The University of Texas at San Antonio
Office of Information Technology
Office of Information Security (OIS) Standards
OIS-38 – Standard for Wireless Network
I. STANDARD STATEMENT
This standard applies to the deployment and operation of all university owned or operated wireless devices and all other devices connected to university infrastructure services on the UTSA campus.
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy.
This standard applies to all UTSA faculty, staff, and students.
If you have any questions about OIS 38 – Standard for Wireless Network contact the following office:
The Office of Information Security
- UTSA campuses have three separate wireless (or Wi-Fi) networks.
- Because UTSA must ensure that the faculty/staff and student wireless networks are used only by faculty, staff, and students, the university requires authentication. Therefore, to use the AirRowdy Fac/Staff or Student networks, it will be necessary for users to provide a UTSA network username and password.
- The wireless guest network is available for visitors and guests that provide a valid email address. Only the AirRowdy Fac/Staff network is encrypted and secured against network eavesdropping. All users of UTSA’s wireless networks are subject to the UTSA Acceptable Use Policy.
- All wireless access points are considered an extension of UTSA’s infrastructure, and are owned, maintained, and supported by OIT. Technical staff members are available to deploy wireless coverage in on-campus offices, meeting rooms, laboratories, or departmental space.
- The use of unapproved wireless access points is prohibited. Improperly configured devices can cause serious harm to both the wired and wireless network, and negatively impact network services for other clients.
- Confidential and/or sensitive UTSA data must not be transmitted via wireless methods to or from a portable computing device unless approved wireless transmission protocols, along with approved encryption techniques, are utilized. Therefore, confidential and/or sensitive UTSA data must not be sent across the guest or student networks, as these networks are unencrypted, and information is sent “in the clear” and subject to interception.
- Wireless network access deployment and operation must be consistent with the university’s mission, strategies, directions, and initiatives.
Effective Date: August 31, 2011
Last Revised: April 10, 2013
Reviewed: July 24, 2017