IT Policies

Download Now

Start free trial

Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.

Wireless networking policy

Originally Published:
Oct 2017

Wireless networks have given users enormous flexibility and lessened the burden of supporting their connectivity needs. But along with the benefits comes the critical need to make sure wireless networks are properly and securely configured. This policy establishes guidelines, prohibitions, and procedures for both IT and end users.

From the policy:

Wireless networks can greatly aid organizations by providing easy connectivity for workers, whether internal employees or external guests. Many users these days are familiar with configuring their devices for Wi-Fi access and thus can enjoy the benefits of roaming throughout the building without having to utilize network cables or jacks. Both company-owned and personally owned devices can be used to access wireless networks, increasing their capability and the manner with which users can access necessary resources. Furthermore, the IT department is spared the rigmarole of having to activate or deactivate network ports, add switch or patch panel capacity, or extensively support user connectivity needs, since Wi-Fi access is often a do-it-yourself situation.

However, on the flip side, wireless networking presents security concerns. Improperly configured wireless networks, or the misuse of these networks through ignorance or malicious activity, may permit unauthorized access to confidential company resources and place the business at risk. Mismanaged wireless networks may also prevent users from doing their job effectively, reducing productivity and increasing IT support needs.

IT department responsibilities

Only the IT department will set up and administer access points/base stations and wireless networks (with input from security if needed). Maintaining and updating this policy will remain the responsibility of the IT/security departments or other designated individuals and groups.

The IT department will identify and enable company-owned equipment that can appropriately utilize wireless resources. IT will also be responsible for examining and approving the use of employee-owned devices on company wireless networks (if permitted). In all cases, devices used on company wireless networks must utilize passwords, firewalls, anti-malware software, and remote tracking/wipe capability (where applicable).

No unauthorized devices will be permitted to connect to company wireless networks.

The IT department reserves the right to deny or block any devices not deemed appropriate for wireless network access.

Get This Download With Our Free Trial

People who downloaded this also downloaded