arrow_circle_left Back to All Policies

Wireless Network Policy

JSCC Policy Number: Not Yet Assigned

TBR Policy Reference: Not Yet Assigned

TBR Guideline Reference: Not Yet Assigned

Approved By: Dr. Allana Hamilton

Original Date Effective: 2010-06-15

Last Modified: 2019-09-03

Responsible Office: Office of Information Technology


Purpose

The purpose of this policy is to protect Jackson State Community College's technology-based resources (such as college data, computer systems, networks, databases, etc.) from unauthorized use and/or malicious attack that could result in loss of information, damage to critical applications, loss of revenue, and damage to our public image. Therefore, all users employing wireless methods of accessing technology resources must adhere to college defined processes for doing so, using college-approved access points.

Scope

Jackson State Community College provides a wireless computer network, including access to the Internet, for students, faculty, staff, and guests of Jackson State Community College in order to further the educational purposes of the College. Use of the Jackson State Community College wireless network is governed by all applicable local, state, and federal laws and all TBR, and JSCC policies.

By using the Jackson State Community College wireless network, users are granting permission for authorized network administrators to monitor and/or intercept electronic communications. Jackson State does not monitor personal communications on a regular basis, but may do so on occasion to monitor network performance and to ensure adherence of all policies.

Responsibility of Network Users

  • Access to the wireless network is through individual accounts with password protection. All willful violations of this policy that can be traced to an individual account name will be treated as the sole responsibility of the owner of that account. DO NOT share your username and password with others.
  • Users are responsible for ensuring they are running up-to-date anti-virus software and that they have all applicable software patches/updates installed.
  • Use of the wireless network is subject to the same JSCC/TBR guidelines and policies as other technology at JSCC.
  • Network users must respect all copyrights. Commercial software licensed to Jackson State Community College may only be installed on machines expressly covered by the licensing agreements. Downloading or sharing of copyright or unlicensed materials is prohibited.
  • The running of programs, services, systems, processes or servers by a single user or group of users that may substantially degrade network performance or accessibility will not be allowed. Electronic chain letters, mail bombs, and excessive recreational use of the network are prohibited.
  • Connecting to "peer-to-peer" or file-sharing networks or downloading large files (such as CDROM ISO images), is also prohibited.
  • Users must be aware that as they connect their machines through the wireless network that they expose their computers to worms, viruses, trojans horses, denial of service attacks, intrusions, packet sniffing and other abuses by third-parties on- and off-campus. Jackson State Community College highly discourages the conducting of confidential transactions (such as online banking) over any wireless network, including our own.
  • Users are responsible for all devices they connect to Jackson State Community College's network including maintaining the security according to the JSCC Mobile Device policy on the device.
  • Due to regulations, point of sale or debit/credit card transaction may not take place on the JSCC wireless network.

Limitations of Wireless Network Access

  • User agrees that the College is in no way liable for any damage, undesired resource usage, or detrimental effects that may occur to the user's device while the device is attached to the network.
  • The user is responsible for any actions taken from a device connected with his/her credentials, whether intentional or unintentional, that causes damage or otherwise affects other devices or users, either on- or off-campus.
  • User hereby releases Jackson State Community College from liability for any loss, damage, or injury which the user may sustain as a result of having accessed the network. The user agrees to accept sole responsibility for any such loss, damage, or injury.

Access Points

Jackson State Community College {JSCC)is committed to providing authorized users with wireless access to the Internet, JSCC networks and systems, as well as other College resources. In order to make this convenient service available to end users, the OIT Department must install "access points" in and around the premises wherever wireless access to institution resources are designated. These access points are generally small, antenna-equipped boxes that connect directly to the local area network (LAN).

  • As the number of wireless connections increases, so too does the danger of "rogue" access points being surreptitiously installed. Rogue access points are antennas that are installed without the knowledge or permission of JSCC, used by hackers, internal employees, or trespassers to gain illegal access to the college network and Internet connection for the purposes of sabotage, spamming, corporate espionage, personal gain, etc.
  • All wireless access points within the College's firewall will be centrally managed by JSCC's OIT Department and will utilize encryption, strong authentication, and other security methods at Oil's discretion. Addition of new wireless access points within campus facilities will be managed at the sole discretion of OIT. Non-sanctioned installations of wireless equipment, or use of unauthorized equipment within the organizational premises, are strictly forbidden.

Access Point Restrictions

  1. JSCC's OIT Department cannot guarantee 99.999 percent availability of the wireless network, especially during peak periods of high bandwidth utilization.
  2. The OIT Department reserves the right to turn off without notice any access point connected to the network that it feels puts the college's systems, data, users, and clients at risk.
  3. The wireless access user agrees to immediately report to his/her manager and JSCC's OIT Department any incident or suspected incidents of unauthorized access point installation and/or disclosure of company resources, databases, networks, and any other related components of the organization's technology infrastructure.