Common use of Wireless Systems Clause in Contracts

Wireless Systems. Wireless systems provide a cost-effective solution for extending wired networks to remote areas. However, wireless systems also provide an easy means of hostile exploitation, such as when unauthorized wireless access points are installed. a. Installation of wireless access points (stand alone or connected to Army network) without prior approval from the Directorate of Information Management (DOIM) is strictly prohibited. b. The ISSM will periodically scan for wireless networks on the installation. Unauthorized wireless systems will be shut down on the spot and equipment confiscated. c. Wireless networks must be secured utilizing encryption. Wireless systems will conform to appropriate Army best business practices and configured for a minimum of FIPS 140-2 encryption. d. At no time will any access point be installed in offices as an extension to connect additional computers or printers without prior approval from the DOIM e. Wireless networks must operate in conjunction with an approved wireless network security solution to reduce the likelihood of hostile exploitation of the TMD by rogue devices.

Appears in 3 contracts

Sources: Information Technology Acceptable Use Policy, Acknowledgement of User Responsibility Agreement, Information Technology Acceptable Use Policy