How to Plan for Security
i). Statement of Policy
This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems.
a) Scope and Applicability
The scope of this policy statement covers the hardware, software and access protocols ...view middle of the document...
ii). Authorized Access and Usage of Equipment
The WLAN has been designed to offer unlimited communication, data sharing, and limited access to information stored on university server stations as described by the specific user-access protocols for all students and staff.
a) User Access
User access for the WLAN’s information system is regulated through various verification and encryption configurations managed by the network administrators (Curt, 2010, P26). Access is granted through login and password authentication for computers, laptop and mobile devices. They are installed in the various learning facilities in the premises and those owned by students.
b) Fair and Responsible Use
The WLAN is available to all registered students at the university and to authorized workers in their respective workstations. The users of the WLAN facility are advised and required to exercise reasonable and adequate measures in ensuring ethical use of the network and to avoid actions that may infringe on the right of others to using the network.
c) Protection of Privacy
In as much as data encryption and login authentication are concerned, measures have been taken towards ensuring privacy (Krishna, 2005, P.46).
iii). Prohibited Usage of Equipment
Certain policies are defined that guide the student and worker use of equipment owned by the university consisting of the WLAN network and computer facilities.
a) Disruptive Use or Misuse
The university, through this policy document, prohibits the inappropriate, disruptive and consequently illegal use of the WLAN facility by the members granted access to the facility.
b) Criminal Use
Criminal use constitutes such activities which are prohibited by this document and are tantamount to the breach of set guidelines for this policy, and the set laws governing the ICT industry. Activities aimed at compromising the data stored on the server systems and client stations, disruption of services provided by the information system, and those aimed at illegally accessing unauthorized information will be liable to legal action (Denis, 2005, P.13).
c) Offensive or Harassing Materials
The posting of material which might be considered to be infringe on the access privileges and privacy of individuals who either use the facility or constitute the general public is prohibited. The users of the WLAN facility are prohibited from posting and sharing of information which contravene this requirement either on computer facilities provided by the university or on computers and portable devices owned by members of the university fraternity.
d) Copyrighted, Licensed, or Intellectual Property
Users of the WLAN facility are expected to observe respect for intellectual property. This may include restrictions relating to downloading of copyrighted literature, software and multimedia material to and from the network’s server storage (Migga, 2008, P.29). Sharing of such material by transmission through the network is however beyond the scope of limit...