Wi-Fi Use Guidelines

For information on how to connect, visit the Wireless Internet on Campus page. 

Maintaining a solid Wi-Fi network is a shared responsibility.

The Wi-Fi network is a critical campus resource. All users share responsibility for protecting the integrity and security of the network. Interference from personal wireless equipment can limit network access. Use of unauthorized Wi-Fi access points poses a security risk to the University of Massachusetts Boston’s computing environment. It is the responsibility of Information Technology Services Division (ITSD) to ensure that wireless devices are properly installed and administered to manage both performance and security risks.

Only ITSD should deploy wireless access points on campus.

Personal wireless access points (WAPs) will interfere with UMass Boston WAPs causing signal degradation and connectivity issues for those nearby.

Personal wireless devices (e.g. Mobile Hot Spots, Mi-Fi, phone tethering, unauthorized wireless access points, Wi-Fi printers, etc.) significantly and negatively affect the UMass Boston campus Wi-Fi environment.

ITSD personnel will periodically scan for personal wireless access devices. If an unauthorized WAP or Mi-Fi is identified, ITSD personnel will open a ticket in the incident tracking system and attempt to contact the appropriate individual to address the Wi-Fi issue in that location. If contact cannot be made, the device will be disconnected digitally at the network level. The same applies to Wi-Fi printers. Printers on UMass Boston campus should have Wi-Fi connectivity disabled and be connected only to a wired network jack with a reserved IP address.

Help ITSD improve campus Wi-Fi service by contacting the IT Service Desk.

If you have concerns about Wi-Fi connectivity, please contact the IT Service Desk (617-287-5220, ITServiceDesk@umb.edu). Please include details such as locations, times of day, and work that is being interrupted by Wi-Fi connectivity issues. This detailed information will enable ITSD to engage the right personnel and tools to troubleshoot problems and implement solutions.

For more detailed policy information, read the Wireless Requirements and Procedure, and the full Information Technology Acceptable Use Policy