Wireless Network Communication Security Policy
Download Free Wireless Network Communication Security Policy
The purpose of this policy is to secure and protect the information assets owned by
This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to
All employees, contractors, consultants, temporary and other workers at
3 Policy Statement
3.1 General Network Access Requirements
All wireless infrastructure devices that reside at a
3.1.1 Abide by the standards specified in the Wireless Communication Standard.
3.1.2 Be installed, supported, and maintained by a approved support team.
3.1.5 Maintain a hardware address (MAC address) that can be registered and tracked.
3.1.6 Not interfere with wireless access deployments maintained by other support organizations.
3.2 Lab and Isolated Wireless Device Requirements
All lab wireless infrastructure devices that provide access to
3.2.1 Be isolated from the corporate network (that is it must not provide any corporate connectivity) and comply with the DMZ Lab Security Policy or the Internal Lab Security Policy.
3.2.2 Not interfere with wireless access deployments maintained by other support organizations.
3.3 Home Wireless Device Requirements
3.3.1 Wireless infrastructure devices that provide direct access to the
3.3.2 Wireless infrastructure devices that fail to conform to the Home Wireless Device Requirements must be installed in a manner that prohibits direct access to the
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with
Corporate connectivity: A connection that provides access to a
Enterprise Class Teleworker (ECT): An end-to-end hardware VPN solution for teleworker access to the
Information assets: Information that is collected or produced and the underlying hardware, software, services, systems, and technology that is necessary for obtaining, storing, using, and securing that information which is recognized as important and valuable to an organization.
MAC address: The MAC address is a hardware number that uniquely identifies each node on a network and is required for every port or device that connects to the network.
6 Revision History
Date of Change
Responsible Summary of Change
|Free Download Attachment||Size|