Skip to content

The Service
Information Services Policies...
Wireless Communication Policy

Please note that as this policy is periodically reviewed and updated, if you print it from the website, its accuracy cannot be guaranteed for more than a 24 hour period following printing.

1. Overview

The purpose of this policy is to secure and protect the information assets owned by Hampshire Fire and Rescue Service (HFRS). HFRS provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives. HFRS grants access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all information assets.

This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to HFRS network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by the Information Security Forum are approved for connectivity to HFRS network.

2. Scope

All employees, contractors, consultants, temporary and other workers at HFRS, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of HFRS must adhere to this policy. This policy applies to all wireless infrastructure devices that connect to HFRS network or reside on HFRS site that provide wireless connectivity to endpoint devices including, but not limited to, laptops, desktops,

mobile phones, and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data.

The Information Security Forum must approve exceptions to this policy in advance.

3. Statement of Requirements

3.1 General Requirements

All wireless infrastructure devices that reside at HFRS sites and connect to a HFRS network, or provide access to information classified as HFRS Protect, HFRS Confidential, or HFRS Restricted must:

  • Abide by the standards specified in the “Wireless Communication Standard”.
  • Be installed, supported, and maintained by the IS Department.
  • Use HFRS approved authentication protocols and infrastructure.
  • Use HFRS approved encryption protocols.
  • Maintain a hardware address (MAC address) that can be registered and tracked.
  • Not interfere with wireless access deployments maintained by other support organizations.

3.2 Development and Isolated Wireless Device Requirements

All development wireless infrastructure devices that provide access to HFRS Protect, HFRS Confidential, or HFRS Restricted information must adhere to section 3.1. Development and isolated wireless devices that do not provide general network connectivity to the HFRS network must:

  • Be isolated from the corporate network (that is it must not provide any corporate connectivity).
  • Not interfere with wireless access deployments maintained by other support organizations.

3.3 Home Wireless Device Requirements

  • Wireless infrastructure devices that provide direct access to the HFRS corporate network, must conform to the Home Wireless Device Requirements as detailed in the Wireless Communication Standard.

  • Wireless infrastructure devices that fail to conform to the Home Wireless Device Requirements must be installed in a manner that prohibits direct access to the HFRS corporate network. Access to the HFRS corporate network through this device must use standard remote access authentication.

4. Enforcement

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with HFRS.

5. Definitions

Term Definition
HFRS Network A wired or wireless network including indoor, outdoor networks that provide connectivity to corporate services.
Corporate connectivity A connection that provides access to an HFRS network.
Enterprise ClassRemote worker (ECR) An end-to-end hardware VPN solution for Remote worker accessto the HFRS network.
Information assets Information that is collected or produced and the underlying hardware, software, services, systems, and technology that is necessary for obtaining, storing, using, and securing that information which is recognized as important and valuable to an organization.
MAC address The MAC address is a hardware number that uniquely identifies each node on a network and is required for every port or device that connects to the network.

This page printed on 18 Dec 2014 at 00:58

For reference, the url of this document is:

© Hampshire Fire and Rescue Service 2014