Text Size Default Text SizeDefault Text Size Large Text SizeLarge Text Size Largest Text SizeLargest Text Size Print Print this Page

Policy 6124

Wireless Communication Policy

I. Purpose

The purpose of this policy is to identify the requirements that wireless communications technology must meet to provide the University with reliable and secure wireless services.

II. Definition

Access Point: An access point is a piece of hardware that serves as a common connection point for devices on a wireless network and also connects to the wired network allowing wireless access to the campus network.

III. Policy

This policy covers all wireless data communication devices (e.g., personal computers, cellular phones, PDAs, etc.) connected to any of Longwood University's networks. This includes any form of wireless communication device capable of transmitting data over a network. Wireless devices and/or networks without any connectivity to Longwood University's networks do not fall under the purview of this policy.

  1. Implementation of Wireless Access:
    1. All wireless services in use at Longwood University will be supported, maintained and protected by Information and Instructional Technology Services (IITS) for use by its faculty, staff, students and any other authorized individuals.
    2. Wireless networking is provided as a supplement to wired networking, but due to issues including bandwidth and reliability wireless networking is not a substitute for wired connections.
  2. Protection of Wireless Services: All users of University wireless services should be aware that IITS will implement the following standards for protecting wireless services:
    1. Will maintain encryption between the data communication device and the access point.
    2. May register and track a hardware address (ex. MAC address) of those devices accessing the network.
    3. Will prohibit physical access to wireless access points by anyone other than authorized IITS staff.
    4. Will support the use of Longwood's virtual private network (VPN) technology. Further details may be found in the Remote Access policy.
  3. Expectations of Use: Due to its dependence on a scarce and shared resource, radio communication is subject to additional rules concerning interference and shared use.
    1. Interference or disruption of authorized wireless communications or unauthorized interception of any wireless communications is prohibited.

IV. Enforcement

The University regards any violation of this policy as a serious offense. Violators of this policy are subject to disciplinary action, in addition to possible cancellation of information technology (IT) resources and systems access privileges. Users of IT resources and systems at Longwood are subject to all applicable local, state and federal statutes. This policy does not preclude prosecution of criminal and civil cases under relevant local, state, federal and international laws and regulations.

Approved by the Board of Visitors, March 20, 2004.
Revised and approved by the Board of Visitors, September 14, 2006.
Revised and approved by the Board of Visitors, December 5, 2008.