25.5 Wireless Communication Management
The objective of this Policy is to secure and protect the information assets owned by the Group. IT provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives. IT grants access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all information assets.
This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to Group network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by IT Security Department are approved for connectivity to Group network
25.5.1 General Network Access Requirements
All wireless infrastructure devices that reside at a Group site and connect to a Group network, or provided access to the Group information system must:
a) Abide by the standards specified in the Wireless Communication Standard.
b) Be installed, supported, and maintained by an approved support team.
c) Use IT approved authentication protocols and infrastructure.
d) Use IT approved encryption protocols.
e) Maintain a hardware address (MAC address) that can be registered and tracked.
f) Not interfere with wireless access deployments maintained by other support organizations.