ITS Wireless Communications Policy
Section 1. Principles
As an institution founded to create, acquire and disseminate knowledge, the university is now providing for members of the community a Wireless communication infrastructure. This infrastructure is the property of the university and is provided for the sole purpose of facilitating the business of the university including teaching, learning, scholarship, research, communication, and other creative endeavors.
Campus responsibility for electronic Wireless communication resources resides with the Chief Information Officer and the Information Technology Services. ITS must approve all installations of Wireless access points (AP’s) across all campuses. Policies and guidelines for deployment of these systems are essential to prevent interference between different departmental implementations, other uses of the wireless spectrums, to insure and safeguard security across the USC network, and maintain a quality of service connection to a diverse user community.
Section 2. Code of Behavior
Abuse or interference with USC network equipment is a violation of acceptable use. Interference or disruption of authorized communications or unauthorized interception of network traffic is a violation of USC policy. In providing and maintaining its electronic communication infrastructure, the university complies with applicable federal state and local laws; and it requires that users do the same. USC also enforces its own policies and standards pertaining to the electronic communication environment.
Section 3. Responsibilities and Privacy
Due to the lack of privacy of network communication over wireless network technology, all wireless traffic is presumed to be insecure and susceptible to unauthorized examination. ITS will take every precaution to minimize this exposure and will proactively introduce new technologies, when available, to secure and safeguard network traffic. However, due to the potential exposure inherent to wireless technology, users should not use the wireless network to access critical and essential applications or transmit sensitive material and information; social security numbers or credit card information. Individuals assume full responsibility and accountability for their actions.
Section 4. Security
Violations of the law may be reported to the appropriate civic authorities. Violations of university policy and standards will be processed through the responsible university authorities. Access to the university communications network may be restricted or denied, without warning, as a result of violations of the law or university policy.
Policies regarding Electronic Communications and Student use of Computing Resources, can be found at http://cio.usc.edu/policies.