We are planning to implement Wi-Fi in our school but first want to have a policy for how the whole school will...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
use Wi-Fi. Can you offer any advice or a sample copy of a Wi-Fi policy?
First, congratulations on starting with a Wi-Fi policy in place. Far too often, Wi-Fi security and Acceptable Usage Policies are an afterthought, but your approach is less likely to land you in hot water. In this detailed discussion about crafting a mobile device security policy (which includes examples), I discuss factors to consider as you draft a mobility policy, as well as pitfalls to avoid.
Read more of Lisa’s expert advice
Overcoming wireless network interference in public venues
Using wireless network bandwidth monitoring to stay within data caps
Unauthorized network access: Neighbors pose a network security threat?
While that tip is not specific to Wi-Fi security, it should give you a good feel for the elements that should be addressed in wireless policy. In addition, here are a few Wi-Fi policies that go beyond security to discuss where and how Wi-Fi devices can be used:
Do you have a question for our experts?
Submit your question directly to our editors at firstname.lastname@example.org
I have listed examples from schools and libraries because I believe these organizations probably have needs and concerns that will be similar to yours. I encourage you to talk to other network administrators in nearby schools to discuss their policies. You should ask them if written policies exist, what they contain, what has worked well, and what they think your colleagues should do differently. While you might not find a wireless policy that is exactly what you need, this will give you more insight into what you should consider. In short, effective policies are as much about need and use as they are about rules and settings.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.