UW-La Crosse Wireless Network Policy
September 1, 2004
To ensure that the UW-La Crosse wireless network is secure and effective.
This policy is implemented across campus and will affect all campus wireless network users.
Improperly installed and unsecured wireless access points can interfere with wireless network function and be readily exploited to gain unauthorized access to the campus network. It is critical that the University manage wireless access points to ensure the best possible wireless network security and function. Wireless access points must be properly spaced and assigned channels so they do not interfere with each other and operate efficiently.
All University wireless network access must be approved by UW-La Crosse Information Technology Services (ITS).
ITS can actively monitor for unauthorized and unsecured wireless access points, including ad hoc networks, and sources of wireless interference. The discovery of such access points and/or interference will be investigated and the people responsible for them will be dealt with according to the Responsible Use of Computing and Communications Resources Policy.
Faculty and staff requiring wireless network access on campus or having questions about this service must consult with ITS.
VPN software must be installed and configured by the Technical Support Services department in the ITS Support Center.
Consequence of Non-Compliance
Not following this wireless network policy will result in an unreliable and unsecured campus wireless network, prone to interference and abuse.
Violations of this policy will result in disconnection from the campus network. When possible, violators will be notified of the disconnection and the necessity for compliance. Information Technology Services will investigate and document incidents and refer them to the appropriate University office for further investigation and/or discipline. If the violator is a student, the matter will be referred to the Office of Student Life in accord with the University of Wisconsin System Administrative Code.
UW-L Security Study, Network Security Policy section, Serial No. 2, Findings Ref. No. B.1 and Network Architecture section, Serial No. 5, Findings Ref. No. D.1.