This policy describes access to Black Hills State University networks via unsecured or secured wireless communication mechanisms. Only wireless systems that meet the criteria of this policy or have been granted an exclusive waiver by TSS are approved for connectivity to Black Hills State University's networks.
This policy covers all wireless data communication devices (e.g., personal computers, cellular phones, PDAs, etc.) connected to any of Black Hills State University's internal networks. This includes any form of wireless communication device capable of transmitting packet data. Wireless devices and/or networks without any connectivity to Black Hills State University's networks do not fall under the purview of this policy.
3.1 Access Points and Cards
All wireless access points connected to the university network must be configured and approved by Technical Support Services (TSS). These access points are subject to periodic penetration tests and audits. All wireless Network Interface Cards (i.e., PC cards) used in university laptop or desktop computers must be configured by TSS.
University resources, other than Internet connectivity, are not available through connection to public wireless devices.
3.2 Approved Technology
All wireless LAN access must use university-approved vendor products and security configurations.
3.3 Encryption and Authentication
All computers connecting via wireless communications must comply with TSS security standards and are subject to audit by TSS. Data is encrypted on Black Hills State University's internal private network. Users must authenticate to gain access to university resources on internal private networks. User names and passwords transmission should not be considered secure if connecting to publicly available access points.
The SSID is broadcast as "HotSpot-XX" for public wireless connectivity. Wireless connectivity to internal private networks must be configured by TSS.
By using wireless technology with personal equipment, users must understand that their machines are a de facto extension of Black Hills State University's network, and as such are subject to the same rules and regulations that apply to Black Hills State University-owned equipment, i.e., their machines must be configured to comply with TSS's security policies.
Any person found to have violated this policy may be subject to disciplinary action, up to and including termination of employment or expulsion. Please see handbook for guidelines.
- User Authentication: A method by which the user of a wireless system can be verified as a legitimate user independent of the computer or operating system being used.
6.0 Revision History
1.1 March 16, 2005