MUSC Wireless Networking Policy
Purpose and Scope
This policy applies to all use of 802.11 wireless networking devices on the MUSC network. All other policies covering the use of University computing services by authorized users (e.g. the MUSC Computer Use Policy) are still in effect when resources are accessed from wireless devices, as are all regulations (e.g. HIPAA and FERPA) which protect the confidentiality and integrity of information entrusted to the University's stewardship.
Wireless networking technologies can allow MUSC staff to access networked information from any portable PC or handheld device, without the restrictions on location imposed by wired connections. Wireless mobility can support diverse applications, ranging from more efficient bedside patient care, to new forms of teaching and learning in the classroom. At the same time, the broadcast nature of wireless (radio) communications raises security concerns, and carries the potential for interference between neighboring devices, if wireless devices are installed and used naively.
For these reasons, any wireless Access Point (AP) which is connected to the campus network must be treated as an extension of the campus network.
Wireless APs will be centrally managed like all other parts of MUSC's network infrastructure. No Access Point (implementing 802.11 or any other wireless networking standard) may be connected to the MUSC network except as authorized by the Network Systems Team (NST) in the Center for Computing and Information Technology (CCIT).
- Network Topology
NST will configure every connected AP onto a dedicated "Wireless VLAN" whose primary purpose is to prevent access to the wired segments of the MUSC network by unauthenticated mobile users.
- User Authentication
All users connecting to any AP on the MUSC network must be authenticated using an approved authentication service. Information on currently approved and operational authentication services is available from NST.
- Data Encryption
All sensitive information traversing wireless links connected to the MUSC network must be protected using an approved encryption method. Information and guidelines on currently approved encryption methods is available from NST.
CCIT will maintain access logs for all wireless APs connected to the MUSC network. CCIT will also conduct periodic audits throughout MUSC's airspace to ensure that APs have not been attached to MUSC's network without authorization. Any unauthorized APs will be removed, and the person(s) responsible for them will be subject to sanctions as outlined in the MUSC Computer Use Policy.
- Procurement and Installation
Persons planning to enable wireless access to the MUSC network must contact CCIT's Network Systems Team prior to purchasing or installing any equipment. NST's engineers will facilitate the procurement of APs and other equipment from an approved equipment list, and will install, configure and manage all APs in accordance with applicable networking and security policies and standards. NST's engineers will also help ensure that APs are placed to maximize coverage and minimize interference, and will facilitate the sharing of APs between neighboring departments and programs where feasible.
- Contacting NST
Center for Computing and Information Technology
Attn: Michael Haschker, Manager Network Systems Team
Office Phone: 843.792.8314
$Id: policy.html,v 1.2 2002/10/10 19:18:40 gadsden Exp gadsden $