A wireless computer network is intended to span a relatively small limited area using one or more of the following technologies to access the information resources systems: • Wireless Local Area Networks (based on the IEEE 802.11 family of standards); • Wireless Personal Area Networks (based on the Bluetooth and/or Infrared (IR) technologies); and/or, • Wireless Handheld Devices which includes text-messaging devices, personal digital assistant (PDAs) and smartphones.


  • The Texas A&M University (Texas A&M) Wireless Access Control applies equally to all groups and individuals that utilize wireless connectivity to access Texas A&M information resources.

  • This includes students, faculty and staff members as well as guest account users, vendors, and research partners.

  • Wireless installation requests should be sent by email message to Technology Services at


  • The main objective of the wireless network is to provide an Internet connection that can be used to allow connectivity where a wired solution is not feasible (e.g., mass access areas such as a lecture room, dining area, certain exterior spaces, etc.). In general, it is not intended to be a replacement for the wired infrastructure in conducting university business. However, there may be situations where a wired infrastructure is not feasible and wireless access may be used to access Technology Services resources if appropriate security measures are taken.

  • These procedures are necessary to preserve the integrity, availability, and confidentiality of Texas A&M information.

  • 1

    Unauthorized access points and network attached wireless devices are prohibited on the Texas A&M network. Periodic monitoring will be conducted to identify unauthorized networks. Information owners (i.e., device owners or owners of information resources) will be contacted and requested to comply with this Control.

  • 2

    Individuals and departments are prohibited from extending the Texas A&M network through means of wireless technologies.

  • 3

    Unit networks not supported by Technology Services must obtain written approval from authorized Technology Services personnel for the use and installation of wireless technologies utilizing the Texas A&M network (send an email message to

  • 4

    Only approved wireless clients are allowed to access the TAMU WiFi network.

    • 4.1

      Access to the wireless network shall be authenticated by Technology Services approved methods such as Texas A&M NetID and password, an eduroam federation account, or as coordinated by Technology Services.

    • 4.2

      Students, faculty and staff must access the campus wireless network using the TAMU WiFi network or eduroam.

    • 4.3

      Guest wireless accounts (guests) are authorized to use the TAMU_Visitor wireless network only under the following condition:

  • 5

    The following are expectations for guest sponsors, guest users, and research partners:

    • 5.1

      Guest Sponsors:

      • 5.1.1

        shall ensure that access is limited to official guests of the university;

      • 5.1.2

        are responsible for verifying each guest’s identity; and,

      • 5.1.3

        are responsible for maintaining accurate records of wireless access assignments for guests.

    • 5.2

      Guest Users shall comply with applicable university requirements while using their assigned guest credentials (such as University Rule 29.01.03.M0.02 Acceptable Use.

    • 5.3

      Research Partners (such as the commercial entities that have research agreements with the university) shall also comply with applicable university requirements when utilizing guest accounts (e.g., University Rule 29.01.03.M0.02 Acceptable Use.)

  • 6

    TAMU WiFi network provides “best effort” service for all Texas A&M students, faculty, staff and guests campus-wide. Use of the wireless network for activities requiring highly reliable service is not recommended.

  • 7

    Limited special requests may be granted by the CISO, or designee (e.g., research projects requiring isolated wireless devices for experiments). Each special request form shall be submitted to and will require a site evaluation. If granted, all instructions provided by Technology Services in the special request communication must be followed.