policy.

Minimum Security Standards for Networked Devices

PHYSICAL AND ENVIRONMENTAL SECURITY

Cleveland State University General Policy for University Information and Technology Resources

Security and Privacy Breach Notification

PRIVACY POLICY Let us summarize this for you...

OUTDATED. Policy and Procedures 1-12 : University Institutional Data Management Policy

01.0 Policy Responsibilities and Oversight

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Tri-County Communications Cooperative, Inc. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Electronic Network Acceptable Use Policy

II.C.4. Policy: Southeastern Technical College Computer Use

The University of Tennessee. Information Technology Policy (ITP) Preamble

Harmony Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Emsi Privacy Shield Policy

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Information Security Controls Policy

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

SECURITY & PRIVACY DOCUMENTATION

Opportunity Lives Here

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

DATA STEWARDSHIP STANDARDS

Wireless Security Access Policy and Agreement

University Network Policies

Wireless technology Principles of Security

Acceptable Use Policy

Content. Privacy Policy

Information Privacy Statement

Website Privacy Policy

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Wireless Networking (hosted at

Ferrous Metal Transfer Privacy Policy

Information Technology Security Plan (ITSP)

Federal Communication Commission (FCC) Office of Engineering and Technology (OET) Program Accreditation Procedure

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

University of North Texas System Administration Identity Theft Prevention Program

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280

Prevention of Identity Theft in Student Financial Transactions AP 5800

Shaw Privacy Policy. 1- Our commitment to you

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

The Honest Advantage

Wireless Communication Stipend Effective Date: 9/1/2008

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy: EIT Accessibility

IT Governance Committee Review and Recommendation

Guest Network Account Request Form

B. To ensure compliance with federal and state laws, rules, and regulations, including, but not limited to:

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1

Overview. Business value

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

State of Colorado Cyber Security Policies

Wireless# Guide to Wireless Communications. Objectives

Transcription:

UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities for the deployment of wireless services and the administration of the wireless data radio spectrum at Morehead State University (MSU). The document describes how wireless technologies are to be deployed, administered and supported at MSU. PROCEDURAL REFERENCE FOR: PG-55 SCOPE (Who is covered by this UAR?): This UAR applies to all University Administrators, full-time and part-time faculty, staff, students, members of the Board of Regents, volunteers, contractors and guests. DESCRPTION: This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. Responsibility: The Office of Information Technology (OIT) is responsible for all telecommunications systems owned, leased or operated by the University. Detailed responsibilities for colleges, divisions and/or departments are outlined within the body of this document. Purpose: This document sets forth the policy for using wireless data technologies and assigns responsibilities for the deployment of wireless services and the administration of the wireless data radio spectrum at Morehead State University (MSU). This policy describes how wireless technologies are to be deployed, administered and supported at MSU. Wireless systems and interface cards are deployed at MSU to support both administrative and academic applications. This policy guides such deployments. Policies and guidelines for deployment of these systems are essential to: safeguard security of campus network systems ensure that a baseline level-of-connection service quality is provided to a diverse user community. provide flexibility to respond to user community requirements for the foreseeable future. prevent interference with other uses of the wireless spectrum. Applicability: This regulation applies to all University Administrators, full-time and part-time faculty, staff, students, members of the Board of Regents, volunteers, contractors and guests. This document function as Morehead State University s official regulations for wireless communications.

Scope of the Policy: The Vice President for Planning and Technology is primarily responsible for providing a secure and reliable campus network to support the mission of the University. In order to implement this objective responsibility, the OIT promulgates campus-wide network standards (wired and wireless) to meet the networking requirements of all University constituencies and limit access to network connections which do not conform to generally accepted standard network protocols. This policy, other relevant University and OIT system policies (e.g., PG-55 and UAR 331.01), and all applicable laws, govern the use of electronic communications resources at MSU. Scope of Service: This policy defines the levels of service the MSU community should assume to be part of the campus wireless infrastructure. It defines the roles of OIT and other campus units for deploying and administering the wireless infrastructure for the campus. Network Reliability: In a wireless environment, network reliability is a function both of the level of user congestion (traffic loads) and service availability (interference and coverage). In an effort to provide an acceptable level of reliability, this policy establishes a method for resolving conflicts that may arise from the use of the wireless spectrum. The campus approaches the shared use of wireless radio frequencies in the same way that it manages the shared use of the wired network. While OIT does not actively monitor use of the frequency spectrum for potential interfering devices, it responds to reports of specific devices that are suspected of causing interference and disruption of the campus network. Where interference between the campus network and other devices cannot be resolved, OIT reserves the right to restrict the use of all wireless devices in University-owned buildings and all outdoor spaces. Security: The maintenance of the security and integrity of the campus network requires adequate means of ensuring that only authorized users are able to use the network. Wireless devices utilizing the campus wired infrastructure must meet certain standards to insure only authorized and authenticated users connect to the campus network and that institutional data used by campus users and systems not be exposed to unauthorized viewers. Support This policy defines the responsibilities of OIT and colleges and departments for the planning, deployment, management and development of wireless network equipment and services. The policy describes the responsibilities of those who use wireless network facilities as well as the role of OIT for ensuring overall integrity of the campus network. Definitions: For purposes of this document, the following definitions apply:

Access Point: An access point is a piece of wireless communications hardware which creates a central point of wireless connectivity. Similar to a hub, the access point is a common connection point for devices in a wireless network. Access points can be used to connect segments of a LAN, using transmit and receive antennas instead of ports, for access by multiple users of the wireless network. Similar to standard wired hubs, access points are shared bandwidth devices and can be connected to the wired network, allowing wireless access to the campus network. Baseline Level of Connection Service Quality: The baseline level of connection service quality is determined by factors that can affect radio transmissions, such as distance from the access point, number of users sharing the bandwidth, state of the environment from which the transmission is taking place, and the presence of other devices that can cause interference. Coverage: Coverage is the geographical area where a baseline level of wireless connection service quality is attainable. Interference: Interference is the degradation of a wireless communication signal caused by electromagnetic radiation from another source. Such interference can either slow down a wireless transmission or completely eliminate it depending on the strength of the signal. Privacy: Privacy is the condition that is achieved when successfully maintaining the confidentiality of personal, student and/or employee information transmitted over a wireless network. Security: Security, as used in this policy, not only includes measures to protect electronic communication resources from unauthorized access, but also includes the preservation of resource availability and integrity. Wireless Infrastructure: Wireless infrastructure refers to wireless access points, antennas, cabling, power, and network hardware associated with the deployment of a wireless communications network. Policy Responsibility for Wireless Access Points: Campus responsibility for electronic communication resources resides with the Vice President for Planning and Technology, who must approve all installations of wireless access points used on all campus sites. This approval has been delegated to the Director of Telecommunications in the Office of Information Technology. Wireless equipment and users must follow general communications policies. Wireless services are subject to the same rules and policies that govern other electronic communications services at the University. Abuse or interference with other activities is a violation of acceptable use. Interference or

disruption of other authorized communications or unauthorized interception of other traffic is a violation of policy. Radio communication, due to its dependence on a scarce and shared resource, is subject to additional rules concerning interference and shared use. 1. Wireless access points must meet all applicable rules of regulatory agencies, such as, the Federal Communications Commission and Public Utilities Commission. 2. Wireless access points must be installed so as to minimize interference with other RF activities particularly as described below. Only hardware and software approved by the Vice President for Planning and Technology or designee shall be used for wireless access points. Deployment and management of wireless access points in all areas of all campus sites is the responsibility of the Vice President for Planning and Technology. Security: General access to the network infrastructure, including wireless infrastructure, is limited to individuals authorized to use campus and Internet resources. Users of University and Internet resources shall be authenticated. Physical security of wireless access points is maintained to protect the access point from theft or access to the data port. Password and data protection is the responsibility of the application. The wireless infrastructure will not provide specialized encryption or authentication that should be relied on by applications (i.e., the wireless portion of the connection should not be relied upon by application programs to authorize use of any computer systems assets per se the applications programs themselves must force logins and passwords etc.). In particular, no application should rely on IP address based security or reusable clear text passwords. It is expected that servers will expect/require their own general or applications authentication, authorization and encryption mechanisms to be used by clients entering from any unprotected network. Access points shall enforce user authentication at the access point before granting access to campus or Internet services. Wireless network interfaces shall support authentication to access the campus wireless network. All approved access points connected to the network (even those purchased with college/department funds) will immediately become part of the network infrastructure. Management and control of these devices is transferred to the OIT. Any unapproved access point found connected to the network will be disabled. Interference: Wireless networking equipment is an inexpensive shared medium technology that uses the unlicensed frequency bands to create small local area network cells. These cells can be further linked together over an underlying wired network to create an extended wireless network

covering whole buildings or wider areas. The success of any wide deployment wireless networking requires that all equipment that operate in the frequency spectrum is carefully installed and configured to avoid physical and logical interference between components of different network segments and other equipment. In the event that a wireless device interferes with other equipment, the Vice President for Planning and Technology or designee shall resolve the interference as determined by use priority. If other equipment interferes with a wireless device, the Vice President for Planning and Technology or designee shall resolve the interference as determined by use priority. The order of priority for resolving unregulated frequency spectrum use conflicts shall be according to the following priority list: instruction, administration, research, and public access. Any unapproved or rogue access points found connected to the network will be disabled. Suitability: Wireless networks are not currently a substitute for wired network connections. Wireless should be viewed as an augmentation to the wired network to extend the network for general access in common and transient areas. Wireless is appropriate for common areas where students, faculty, and staff gather. Common areas most appropriate for wireless use include, but are not limited to, instructional labs, library facilities, public areas, and research labs. Wireless networking is most applicable for uses such as email and web browsing. Unless using encrypted protocols, wireless devices should not normally be used for connecting to the University s administrative systems such as human resources, payroll, student information, financial information systems, or other systems that contain confidential or sensitive information or are critical to the mission of the University. Wireless access points provide a shared bandwidth. As the number of users increase the available bandwidth per user diminishes. Before deploying wireless networking in common areas, the advice of the Vice President for Planning and Technology or designee should be sought regarding the ratio of users to access point. New plans for buildings and gathering areas should consider the need for and use of wireless networking, similar to the planning done currently for wired networking. Users of wireless should consider all unencrypted communications over the network as insecure and available and all content as clear text.

Responsibilities: The OIT is responsible for: Creating, maintaining and updating wireless plans, wireless policy and wireless security standards Maintaining a registration of all wireless network cards and access points on campus Resolving wireless communication interference problems Managing and deploying wireless communications systems in common areas of the campus. Approving wireless communication hardware, software and installation services used by University schools/departments Informing wireless users of security and privacy policies and procedures related to the use of wireless communications in common areas. Providing assistance to schools/departments for the development, management and deployment of wireless networks Monitoring performance and security of all wireless networks within common areas and maintaining network statistics as required for preventing unauthorized access to the campus network. Monitoring the development of wireless network technologies, evaluating wireless network technology enhancements and, as appropriate, incorporating new wireless network technologies within the University network infrastructure Acquiring wireless infrastructure once a University wireless plan is approved. Colleges, divisions and/or departments are responsible for: Adhering to Wireless Network Policy Informing wireless users of security and privacy policies and procedures related to the use of wireless communications. Cost of acquiring wireless devices purchased prior to the adoption of a University wireless policy. Authorization: Due to the lack of privacy of network communication over existing wireless network technology, all wireless traffic is presumed to be insecure and susceptible to unauthorized examination. System and/or application access authorization under wireless network technology is to be limited, as follows:

Due to the inherent security weakness and lack of scalability of Wired Equivalency Privacy (WEP) and Server Set Identification (SSID), static WEP keys and SSIDs will not be employed as security measures. 802.1x, once the Wired Network Infrastructure is able to accommodate it, will be used, as well as MAC authentication. Security Awareness: Instructional materials will be made available to all wireless users via the University web site. The instructional material will include, but not be limited to the following topics: Authentication for wireless network access and protection of passwords Authorized use of wireless network technology Wireless interference issues. Privacy limitations of wireless technology Procedures for reporting wireless network service problems. Procedures for responding to a suspected privacy or security violation Procedures for revoking user accounts due to termination of an affiliation with the University Monitoring and Reporting: The use of wireless network technology is to be monitored by the OIT on a regular basis for security and performance. Any unusual wireless network event that may reflect unauthorized use of wireless network services should be immediately reported through the OIT, to Vice President for Planning and Technology for review and, if appropriate, investigation. Such reportable events include the discovery of un-authorized Wireless Access Points on any MSU properties. In all cases, the responsible University Officer is the Vice President for Planning and Technology The University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made to the Information Technology environment. The policy and procedures stated in this document deal with known concerns. Electronic communications is changing rapidly both in terms of technology and application and additional policy issues will arise in this area. You are responsible for reviewing this Policy periodically to ensure your continued compliance with all the University O.I.T. wireless guidelines.