Wireless Network Use


The purpose of this policy is to describe the usage and security measures implemented at Lynn University to safeguard wireless access to the network by authenticated users. In addition, it outlines the practices that must be adhered to when using Lynn University wireless access points.


All client PC’s wanting to access the Lynn University Campus Network will be required to use Unencrypted Wireless Network (Stunet) Separate Vlan from wired network.


Authorized User(s)-a user of Technology Resources including, but not limited to, employees, temporary employees, faculty, students, alumni, campus visitors, contractors, vendors, consultants and their related personnel, and other users authorized by the University to access its systems and networks.

Technology Resources—are assigned computer accounts, email services, and the shared University network(s), which includes resources, staff and facilities operated by the University, whether owned, leased, used under license or by agreement, including, but not limited to: telephones (including Electronic Devices) and telephone equipment, voice mail, SMS, desktop laptop computers, electronic devices, hardware, software, networks, computing laboratories, databases, files, information, software licenses, computing-related contracts, network bandwidth, usernames, passwords, documentation, disks, CD-ROMs, DVDs, magnetic tapes, and other electronic media or storage devices. Email, chat, facsimiles, mail, any connection to the University's network(s) or use of any part of the University’s network(s) to access other networks, connections to the Internet that are intended to fulfill information processing and communications functions, communication services, hardware, including printers, scanners, facsimile machines, any off-campus computers and associated equipment provided for the purpose of University work or associated activities.


In addition, the following practices must be adhered to when using Lynn University wireless access points:

  1. All wireless access points within the University’s firewall must be approved and centrally managed by the Department of Information Technology (IT). The addition of new wireless access points within campus facilities will be managed at the sole discretion of IT. Non-sanctioned installations of wireless equipment or use of unauthorized equipment on campus premises are strictly forbidden.
  2. The IT Department will occasionally conduct sweeps of the wireless network to ensure there are no rogue access points present.
  3. The IT Department reserves the right to turn off without notice any access point connected to the network that it feels puts the University’s systems, data, and users at risk.
  4. Any device or equipment found to be interfering with access point signals may be subject to relocation or removal, including cordless phones, microwave ovens, cameras, light ballasts, etc.
  5. All computer equipment and devices used to connect to the University’s network must display reasonable physical security measures. Users are expected to secure their University-connected devices when they are physically at their machines as well as when they step away.
  6. Wireless access users agree to immediately report to the University’s IT Department any incident or suspected incidents of unauthorized access point installation.
  7. Use of the wireless network is subject to the same guidelines as the University’s Acceptable Use Policies.

For more information about this policy, contact Information Technology.

Policy updated on: Oct. 24, 2018