|Responsible office||Information Technology|
|Enforcement official||Director, IT Security & Privacy|
Statement of Rule
Wi-Fi access is granted to individuals visiting the Western Michigan University campuses and where WiFi service is offered. Commercial use is prohibited.
1. Purpose of Rule
Sets forth the rules for using the WMU Guest wireless network.
2. Stakeholders Most Impacted by the Rule
This Rule applies to all users of the WMU Guest wireless network.
3. Key Definitions
3.1. WiFi is the radio technology deployed on wireless local area networks.
3.2. Internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
4. Full Rule Details
4.1. Day by day access to the WMU Guest wireless network is granted to all visitors of the Western Michigan University campuses to access the Internet while on campus. Individuals connecting to WMU Guest will have to acknowledge and accept the WMUnet Acceptable Use Policy.
4.2. WMU Guest does not require a password.
4.3. WMU Guest is not a secure network connection.
4.4. Commercial use of this resource is prohibited.
4.5. Act responsibility and practice due diligence while you are connected to the Internet through the WMU Guest wireless network.
4.6. This network is a shared resource, thus network use or applications that inhibit or interfere with the use of this network by others it not permitted.
4.7. WMU Guest wireless sessions are limited to 18 hours. Guests are able to re-accept the Acceptable Use Policy after their session has expired.
4.8. WMU Guest is meant for short term use. Guests who require a persistent connection should contact their inviting department’s IT support for alternative access options.
4.9. WMU Guest is for visitors use only. WMU students, faculty and staff should use WMU Secure for their wireless connections.
The Office of Information Technology reserves the right to terminate any network connection without notice should it be determined that network traffic generated from said connection unfavorably inhibits or interferes with the use of the network by others.
All users of network resources at Western Michigan University are responsible for adherence to any State or Federal regulations regarding computer use, including, but not limited to, the Telecommunications Act of 1996.
6. Related Procedures and Guidelines
It is essential that all users of wireless networks adhere to best practices for access to this shared resource. Please consult Wireless Best Practices on the Office of Information Technology Help Desk site.
7.1. As a visiting scholar, should I use WMU Guest or WMU Secure?
Answer: A visiting scholar is entitled to a Bronco NetID and thus can authenticate to the WMU Secure network. Please see your sponsoring department to requests a Bronco NetID.
8. Related Policies:
|Effective date of current version||September 1, 2019|
|Date first adopted||June 1, 2015|
|Proposed date of next review||June 1, 2022|