Skip to main content

Wireless Guidelines

Tarrant County College reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made to the I.T. environment. You are responsible for reviewing this policy periodically to ensure your continued compliance with all TCCD policies and guidelines.

Revision: 1.0
Publication Date: January 27, 2006
Effective Date: January 27, 2006

0.0 Definitions and Terms

  1. Guidelines: This document.
  2. P&R: The TCCD Policy and Regulation Manual.
  3. Users: Students, faculty, staff, partners, contractors, consultants, temporaries, library patrons, visitors, guests and other workers at TCCD, including all personnel affiliated with third-parties using Resources.
  4. Network connectivity: Hardwired, dial-up, VPN, wireless or infrared.
  5. Production Wireless Networks: The wireless network deployed and managed by TCCD Communications Services for the purpose of general internet connectivity.
  6. Academic Wireless Networks: Those wireless networks deployed for the sole purpose of teaching wireless networking.
  7. Special-Use Wireless Networks: Those wireless networks deployed for special or temporary use, such as job fairs, technology, showcasing, etc.
  8. Rogue Wireless Networks: Any unauthorized wireless network not falling in any of the categories above.

1.0 Purpose

The purpose of this Guideline is to govern the implementation, use, and administration of wireless technology. Failure to follow this Guideline exposes TCCD to risks including compromise of network systems and services, legal issues and detriment to the mission of Teaching and Learning.

2.0 Scope

This Guideline applies to students, faculty, staff, partners, contractors, consultants, temporaries, library patrons, visitors, other workers and guests at TCCD, including all personnel affiliated with third parties that use the TCCD network. This Guideline applies to all systems, equipment, and resources that are used by outside parties and/or owned, leased or operated by TCCD.

  1. This Guideline applies to all wireless access points (WAP or AP) and/or any central transmitters and receivers of WLAN radio signals whether or not they are directly connected to the wired TCCD network infrastructure.
  2. This Guideline applies to all computers/devices that connect to or affect the Tarrant County College Network.
  3. This Guideline applies to all computers that are the property of TCCD. This includes, but is not limited to, desktop computers, laptop computers, handheld devices, and all other devices that connect to the network.
  4. This Guideline applies to home computers that are owned and/or used by faculty, staff or students that connect to or affect the Tarrant County College network.

3.0 Guideline

  1. Wireless networks will be allowed to operate, if and only if, approved by the Vice Chancellor of Information Systems and Computing.
  2. WIFI technology NOT allowed: Unauthorized “Rogue” wireless access points or networks–any wireless access point or network that has not been approved.
  3. Use and acquisition of wireless technology will follow ALL rules of the Acceptable Use Guidelines for Computing and Technology Resources Specifically, and not limited to: "Prior to purchase, all technologies (hardware or software) and/or any contract with a third-party vendor, regardless of the funding source, must be submitted to the Vice Chancellor of Information Systems and Computing. Technologies/contracts are reviewed by the Vice Chancellor and forwarded to the appropriate committee for technical commentary on the ramifications of the technologies/contracts on the TCCD infrastructure, support systems, and technical staff. Note: All technologies (hardware or software) and/or any contract with a third party vendor that require changes to firewalls or other security resources to allow outside access to TCCD must be submitted to the Vice Chancellor for approval prior to purchase.
  4. Telecommunication Services and Academic Computing will use manual and automated means to detect Unauthorized Wireless Networks. If an Unauthorized wireless access point is located, then:
    1. The wireless access point will be shutdown immediately.
    2. Notification of the shutdown will be provided to the Vice Chancellor and associated department head.
    3. A follow-up report conducted by either Telecommunication Services or Academic Computing gathering details of last use will be recorded.
    4. The appropriate committee will review the follow-up report and advise the Vice Chancellor if further action is required.
  5. Requests for proposal of an Academic Wireless Network or Special Use Wireless network will be made to the Help Desk. The Help Desk will provide a detailed Wireless Questionnaire Form regarding intended use. Changes of intended use will require additional approval. All requests will be reviewed by the Vice Chancellor.
  6. Wireless clients will not be allowed access to the Intranet (the TCCD private network).
  7. Anything that degrades or compromises the ability of staff, faculty or students to perform or meet the mission of TCCD constitutes unacceptable use.
  8. There will be no exceptions to this Guideline.

Updated August 15, 2016