Wireless Access Policy

Purpose and Scope

The goal of this policy is to protect Jacksonville State University’s technology-based resources from unauthorized use and/or malicious attack that could result in loss of information, damage to resources or damage to our public image.  All users employing wireless methods of accessing University technology resources must adhere to University defined processes for doing so, using University installed access points.  Unauthorized access to the wireless network is not allowed.  The following policy is complementary to any previously implemented policies dealing specifically with network access and remote access to the enterprise network.  Access to Jacksonville State University’s networks is provided in support of students’ academic and research activities, as well as reasonable and appropriate personal use.

Supported Technology

Jacksonville State University uses the 802.11n and 802.11ac protocols as its wireless network standards, transmitting in the 2.4 GHz and 5 GHz radio frequency spectrums.  The 802.11 protocols are the most common standards for wireless network connectivity (i.e. wifi).

In order to provide wireless access to authorized users, Information Technology (IT) installs access points in and around the campus.  These access points are small devices that connect directly to the local area network (LAN).  "Rogue" access points are devices that are installed without the knowledge or permission of the Jacksonville State University IT Department.  Rogue access points are not allowed on the JSU network.

JSU IT will troubleshoot to ensure that access points are functioning properly.  Additionally, the Technology Support Center will provide limited connectivity support for students’ devices that are used for academic purposes, i.e. laptop, desktop, tablet or phone.  Game consoles, media streaming devices (Roku, Chromecast, Apple TV, network enabled televisions, etc.) and printers will not be supported by JSU IT.  You may register these devices (No Wi-Fi enabled printers allowed) for use on the JSU Housing network but JSU IT does not guarantee the satisfactory operation of these devices.

Policy and Appropriate Use

All wireless access points on the University's network will be centrally managed by the JSU IT department.  The addition of new wireless access points within campus facilities will be managed at the sole discretion of IT.  Non-sanctioned installations of wireless equipment, or use of unauthorized equipment on campus premises, are strictly forbidden.

The IT department will periodically conduct sweeps of the wireless network to ensure there are no rogue access points present.  The IT department reserves the right to turn off without notice any access point connected to the network that it feels puts the University's systems, data, and users at risk.

Access point broadcast frequencies and channels shall be set and maintained by JSU IT.  Any device or equipment found to be interfering with access point signals may be subject to relocation or removal.  Examples of devices in this category are non-JSU access points, wifi enabled printers and streaming media devices (Chromecast, Roku, etc.).  Any other electronic devices found to interfere with JSU IT installed access points are included in this category.

Policy Non-Compliance

Failure to comply with the Wireless Access Policy may result in the suspension of wireless access privileges and possible disciplinary action.  Read the information below carefully as it specifies user responsibilities and responsible use standards for connecting to computer networks, including those in residence halls and JSU owned apartments.

You must agree to the terms and conditions below to use the networks.

Basic Agreement

I agree to abide by all applicable federal and state laws and university policies including:

  • Responsible Use of Information Resources
  • Statement on Student Rights and Responsibilities

I understand that I am responsible for the security of my computer and other devices connected to the network and for all activity originating from those devices, including but not limited to:

  • Traffic generated by viruses and malware;
  • Sharing of music or other media files; and
  • Other users who have gained access to my computer.

I understand that I am not guaranteed a network connection or a specific amount of network bandwidth.  Network resources may be managed to optimize performance of some essential applications or resources and slow down other applications or resources.

Access and Proper Use

I will not:

  • Provide access to any University computing resource to anyone not eligible or allow others to access such resources using my identity.
  • Redistribute or provide access to University computing resources for any fee or other consideration.
  • Perform any action that denies another network user access to network resources.
  • Use my computer to distribute copyright protected materials in violation of applicable state and federal laws.
  • Attempt to gain access to services, resources, networks, or computers for which I am not authorized.
  • Scan computers to detect access points or vulnerabilities.
  • Use a campus network connection to run a commercial enterprise.

I understand that:

Excessive use of the network is prohibited and subject to restrictions.  JSU IT will determine what is considered excessive use but examples include several hours of continuous on-line gaming or media streaming.  This includes but is not limited to the legal sharing of music and other media files.

Residents in University Housing and current students are permitted to register other devices via the on-line registration system and must in turn agree to abide by the terms and conditions of this agreement.  When the University is required to respond to a violation of these terms and conditions, access for all devices within my unit may be disabled until the issue is resolved.

Network Integrity & Security

I will not perform any action that would impair the function or compromise the integrity of the network or result in the denial or degradation of another user's access to the network.

I will not alter network wiring, equipment or jacks, or extend the network.

I will refrain from using personal WiFi routers as they significantly and negatively impact the campus WiFi environment, causing it to deteriorate and in some cases can make WiFi unusable by all.  I will not use any personally owned device that broadcasts a signal on the 802.11bgn or 802.11ac channels.  This includes but is not limited to non-JSU access points, wifi enabled printers, streaming media devices (Chromecast, Roku, etc.) and other electronic devices.

Devices that connect to the network may be periodically scanned to ensure the security and reliability of the network.

Violations and Sanctions

I understand that violations of applicable University policies regarding technology and network usage will be subject to disciplinary action.  I understand that my networking or computing services can be suspended or terminated at any time if I violate this agreement.  Violations may be subject to additional sanctions under JSU disciplinary code.  Civil and criminal prosecution may also result from violation of federal and state law.