Wireless at WestConn Policies
Welcome to WestConn’s Wireless Network for students, faculty, and staff in selected locations at both WS and MT. Wireless access zones can be spotted easily where you see the wireless hotspot logo, or by clicking here for a complete list of wireless coverage areas.
Connecting to WestConn’s Wireless Network is easy. No separate registration is required to sign on, only a valid WestConn Windows username and password. WestConn’s Wireless Network supports both 802.11a, 802.11b, and 802.11g wireless standards and uses a network ID (SSID) of ‘WestConn’.
WestConn’s Wireless Network is a part of Information Technology & Innovation Network Services. By your use of this resource, you are implicitly agreeing to abide by the following guidelines, WestConn Information Security Policy, Computer Use Policy, CSU Computer Systems and Network Policy, and all other state and federal laws concerning appropriate use of technology resources.
Information Technology & Innovation reserves the right to amend the guidelines at any time without prior notice. Non-compliance to the guidelines is considered a serious breach of computer and network use policy and may result in disciplinary or legal action.
Wireless Network Usage Policies and Guidelines
The purpose of the following guidelines is to specify the best practices, procedures, and policies that govern wireless network use at WestConn.
- Users of the wireless network are required to successfully authenticate to the network via Cisco Clean Access. Cisco Clean Access technology verifies users’ authenticity by their Windows username and password before granting them access to the WestConn network.
- Wireless networks by nature are shared mediums. Performance and throughput on the wireless network will vary. Factors affecting performance include: signal strength, number of users on the wireless network, utilization on the wired infrastructure, and end user applications.
- Wireless connections may be lost when moving between areas with wireless coverage. A user’s connection will be dropped from the network if the user moves away from the wireless coverage area. Users shall be required to sign on again if they are away from the wireless coverage area for more than five minutes.
- WestConn requires all users of the wireless network to install antivirus software and the latest operating system patches on their computer to ensure their computer is not vulnerable to viruses or network attacks.
- The WestConn Wireless Network is not intended as a replacement for the campus wired network. Users of the wireless network are discouraged from running high bandwidth applications on the wireless network. Because of throughput limitations, Information Technology & Innovation suggests wireless users refrain from downloading large files or streaming audio or video over the wireless network.
- The University recognizes the importance of privacy and will make every attempt to preserve it, however, it should be understood that there is no guarantee of privacy of information traversing the wireless network.
- Wireless networks are inherently insecure as anyone with the proper equipment can passively listen in on the wireless network. Information Technology & Innovation suggests that instead of using applications that send and receive your data in an unencrypted form, use applications that use strong encryption before placing your data on the network. Avoid clear text telnet, ftp, and rlogin applications, instead use ssh and sftp. Do not send sensitive data to websites unless the site connection is using HTTPS.
- All actions that impede, impair, or otherwise interfere with WestConn’s academic activities or the university network are prohibited. Users are required to refrain from all activities that may cause accidental or intentional disruption to the wireless network and deprive others of access to University resources.
- Wireless network users must not run or write any computer program or process that is likely to consume significant wireless or network resources or otherwise interfere with WestConn’s academic activities.
- Users of WestConn’s computing resources must not acquire, possess, trade, or use hardware or software tools that could be employed to evaluate or compromise information systems security at WestConn.
- WestConn strictly prohibits copyright infringements. This includes, but is not limited to, software piracy, illegal music download, or offering copyrighted material to other users over the network. Any violation of such types will result in appropriate disciplinary and/or legal action.
- It is the responsibility of users to restrict access to their computers and secure their credentials. Users who share their username and password, or share their computers connected to WestConn’s Wireless Network, will be held fully accountable for any misuse or violation of these guidelines and other University computer use policies.
- In general, Information Technology & Innovation does not engage in monitoring of network and data communications. However, Information Technology & Innovation reserves the right to monitor, access, retrieve, read, and/or disclose communications through the University network when there is reasonable cause to suspect criminal activity or policy violation, or monitoring is required by law, regulation, or at the CIO’s request as appropriate under federal and state privacy laws and regulations.